Sextortion Email Scams: How They Trick and Extort Victims

Sextortion email scams are on the rise as a devious form of online blackmail aimed at manipulating victims into paying ransoms through false threats and exploitation of fear. These malicious emails claim possession of compromising photos, videos or information about recipients and threaten to make the material public or send to contacts if payment isn’t received.

While scammers often make false claims, the intentionally created sense of panic and urgency pushes many to give in to demands, resulting in lost money and privacy violations. Becoming aware of how these hurtful sextortion schemes operate can help recipients avoid being pressured and extorted by such emails.

I Regret to Inform You About Some Sad News for You

Scam Overview

Sextortion email scams are a form of online blackmail where scammers send emails threatening to distribute sensitive or compromising photos, videos or information about the recipient unless payment is made. These scams rely on creating fear and panic to extort money.

The emails often claim to have compromising photos or videos of the recipient through their computer webcam or by hacking into their devices. The scammers threaten to send the material to the victim’s contacts or post it online publicly unless payment is made, usually demanding payment in Bitcoin.

email scam

While sextortion scams sometimes do include real compromised material, they more often make false claims about having sensitive data in order to trick victims into paying. Even if no compromising material exists, the fear and panic created by the scam emails can be enough to coerce victims into giving in to demands.

These types of scams are often sent en masse to thousands of email addresses at once, with no specific targeting of individuals. The emails are designed to create anxiety and urgency about the threats, pressuring victims to pay without scrutinizing the claims or reporting the incident.

Falling victim to a sextortion scam can result in financial loss, anxiety, stress and embarrassment. Awareness about how these scams operate can help recipients avoid manipulation and protect themselves.

How the Scam Works

Sextortion scammers use various tactics to carry out their schemes:

Crafting Deceptive Emails

The emails are designed to appear alarming and urgent. They often include threats to send compromising photos, videos or information to the recipient’s contacts or social media networks in a set time period, often 12-48 hours, unless payment is received.

False claims about having access to devices and accounts are made to sound plausible. For example, stating they have access to email contacts or claiming the recipient’s computer was infected with malware to capture activity.

The messages urge discreet payment through difficult-to-trace means like Bitcoin. Information on how to pay is included, emphasizing acting quickly before the deadline.

Targeting En Masse

While sextortion emails may be personalized with the recipient’s name and email, they are generally sent en masse to thousands of addresses.

Scammers acquire email lists through various illegal methods then use software to customize messages and distribute them in bulk. The more messages sent, the more potential victims will fall prey.

Exploiting Fear and Shame

The emails exploit feelings of fear, shame and panic. The threats are designed to create distress, making victims believe there is no choice but to comply with demands.

Even recipients who have done nothing wrong may feel compelled to pay rather than risk the release of embarrassing material. The scammers exploit this anxiety, intimidating victims into hasty decisions.

Pressuring Urgency

Short deadlines of 12-48 hours are given, pressuring urgency to pay and avoid consequences. This rushed timeframe seeks to limit rational thinking and evaluation of claims.

Setting short turnarounds also allows scammers to maximize the number of emails sent, since those who do comply are likely to do so quickly under pressure. Delayed action works against the scammer’s goals.

Difficult-to-Trace Payments

Payment is demanded through cryptocurrency, wire transfers or gift cards – difficult to trace sources. Bitcoin is a frequent method since transactions are irreversible.

These hard to trace methods allow scammers to remain anonymous while still receiving payments from victims. This makes recovery of lost funds nearly impossible.

What To Do If You’ve Fallen Victim

If you’ve unfortunately fallen prey to a sextortion scam and paid the ransom, here are important steps to take:

  • Report it – Contact the FBI Internet Crime Complaint Center (IC3) to report the incident. Provide information on how the payment was made. Also notify your local police department.
  • Contact your bank – If you paid by bank account transfer, gift card or credit card, immediately contact your bank or card issuer. Report it as fraud. Attempt to stop or reverse the transactions if possible.
  • Place security alerts – Contact the major credit bureaus (Experian, Equifax, TransUnion) to place a fraud alert on your credit file and report identity theft if emails included personal information.
  • Assess threats – Review the scam email thoroughly and assess how much personal information the scammer has or claims to have. This will guide your next actions.
  • Change passwords – If emails suggest they have access to your accounts, change passwords immediately for security. Make them strong and unique for each account. Enable two-factor authentication when possible.
  • Get computer checked – If the scammer claims to have access to your computer or files, have your device evaluated by a security professional for signs of malware or remote access tools. Remove any detected.
  • Monitor accounts – Carefully monitor financial accounts and credit reports for signs of misuse of your information over the next few months. Report any fraudulent activity immediately.
  • Seek help – Share what happened with someone you trust and seek professional help if you are experiencing significant distress related to the incident. Support can assist the healing process.

