Abrahams had sent Cassidy Wolf, the pageant winner, an anonymous email threatening to post the photos he had obtained unless she gave him more nude images.According to European law enforcement agency Europol, thousands of individuals own the software, which is commercially sold for less than 0.The man presumes that someone has hacked their computer. As Anderson wrote, the hacker has access to their screens, webcam, microphone, files and all other content on the device.At one point, the hacker messing with the family pops up a message on their computer screen that read “achoo!They even have strategies for watching where women store the photos most likely to be compromising."I just use the file manager feature of my RAT in whatever one im using and in [a RAT called] cybergate I use the search feature to find those jpgs that are 'hidden' unless u dig and dig and dig," wrote one poster.
This screenshot shows what one ratter is seeing in his or her own spying activity.After a two-day operation this week, in which international police forces conducted 359 house searches, the European Union's Eurojust says that 97 people have been taken into custody.Of the 17 that were arrested in the UK, all are male . It could be on a table in the dining room or in the bedroom or even resting on a chair in the bathroom, where you might be enjoying a DVD during a relaxing soak with a glass of wine.Suddenly, a light, no bigger than a 5p coin, appears at the top of the screen.The software, Blackshades Remote Access Tool, lets someone hack into your computer and access documents, record keystrokes, and activate the webcam.The software is activated when someone clicks on a malicious link, often from social networking sites. Jared James Abrahams, who was arrested for capturing the nude photos of Miss Teen USA through her webcam, was sentenced to 18 months in prison, but the search continued for anyone who was involved in creating, selling, and using Blackshades RAT.For behind the light is a webcam, a tiny video camera built into most new computers that feed images in ‘real time’ to another computer. In fact ‘spy software’ is freely available on the internet and is usually accompanied by a step-by-step guide on how to use the technology. set-up time three to ten minutes.’ All a potential voyeur has to do is download the package then send you, the intended ‘target’, an email.And behind that computer is someone who has now gained control of your laptop or workstation remotely, without your knowledge. Some have been brave enough to share their chilling stories with the Mail. One boasts: ‘Five mind-blowing, easy-to-implement methods . If you open it, an attachment automatically installs a virus — known as a ‘remote administration tool’ (RAT) — into your computer.The hacker has infected her machine with a remote administration tool (RAT) that gives him access to the woman's screen, to her webcam, to her files, to her microphone. Far away, the hacker opens his "Fun Manager" control panel, which provides a host of tools for messing with his RAT victims. "Poor people think they are alone in their private homes, but have no idea they are the laughing stock on Hack Forums," he continued.He watches her and the baby through a small control window open on his Windows PC, then he decides to have a little fun. He can hide their Windows "Start" button or the taskbar or the clock or the desktop, badly confusing many casual Windows users. Instead, he settles for popping open the remote computer's optical drive. "It would be funny if one of these slaves venture into learning how to hack and comes across this thread."Whether this would in fact be "funny" is unlikely.