“I Have A Situation To Report That’s Quite Out of the Norm” Email Scam Explained

Imagine opening your email inbox one morning to find a chilling message claiming to be from a mysterious hacker. This shadowy figure says your device is compromised, your camera watched, and your private files stolen. Unless you pay a ransom in Bitcoin quickly, your life will be ruined when embarrassing videos and data get leaked online.

As terrifying as this sounds, it’s the hook used in a new wave of viral extortion scams. No, it’s not actually the NSA spying on you. But this con is scarily effective at overriding common sense with raw fear. In this comprehensive guide, I’ll reveal how these “I Have A Situation To Report That’s Quite Out of the Norm” scams really work, and protect you from becoming just another victim.

Scam Bitcoin Email 1

Overview of the Scam

The “I Have A Situation To Report That’s Quite Out of the Norm” email scam is a sophisticated form of mass extortion that emerged around 2020, though many variants have since arisen. This concerning scam starts by claiming the recipient’s device was hacked via malware, allowing the scammer complete access to personal files, webcam footage, screenshots, passwords, contacts, and more.

Alarming threats are then made to share embarrassing, illegal, or reputation-damaging videos or information unless a ransom is paid in Bitcoin within 48 hours. The emails overload recipients with fear, uncertainty, and doubt through chilling technical descriptions and warnings that actions are “untraceable”.

In reality, these are blanket scam emails being sent en masse without any actual hacking or access to devices. The threats are completely fabricated, designed to scare a percentage of recipients into paying the ransom out of desperation. Even a low 1% response rate can net huge profits with massive email batches.

By demanding payment in Bitcoin, a pseudonymous cryptocurrency, the scammers hope to anonymously collect ransoms while avoiding tracing or prosecution. No actual extortion materials exist, but the technically sophisticated language aims to convince readers the scammer holds all the cards.

Common tactics include:

  • Claiming total access to the recipient’s operating system via viruses, keyloggers, or remote control malware
  • Stating they have access to microphones, webcams, and screen recording capabilities
  • Asserting the ability to monitor all online activity, social media, emails, files, etc.
  • Making threats to release embarrassing or illegal videos edited from footage collected
  • Warning that all contacts, friends, and family will be sent the videos
  • Giving 48 hour ultimatums before releasing or selling footage
  • Instructing users how to purchase untraceable Bitcoin
  • Promising deletion of data and removal of malware after payment
  • Using intimidating language about the scammer’s technical prowess

These social engineering techniques aim to override critical thinking with raw emotion. Rather than actual cybercriminals, these scams originate from fraudulent actors in parts of the world where cybercrime enforcement is lax.

Here is how the “I Have A Situation To Report That’s Quite Out of the Norm” email scam looks:

– It has come to pass that on this date, I orchestrated a breach into your device’s operating system, granting myself total access to your account. My observation of your online endeavors has been ongoing and unwavering.
I’ve gained control over your devices through a virus, with particular access to the display and camera. All your digital information, inclusive of emails and social networks, has been duplicated on my end.

Considering what could be done with this data, an idea struck me: why not create a split-screen video where, on one side, you’re engaged in masturbate, while on the other, you’re browsing the web? This kind of content is becoming incredibly sought-after!
What came out of it all was beyond my wildest dreams.
I can dispatch this video to your entire contact list with a single click through email, social media, and messaging platforms, and potentially reveal your personal communication tools.

If you don’t want me to proceed, send 1200$ (USD) to my Bitcoin wallet.
My BTC address:
bc1qdquclgx52l2lz0sw8jczee9znq52pnur6wafky

If you lack experience in funding a Bitcoin wallet, feel free to turn to Google. It’s not complicated at all.
As soon as the funds are received, I’ll notice it immediately and remove all the unwanted material. After that, we’ll part ways. I also commit to deactivating and removing all malware from your devices. You can trust me, I stand by my word. It’s a fair deal, especially considering the time I’ve invested in tracking your profile and traffic

You have exactly 48 hours from the time you open this letter to make the payment.
After this period, if I don’t receive the specified amount from you, I’ll distribute access to your accounts, visited sites, personal data, and edited videos to everyone, without any warning.