While falling victim to sextortion scams can be frightening and embarrassing, taking quick action and reporting the incident to authorities is essential. There are resources available if you or someone you know has unfortunately been deceived by such scammers who aim to profit from fear.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions

How do sextortion scammers get your email address?

Sextortion scammers acquire email addresses in various illegal ways, including malware infections stealing contacts, purchasing stolen email lists online, harvesting addresses from websites, and using specialized email-scraping software. Email addresses can be gathered from almost anywhere on the internet and dark web by determined scammers.

Do sextortion scammers actually have compromising videos/photos of you?

In most cases, no, the scammers do not actually possess any compromising material. The claims are false threats designed to manipulate you into paying. However, in rare cases, scammers may have acquired some real material through malicious software or breached accounts. But lack of evidence provided indicates false claims in most instances.

Why do sextortion scams demand payment in Bitcoin?

Scammers prefer Bitcoin because transactions are irreversible and wallet owners can remain anonymous. This makes the money nearly impossible to trace or recover once sent to the scammers. Untraceable payment methods allow scammers to evade investigation and prosecution.

Can the scammers actually hack your computer or access your webcam?

While not impossible, it is highly unlikely your device has been directly compromised in relation to the scam email itself. The claims of accessing your webcam or infecting your computer with malware are generally unfounded threats designed to frighten and manipulate you into paying.

What should you do if you receive a sextortion email?

Do not panic or act out of fear. Carefully assess the claims made in the email and recognize they are likely false threats. Avoid any rushed actions like paying money. Report the scam attempt to authorities. Inform your contacts in case they receive related scam emails with your name.

Can you be tracked or identified if you pay the ransom?

Paying the ransom is not advised under any circumstances, but even if you do, scammers prefer payment methods like Bitcoin that are extremely difficult to track back to them. Paying provides no guarantee they will not still release or misuse your information anyway. The most prudent course is to avoid payment.

Are there any telltale signs that identify a sextortion email as a scam?

These scams tend to follow common patterns like threats of public exposure, short deadlines of 12-48 hours, demands for Bitcoin payment, claims of accessing devices or accounts, and urgency to act quickly. Greeting recipients by full name while claiming they don’t know you is also a red flag. Anything creating panic is suspect.

Who can you report sextortion scams and emails to?

You should report sextortion scams to trusted authorities like the FBI Internet Crime Complaint Center (IC3), as well as your local police department. Providing information to cybercrime units allows them to investigate, identify perpetrators, and hold them accountable to prevent further harm to others.

Conclusion

Being targeted by a sextortion scam can certainly be a distressing and unnerving experience. However, arming yourself with knowledge about the deceptive tactics and threats involved can help you respond rationally and avoid manipulation. Seek help from authorities and resources available to you if you or someone you know has unfortunately been victimized, and take measures to further secure devices and accounts. Public awareness and vigilance in reporting these incidents is key to eventually curtailing these troubling scams and protecting more innocent users in the future.

Examples of Sextortion Email Scams

Here are a few examples of common sextorion email scams:

Example 1

I am aware one of your passphrase: password. Lets get directly to point. Not a single person has compensated me to investigate about you. You do not know me and you are probably wondering why you're getting this e mail?actually, I actually installed a software on the adult vids (sex sites) site and you know what, you visited this web site to have fun (you know what I mean). When you were viewing videos, your internet browser initiated working as a Remote control Desktop that has a key logger which provided me access to your display screen and also web cam. Right after that, my software program collected your complete contacts from your Messenger, FB, and email . After that I created a double-screen video. 1st part shows the video you were viewing (you've got a good taste haha . . .), and 2nd part shows the view of your webcam, and its u. 
You do have only 2 alternatives. We are going to understand these types of choices in aspects:
1st solution is to disregard this message. In this case, I am going to send your actual video clip to just about all of your contacts and thus you can easily imagine about the disgrace you feel. Not to mention should you be in a relationship, just how it will eventually affect?
Number two choice will be to pay me $3000. We will think of it as a donation. As a consequence, I most certainly will without delay eliminate your videotape. You will keep going on your daily life like this never happened and you will not hear back again from me.
You'll make the payment through Bitcoin (if you do not know this, search for "how to buy bitcoin" in Google).

