Skip to content
logo The magazine for digital lifestyle and entertainment
Internet News Security All topics
While surfing, observed

Scammers Access Cameras of Porn Viewers

Man Covers His Face With His Hands in Front of Laptop
Porn Viewers Should Watch Their Cameras Photo: Getty Images
Share article

April 24, 2026, 3:44 pm | Read time: 3 minutes

Anyone who frequents adult sites should exercise caution now. Porn viewers, in particular, should cover their cameras if possible. Otherwise, they risk not only unpleasant recordings but also extortion.

Porn viewers should cover their cameras

This is according to a new blog post by security researchers at Proofpoint. According to their findings, a new type of malware is currently circulating. It is said to be an infostealer that reads various data and transmits it in text form. But that’s not all. Another component of the new attack campaign particularly invades the privacy of those affected.

Therefore, porn viewers should definitely secure their cameras. According to the report, the malicious software would immediately detect when someone visits an adult website on infected browsers. It does this by scanning the page for keywords like “sex” or “porn.” In such cases, it would promptly take a screenshot of the desktop and then access the webcam to capture an image of the person in front of it.

The photos could later be used for extortion attempts. Therefore, porn viewers should at least cover their cameras to protect themselves from unwanted recordings. It’s not the first time that visitors to porn sites have been targeted by scammers. Often, it’s about letters or emails that are easier to ignore. While malware taking pictures is not unheard of, it is still relatively rare. Porn viewers should thus protect their cameras as much as possible.

More on the topic

Extensive data theft possible

As the experts from Proofpoint further explain, there can be extensive data theft, with the information being distributed through various channels. The stolen data can range from bank details, session data, cookies, access information, logins, email data, system information to keystrokes. The distribution occurs via platforms such as Discord, Telegram, SMTP, or file hosts.

Malware arrives via phishing email

According to the report, the current malware is based on the open-source malware Stealerium. This means it is publicly accessible and has been since 2022. Cybercriminals can easily download and modify it for their purposes.

Despite its age, there has been a recent increase in attacks. Particularly from May to August 2025, there was a noticeable rise in campaigns. The main distribution method of the malware is said to be phishing emails, which allegedly concern urgent banking or legal matters. Those affected should be especially cautious with messages from unknown senders and ideally follow our tips for recognizing phishing emails. Just one click could be disastrous.

This article is a machine translation of the original German version of TECHBOOK and has been reviewed for accuracy and quality by a native speaker. For feedback, please contact us at info@techbook.de.

You have successfully withdrawn your consent to the processing of personal data through tracking and advertising when using this website. You can now consent to data processing again or object to legitimate interests.