Remember.I do not make mistakes, I do not advise you to joke with me, I have many opportunities.
There’s no use reporting me because they won’t be able to locate me. Formatting the drive or destroying your device won’t help because I already possess your data.
Any responses to this email will not be reviewed or seen, as it is not a personal account and does not receive replies.

Best of luck, and don’t take it too personally!
P.S. For your future reference, adhere to internet safety rules and steer clear of questionable sites.

By sending hundreds of thousands of these emails and even obtaining a 1% response rate, the scammers can net $10,000+ at little cost. Victims are often too scared or embarrassed to report the scam after paying. And law enforcement tracing of Bitcoin transactions to foreign locales is very challenging.

Some real world examples of the scam have demanded $1,900 or 0.25 Bitcoin after claiming to have accessed “very sensitive material” through the recipient’s anti-virus software. Others ask for $3,000 via Bitcoin after making legal threats about supposed illicit videos.

While evolving technology makes webcams and malware hacking possible, these specific emails are merely playing on those fears. The scammers cast a wide net rather than actually targeting individuals. But the technically sophisticated language can seem quite alarming and real on first glance.

By understanding the mass template nature and economic motivations behind this scam campaign, recipients can logically avoid becoming victimized through fear-based social engineering.

How the Scam Email Works Step-by-Step

Here is a step-by-step explanation of how the “I Have A Situation To Report That’s Quite Out of the Norm” scam operates:

1. Scammers Obtain Email Lists

The scammers typically purchase or otherwise obtain massive lists of email addresses. They look for large batches of valid, active accounts from sources like:

  • Data breaches
  • Malware on other sites
  • Botnets
  • Public email directories
  • Social media profiles

They cast a wide net, rather than specifically targeting individuals. The more addresses the scammers have, the more potential victims.

2. Emails are Crafted with False Claims

Using the emails acquired, the scammers will draft template messages making alarming (but false) claims. Common examples include:

  • Claiming recipient’s device was hacked via malware or virus
  • Stating they have access to your webcam/microphone
  • Asserting they’ve downloaded personal data like emails, contacts, social media, etc.
  • Making threats to share embarrassing videos or screenshots
  • Giving ultimatums to pay within 48 hours or else material will be released

These emails are designed to immediately trigger fear and panic in recipients. By making such intrusive threats, the hope is that victims will be too distressed to think rationally.

3. Bitcoin Ransom Demanded

A key aspect of the scam is demanding payment in Bitcoin, a cryptocurrency. The emails give a BTC wallet address and instruct victims on how to purchase Bitcoin through online exchanges.

Requiring Bitcoin makes tracing and recovering funds very difficult. It also adds to the scammer’s credibility, as Bitcoin is sometimes used for actual cybercrimes. In reality, they are just trying to anonymously extort money.

The ransom demanded is often $800 – $2000. High enough to seem serious, but low enough to potentially convince scared recipients to pay.

4. Scammers Sit Back and Wait

After sending tens or hundreds of thousands of emails, the scammers simply wait to see what percentage of recipients take the bait. Even a low response rate of 1% or less can be highly profitable if done at massive scale.

No actual hacking or data theft occurs. The scammers never possessed any compromising material in the first place. Their threats are completely fabricated.

5. Scammers Collect Ransoms

If any victims pay the Bitcoin ransom, the scammers collect it in their crypto wallets. They will typically try to cover their tracks by laundering or tumbling the Bitcoin through multiple wallets.

Since no real extortion material exists, the scammers usually cut off contact after payment. There is no actual data to delete or damaging action to stop – just empty threats and ransom collection.

6. Scammers Disappear and Move On

After running a scam campaign for a period of time, the scammers eventually send their last round of emails and collect final ransoms. They withdraw funds from Bitcoin wallets into clean money.

Eventually, the email accounts used are simply abandoned. The scammers disappear, lay low for a while, and then set up shop again with new infrastructure. Rinse and repeat with fresh email batches.

