{"id":3688,"date":"2024-04-19T00:00:00","date_gmt":"2024-04-19T00:00:00","guid":{"rendered":"https:\/\/digitalinvestigation.com\/blog\/?p=3688"},"modified":"2025-03-31T20:56:26","modified_gmt":"2025-03-31T20:56:26","slug":"it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime","status":"publish","type":"post","link":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/","title":{"rendered":"It Started with a Trojan Horse: A Maine Restaurateur&#8217;s Absurdly Comical Dance with Cybercrime"},"content":{"rendered":"<p><span data-contrast=\"auto\">Picture this: a 55-year-old self-made restaurateur in the state of Maine. Life was nothing short of a dream come true for me \u2013 don\u2019t judge me; I actually like the state \u2013. I had worked my way up from humble beginnings to owning a chain of popular restaurants that locals couldn&#8217;t seem to get enough of. My wife and four children were my rock, and together, we had built a life that felt like a testament to hard work and perseverance. However, a seemingly innocuous decision one day sent my life spiraling into a nightmare of cybercrime and <\/span><a href=\"\/sextortion\/\"><span data-contrast=\"none\">extortion<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The saga began when I decided to install a piece of cracked software on my personal computer. It seemed like an innocent enough act at the time &#8211; a simple way to save some money. Little did I know, this act would open a Pandora&#8217;s box that I couldn&#8217;t close: a <\/span><span data-contrast=\"none\">Trojan horse<\/span><span data-contrast=\"auto\">. This <\/span><span data-contrast=\"none\">malignant software<\/span> <span data-contrast=\"auto\">stealthily made its way into my system, lurking unnoticed while it gained unrestricted access to my webcam and every piece of content stored on my computer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Before long, my phone started buzzing with ominous messages from an unknown number. The anonymous sender claimed to have obtained some intimate photos (that were meant never to see the light of day), a record of my browsing history (which, let&#8217;s be honest, was beyond food recipes and cute dog videos), and even disturbing webcam recordings of my family and me.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">They demanded a significant sum of money, threatening to leak this private information if I didn&#8217;t comply. Initially, I attempted to brush off these threats, blocking all numbers associated with the harassment. Hoping to leave it all behind, I even invested in a new PC and changed my phone number.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For a blissful month, everything appeared to return to normal. Life returned to its usual rhythm, and I dared to believe that my unfortunate, ill-advised cyber adventure was behind me. But my relief was short-lived. The <\/span><span data-contrast=\"none\">hacker<\/span> <span data-contrast=\"auto\">resurfaced, this time raising their ransom demand to $20,000.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The stakes skyrocketed when my whole family simultaneously received a voice message from an unknown number during a family barbeque. <\/span><i><span data-contrast=\"auto\">Hello, I see you \u2013 <\/span><\/i><span data-contrast=\"auto\">they said. <\/span><i><span data-contrast=\"auto\">I see you every day, eating, talking, dressing. <\/span><\/i><span data-contrast=\"auto\">This shook us to our very core. They were even more terrified since they had no idea what was happening. Backed into a corner, I had to confess my predicament.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Together, we decided to involve law enforcement and consulted with a legal expert. Despite their best efforts, the police hit a dead end when tracing the origin of the threats. Our lawyer, after examining the case from all angles, regretfully informed us that there was little they could do to help.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Faced with an impasse, I turned to social media. In a public post, I detailed my predicament, bracing myself for the impending leak of my private content. I thought if I took the scandalous part, it would be easier to digest for my family, friends, and clientele.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the storm of supportive and equally mocking responses, one Instagram user&#8217;s suggestion caught my eye. They recommended a firm specializing in <\/span><span data-contrast=\"none\">digital investigations<\/span><span data-contrast=\"auto\">, promising that they could help gather evidence against the <\/span><span data-contrast=\"none\">hacker<\/span><span data-contrast=\"auto\">. With no other options left, I reached out to them. To my relief, the investigators took up the case promptly. Using advanced tracing techniques, they managed to locate the hacker in the Dominican Republic.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The investigators confronted the criminal. I love to picture the hacker going into full panic mode and hastily sending proof of deletion of all my content. The digital forensics team cross-verified this and confirmed to me that my content had indeed been wiped clean from the hacker&#8217;s possession and the deep web. Unfortunately, even though we had the hacker&#8217;s location, they were never officially apprehended. They disappeared from the digital world, or at least my digital sphere, hopefully for good.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the aftermath of this rollercoaster ride, life started to regain a semblance of normalcy. Strangely enough, our family gained some local fame due to the absurd cyber scandal. It was a bitter-sweet victory, but a victory nonetheless.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In hindsight, I am immensely grateful to the <\/span><a href=\"https:\/\/digitalinvestigation.com\/\"><span data-contrast=\"none\">Digital Investigations<\/span><\/a> <span data-contrast=\"auto\">team for their invaluable help during this challenging time. Their expertise and swift action helped us reclaim our lives from the clutches of <\/span><a href=\"https:\/\/cyberinvestigation.com\/extortion\/\"><span data-contrast=\"none\">cyber extortion<\/span><\/a><span data-contrast=\"auto\">. This laughably tragic episode has taught me a lesson (or ten) about online safety and the dangers of installing unverified software. I share my story, hoping it can serve as a cautionary tale to others, reminding everyone of the potential risks lurking in the digital world.