April 24, 2026, 3:44 pm | Read time: 3 minutes
Anyone who frequents adult sites should exercise caution now. Porn viewers, in particular, should cover their cameras if possible. Otherwise, they risk not only unpleasant recordings but also extortion.
Porn viewers should cover their cameras
This is according to a new blog post by security researchers at Proofpoint. According to their findings, a new type of malware is currently circulating. It is said to be an infostealer that reads various data and transmits it in text form. But that’s not all. Another component of the new attack campaign particularly invades the privacy of those affected.
Therefore, porn viewers should definitely secure their cameras. According to the report, the malicious software would immediately detect when someone visits an adult website on infected browsers. It does this by scanning the page for keywords like “sex” or “porn.” In such cases, it would promptly take a screenshot of the desktop and then access the webcam to capture an image of the person in front of it.
The photos could later be used for extortion attempts. Therefore, porn viewers should at least cover their cameras to protect themselves from unwanted recordings. It’s not the first time that visitors to porn sites have been targeted by scammers. Often, it’s about letters or emails that are easier to ignore. While malware taking pictures is not unheard of, it is still relatively rare. Porn viewers should thus protect their cameras as much as possible.
Fake Captchas Can Install Malware
With These Tips, You Can Protect Yourself From Identity Theft
Extensive data theft possible
As the experts from Proofpoint further explain, there can be extensive data theft, with the information being distributed through various channels. The stolen data can range from bank details, session data, cookies, access information, logins, email data, system information to keystrokes. The distribution occurs via platforms such as Discord, Telegram, SMTP, or file hosts.
Malware arrives via phishing email
According to the report, the current malware is based on the open-source malware Stealerium. This means it is publicly accessible and has been since 2022. Cybercriminals can easily download and modify it for their purposes.
Despite its age, there has been a recent increase in attacks. Particularly from May to August 2025, there was a noticeable rise in campaigns. The main distribution method of the malware is said to be phishing emails, which allegedly concern urgent banking or legal matters. Those affected should be especially cautious with messages from unknown senders and ideally follow our tips for recognizing phishing emails. Just one click could be disastrous.