Red Flag Signs of the Scam

While the emails are written to sound intimidating, there are several red flags that indicate the “I Have A Situation To Report That’s Quite Out of the Norm” scam:

  • Requests payment in Bitcoin or other cryptocurrency specifically
  • Threatens actions within unrealistic timeframes like 48 hours
  • Uses fake technical jargon about hacking that makes little sense
  • Claims the ability to avoid tracing or prosecution for their “crimes”
  • No actual evidence presented of having your personal data
  • Email originates from free webmail account, not real company

Additionally, the scam emails are rarely personalized with the recipient’s name or other specific details. They follow templated scripts sent en masse.

What to Do If You Receive This Scam Email

If this suspicious email lands in your inbox, here are important steps to take:

  1. Remain calm – This is a fear-based scam. Take deep breaths and proceed rationally.
  2. Do not respond – Any reply will confirm your email as active. The scammers may send more threats or target you specifically if you engage.
  3. Check email headers – The full email headers (not just the subject line) can reveal spoofed accounts, suspicious origins, etc. Headers alone can prove it’s a scam.
  4. Scan devices for malware – Run security scans to check for viruses or spyware just in case. These scammers do not really hack devices, but extra caution never hurts.
  5. Change passwords – Update passwords on your email, financial accounts, and social media. Use strong unique passwords for each and turn on two-factor authentication where possible.
  6. Report the email – Forward the scam email to your email provider’s abuse department and to the Anti-Phishing Working Group (https://apwg.org/). This helps curb the scam.
  7. Ignore further threats – The scammers may send follow-up emails with more threats if you don’t pay. Continue ignoring these completely.
  8. Watch for unauthorized charges – Monitor financial statements closely for any fraudulent charges just in case. Again, highly unlikely the scammers actually accessed anything.
  9. Contact authorities – You may file an internet crime report with the FBI (https://www.ic3.gov/) or contact local law enforcement. This builds an evidence trail against the scammers.

The most important takeaway is never to panic or pay the ransom demand. The threats are empty and your information remains secure. If you pay, the scammers gain credibility and funds to run more scam campaigns.

Recovering if You Already Paid the Ransom

In some cases, victims may unfortunately pay the ransom only to realize later they’ve been scammed. Here are steps to start recovering:

  • Contact the Bitcoin exchange – If you just paid recently, quickly contact the exchange you purchased Bitcoin from to request blocking the transaction if possible. Act immediately, as the window is short.
  • Get help tracing the Bitcoin – Services like Chainalysis and CipherTrace can sometimes trace Bitcoin wallets and transactions. Hire their services to try following the money trail.
  • Change all account passwords – If you did pay, assume your email security could still be compromised. Change all passwords as a precaution.
  • Cancel credit cards – Contact your bank to cancel cards that may have been used to purchase the Bitcoin as a protective measure. Monitor accounts closely for any other suspicious charges.
  • Report to authorities – File reports with the FBI and local law enforcement explaining you paid a ransom to scammers but have now realized it was a scam. Provide Bitcoin wallet details etc. This starts an investigation on record.
  • Be proactive against future scams – Sign up for scam education and monitoring services. Be extra cautious going forward. Learn the red flags of new scams so you will not be victimized again.
  • Seek victim support – Seek emotional support from victim advocacy groups to help cope. Don’t blame yourself – these scammers are experts at manipulation. Focus positive energy on preventing

How to Avoid Falling Victim to This Scam

While these scams can seem quite convincing, there are preventative measures you can take to avoid being victimized:

Use a Secure Email Provider

Opt for a secure, privacy-focused email provider that offers features like encryption and two-factor authentication. Avoid standard email platforms that scammers target more frequently in spam campaigns. Protect your inbox.

Beware of Phishing Links

Look out for any emails containing links or attachments to avoid malware or phishing schemes designed to steal passwords. Never click links from unsolicited emails. Verify the true domain before visiting.

Keep Software Up-to-Date

Maintain up-to-date operating systems, software, antivirus tools, and firewalls on all devices. The latest security patches help block against viruses and hacking vulnerabilities. Avoid outdated systems.

Use Strong Passwords

Create unique, complex passwords for all accounts and enable two-factor authentication where available. Password reuse and weak passwords make hacking easier. Use a password manager app to bolster security.

Limit Personal Details Online

Be wary of oversharing personal details online that could aid social engineering attempts or identity theft. Lock down social media privacy settings and think twice before posting your address, phone number, etc.