Example 2

Hi, victim.I write yоu becаusе I put а mаlware оn the wеb раge with porn whiсh yоu hаve visitеd.My virus grаbbed all your рersonal infо аnd turnеd on yоur сamеrа which сaрtured the рroсеss оf your onаnism. Just aftеr that the soft savеd yоur соntaсt list.I will dеlеte thе сompromising video and infо if you pаy me 999 USD in bitcoin. This is address fоr рaymеnt : 1K2jNTLdbHEwaALQWKMeGoKLWD67Cb6q8BI give yоu 30 hоurs aftеr you ореn my mеssаge for making the trаnsactiоn.As sоon аs yоu reаd the mеssаgе I'll see it right awаy.It is nоt necessary tо tell mе thаt you hаve sеnt money to me. This address is соnneсtеd tо yоu, my systеm will dеlete еverything automаtically aftеr trаnsfer соnfirmаtiоn.If yоu nееd 48 h just reрly оn this letter with +.Yоu сan visit thе pоlicе stаtion but nobоdy cаn hеlp yоu.If you try to dеceive mе , I'll sеe it right аway !I dont live in yоur соuntry. So they саn nоt track my lосаtiоn evеn for 9 months.Goodbyе. Dоnt fоrget аbоut thе shame and tо ignore, Yоur life can be ruined.

Example 3

?hat's up.
If you were more vigilant while playing with yourself, I wouldn't worry you. I don't think that playing with yourself is very bad, but when all colleagues, relatives and friends get video record of it- it is obviously for u.
I adjusted virus on a porn web-site which you have visited. When the victim press on a play button, device begins recording the screen and all cameras on your device starts working.
мoreover, my program makes a dedicated desktop supplied with key logger function from your device , so I could get all contacts from ya e-mail, messengers and other social networks. I've chosen this e-mail cuz It's your working address, so u should read it.
Ì think that 730 usd is pretty enough for this little false. I made a split screen vid(records from screen (u have interesting tastes ) and camera ooooooh... its awful ᾷF)
Ŝo its your choice, if u want me to erase this сompromising evidence use my ƅitсȯin wᾷllеt aďdrеss-  1JEjgJzaWAYYXsyVvU2kTTgvR9ENCAGJ35 
Ƴou have one day after opening my message, I put the special tracking pixel in it, so when you will open it I will know.If ya want me to share proofs with ya, reply on this message and I will send my creation to five contacts that I've got from ur contacts.
P.S... You can try to complain to cops, but I don't think that they can solve ur problem, the investigation will last for several months- I'm from Estonia - so I dgf LOL

Example 4

I know, password, is your pass word. You may not know me and you're most likely wondering why you are getting this e mail, correct?
In fact, I placed a malware on the adult vids (porn material) web-site and you know what, you visited this website to have fun (you know what I mean). While you were watching video clips, your internet browser initiated operating as a RDP (Remote Desktop) that has a keylogger which provided me access to your screen and also webcam. Immediately after that, my software program gathered your entire contacts from your Messenger, social networks, as well as email.
What did I do?
I made a double-screen video. 1st part shows the video you were watching (you have a good taste lmao), and 2nd part shows the recording of your webcam.
exactly what should you do?

Well, I believe, $2900 is a fair price for our little secret. You'll make the payment by Bitcoin (if you don't know this, search "how to buy bitcoin" in Google).
BTC Address: 1MQNUSnquwPM9eQgs7KtjDcQZBfaW7iVge
(It is cAsE sensitive, so copy and paste it)

Note:
You have one day in order to make the payment. (I have a specific pixel in this email message, and at this moment I know that you have read through this email message). If I do not get the BitCoins, I will definitely send out your video recording to all of your contacts including family members, coworkers, etc. However, if I do get paid, I’ll destroy the video immidiately. If you want to have evidence, reply with “Yes!” and I will certainly send out your video to your 14 contacts. This is the non-negotiable offer, so please don’t waste my personal time and yours by responding to this email message.