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"Picture this: a 55-year-old self-made restaurateur in the state of Maine. Life was nothing short of a dream&hellip;","protected":false},"author":1,"featured_media":3696,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[44],"tags":[],"class_list":{"0":"post-3688","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-spyware","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>It Started with a Trojan Horse: A Colorado Restaurateur&#039;s Absurdly Comical Dance with Cybercrime<\/title>\n<meta name=\"description\" content=\"It Started with a Trojan Horse: A Maine Restaurateur&#039;s Absurdly Comical Dance with Cybercrime | Blog\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It Started with a Trojan Horse: A Maine Restaurateur&#039;s Absurdly Comical Dance with Cybercrime\" \/>\n<meta property=\"og:description\" content=\"It Started with a Trojan Horse: A Maine Restaurateur&#039;s Absurdly Comical Dance with Cybercrime | Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PDInvestigate\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-31T20:56:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/01\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"736\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Derek J. Langford\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:site\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek J. Langford\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/\"},\"author\":{\"name\":\"Derek J. Langford\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\"},\"headline\":\"It Started with a Trojan Horse: A Maine Restaurateur&#8217;s Absurdly Comical Dance with Cybercrime\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-03-31T20:56:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/\"},\"wordCount\":779,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg\",\"articleSection\":[\"Detecting Spyware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/\",\"name\":\"It Started with a Trojan Horse: A Colorado Restaurateur's Absurdly Comical Dance with Cybercrime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-03-31T20:56:26+00:00\",\"description\":\"It Started with a Trojan Horse: A Maine Restaurateur's Absurdly Comical Dance with Cybercrime | Blog\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg\",\"width\":736,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/spyware\\\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It Started with a Trojan Horse: A Maine Restaurateur&#8217;s Absurdly Comical Dance with Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"name\":\"Articles on Sextortion & Blackmail - Expert Advice on the Blog\",\"description\":\"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\",\"name\":\"Digital Investigations\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"width\":216,\"height\":65,\"caption\":\"Digital Investigations\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PDInvestigate\",\"https:\\\/\\\/x.com\\\/PDInvestigate\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalinvestigation\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCc5KctfM3-tMserIsMhWUrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\",\"name\":\"Derek J. Langford\",\"description\":\"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.\",\"sameAs\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"It Started with a Trojan Horse: A Colorado Restaurateur's Absurdly Comical Dance with Cybercrime","description":"It Started with a Trojan Horse: A Maine Restaurateur's Absurdly Comical Dance with Cybercrime | Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"It Started with a Trojan Horse: A Maine Restaurateur's Absurdly Comical Dance with Cybercrime","og_description":"It Started with a Trojan Horse: A Maine Restaurateur's Absurdly Comical Dance with Cybercrime | Blog","og_url":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/","og_site_name":"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog","article_publisher":"https:\/\/www.facebook.com\/PDInvestigate","article_published_time":"2024-04-19T00:00:00+00:00","article_modified_time":"2025-03-31T20:56:26+00:00","og_image":[{"width":736,"height":200,"url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/01\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg","type":"image\/jpeg"}],"author":"Derek J. Langford","twitter_card":"summary_large_image","twitter_creator":"@PDInvestigate","twitter_site":"@PDInvestigate","twitter_misc":{"Written by":"Derek J. Langford","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/#article","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/"},"author":{"name":"Derek J. Langford","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82"},"headline":"It Started with a Trojan Horse: A Maine Restaurateur&#8217;s Absurdly Comical Dance with Cybercrime","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-03-31T20:56:26+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/"},"wordCount":779,"publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/01\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg","articleSection":["Detecting Spyware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/","url":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/","name":"It Started with a Trojan Horse: A Colorado Restaurateur's Absurdly Comical Dance with Cybercrime","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/01\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-03-31T20:56:26+00:00","description":"It Started with a Trojan Horse: A Maine Restaurateur's Absurdly Comical Dance with Cybercrime | Blog","breadcrumb":{"@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/#primaryimage","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/01\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/01\/DI_Blog_It_Started_With_A_Trojan_Horse_A_Colorado_Restaurateurs_Absurdly_Comical_Dance_With_Cybercrime_736x200px.jpg","width":736,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/digitalinvestigation.com\/blog\/spyware\/it-started-with-a-trojan-horse-a-maine-restaurateurs-absurdly-comical-dance-with-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalinvestigation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"It Started with a Trojan Horse: A Maine Restaurateur&#8217;s Absurdly Comical Dance with Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/digitalinvestigation.com\/blog\/#website","url":"https:\/\/digitalinvestigation.com\/blog\/","name":"Articles on Sextortion & Blackmail - Expert Advice on the Blog","description":"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less","publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalinvestigation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalinvestigation.com\/blog\/#organization","name":"Digital Investigations","url":"https:\/\/digitalinvestigation.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","width":216,"height":65,"caption":"Digital Investigations"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PDInvestigate","https:\/\/x.com\/PDInvestigate","https:\/\/www.linkedin.com\/company\/digitalinvestigation","https:\/\/www.youtube.com\/channel\/UCc5KctfM3-tMserIsMhWUrg"]},{"@type":"Person","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82","name":"Derek J. Langford","description":"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.","sameAs":["https:\/\/digitalinvestigation.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/comments?post=3688"}],"version-history":[{"count":1,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3688\/revisions"}],"predecessor-version":[{"id":5334,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3688\/revisions\/5334"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media\/3696"}],"wp:attachment":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media?parent=3688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/categories?post=3688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/tags?post=3688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}