Example 5

Hello there!
There is nothing hidden that is not shown – you`ll see what I mean in just a moment.
Recently you were browsing a website that has pornographic content and yes, I saw you masturbating.
It is not my duty to teach you what to do or how to do it
I want you to pay me to keep this thing private
You`ll have to take care of this finance-related issue
Before you question yourself how did that happened, I`ll tell you
How did I get it?
While you were browsing porn sites yousoraya@eff.org accidentally installed the malware I used to hack the website
So consequently I`ve hacked your computer
I`ve got all your names and passwords, access to your email, messengers and other things
If you want to know my secret, I used keylogger
When I got ahold of your desktop I immediately installed keylogger on your system
There was one other program involved, I’m not gonna tell you which but it gave me access to your webcam so I recorded all the things you did in front of the computer
Guess what I filmed? You masturbating
I am sure your friends and family will be delighted to see you do your dirty business, a long time will pass before you can get clean of all this mess
Okay, here is what you should do (if you do exactly what I ask, I will delete that embarrassing video and let you be)
You must send 650 us dollars To my bitcoin wallet 1FXTXQEWFaPukDUWcMYnbgae1FpPtYNyA6
That`s it, it`s all you have to do
Don`t waste your time replying to this email I`m not gonna read it but the system will notify me when you make the payment. After you read this message, you have 24 hours to make the payment. You can reply to this email in case you need more time (48 hours max) to collect the money.
I hope you understand everything I`ve mentioned. Sorry for my English, it isn’t particularly popular in my country
P.S. I`am expecting to see the money on my account within 24 hours

Example 6

ATTN: <email address>
THIS IS NOT A JOKE - I AM DEAD SERIOUS!
Hi perv,
The last time you visited a p0rnographic website with teens,
you downloaded and installed software I developed.
My program has turned on your camera and recorded
the process of your masturbation.
My software has also downloaded all your email contact lists
and a list of your friends on Facebook.
I have both the '<name>.mp4' with your masturbation
as well as a file with all your contacts on my hard drive.
You are very perverted!
If you want me to delete both the files and keep the secret,
you must send me Bitcoin payment. I give you 72 hours for payment.
If you don't know how to send Bitcoins, visit Google.
Send 2.000 USD to this Bitcoin address immediately:
3QBCunubfjup2DCFDpUzX2exurv7wws2Nv
(copy and paste)
1 BTC = 3,580 USD right now, so send exactly 0.564369 BTC
to the address provided above.
Do not try to cheat me!
As soon as you open this Email I will know you opened it.
This Bitcoin address is linked to you only,
so I will know if you sent the correct amount.
When you pay in full, I will remove the files and deactivate my program.
If you don't send the payment, I will send your masturbation video
to ALL YOUR FRIENDS AND ASSOCIATES from your contact list I hacked.
Here are the payment details again:
Send 0.564369 BTC to this Bitcoin address:

----------------------------------------
3QBCunubfjup2DCFDpUzX2exurv7wws2Nv
----------------------------------------

You саn visit police but nobody will help you. I know what I am doing.
I don't live in your country and I know how to stay anonymous.
Don't try to deceive me - I will know it immediately - my spy ware is
recording all the websites you visit and all keys you press.
If you do - I will send this ugly recording to everyone you know,
including your family.
Don't cheat me! Don't forget the shame and if you ignore this message your
life will be ruined.
I am waiting for your Bitcoin payment.
If you need more time to buy and send 0.564369 BTC,
open your notepad and write '48h plz'.
I will consider giving you another 48 hours before I release the vid.

Anonymous Hacker

Example 7 

Good day
I have a website in the darkweb, I perform all kinds of services - basically it is destruction to property and injury. Basically, all but the shooting. Often main reasons are rejected love or competition at workplace. This week she contacted me and set me the mission of splashing acid in your face. Default practice - quickly, painfully, for life. Without too much fuss. I get receive only after finishing the order. Thus, now I propose you pay me to be inactive, I propose this to nearly all the victims. If I do not receive money from you, then my person will fulfill the mission. If you give me money, besides to my inactivity, I will provide you the info that I have about the client. After finishing the mission, I always lose the performer, so I have a selection, to get $2000 from you for info about the customer and my inaction, or to receive $ 4000 from the customer, but with a big probability of spending the performer.
I’m getting paid in Bitcoin, here’s my bitcoin address - 14PV6Scc7G8NzZnAhAK7rQApqFQWgD7fVm
The amount I indicated above.
36 hours to decide and pay.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.