Secure Webcams

Place tape or shutters over any webcams when not in use. This blocks the potential of real webcam access versus just empty threats. Disable webcam access in device settings when possible.

Monitor Accounts Closely

Check bank and credit card statements routinely for any suspicious charges or activity. Set up transaction alerts. Watch for signs of actual identity theft or account misuse beyond just extortion emails.

Only Use Reputable Exchanges

Only purchase Bitcoin and other cryptocurrency through well-known, trustworthy exchanges. Check reviews and complaints to avoid shady platforms. Do not make payments directly to unknown Bitcoin addresses.

Verify Payment Requests

Always independently confirm any payment request, investment opportunity, warning, threat, or other surprising email first through other channels before taking action. Follow up directly with the company via phone, chat, etc.

Seek Scam Education

Read guides, reports, and resources to stay on top of the latest online extortion and phishing scam tactics. Knowledge and vigilance are key to avoiding new schemes as they emerge.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions About the “I Have a Situation” Scam Email

1. How do I know if an “I have a situation” email is a scam?

There are several red flags that indicate the email is a scam:

  • It asks for payment in Bitcoin or gift cards specifically
  • Makes threats and demands quick payment within 48 hours
  • Uses technical jargon about hacking that sounds suspicious
  • Claims they can’t be traced or prosecuted
  • Doesn’t provide any actual proof of stolen data
  • Originates from a free webmail instead of real company

Additionally, the email is rarely personalized. The scammers send a templated script en masse, not targeted messages.

2. What information do the scammers actually have about me?

The scammers do not actually have any personal information, files, or access to your device. These are blind scam emails being sent randomly with no real hacking involved. All threats are fabricated to scare recipients into paying.

3. Could my computer really be infected with malware?

While possible in theory, it is highly unlikely in the case of these scam emails. The claims are made purely to overwhelm recipients with fear. That said, it never hurts to run a malware scan just in case. But don’t let fear overrule logic.

4. What happens if I don’t pay the ransom?

Nothing will happen if you don’t pay. Since the scammers have no real access or files to begin with, their threats are empty. Ignore any further emails demanding payment – scammers may harass victims who responds.

5. Should I report the scammers to authorities?

Yes, you can report the scam email to agencies like the FBI Internet Crime Complaint Center (IC3) and Anti-Phishing Working Group. This helps authorities track the scams. Send the full scam email as evidence.

6. How do the scammers get my email address?

Scammers buy or steal email lists in bulk from data breaches, malware infected sites, botnets, public directories, and social media profiles. They cast a wide net sending these threats randomly.

7. How can I remove malware from my device?

If your device was infected, run a full system scan with updated antivirus software to remove malware. Also change all account passwords, enable two-factor authentication, and monitor accounts closely for fraudulent activity just in case.

8. Can the Bitcoin payment be traced?

Payments may be hard, but not impossible, to trace depending on how well scammers cover their tracks. Hiring a blockchain analysis firm can potentially trace the money flow to identify the scammers.

9. How can I recover money lost to this scam?

If you paid the ransom, immediately contact your Bitcoin exchange and ask to block the transaction if possible. You may be able to hire blockchain analysis firms to trace the Bitcoin flow and identify the scammers. File reports with authorities detailing the incident.

10. How do I avoid becoming a victim?

Use unique strong passwords, keep software updated, secure webcams, monitor accounts closely, avoid phishing scams that steal passwords, and learn how to identify scam emails before falling victim. Education is your best defense.

The Bottom Line

The “I Have A Situation To Report That’s Quite Out of the Norm” email scam can seem quite alarming and real at first glance. However, awareness of the typical structure and red flags can help recipients avoid being duped. This scam follows a mass template of fabricated threats and ransom demands sent randomly to scare victims into paying Bitcoin.

With so many data breaches occurring lately, it is understandable to have heightened concern about privacy violations. But do not let fear or embarrassment override logical thinking. Simply delete these scam emails and run security checks as precautions. Avoid any temptation to engage or pay the ransom.

By following security best practices, these scammers have no real leverage over you or your devices. With extra vigilance and scam education, we can work to shut down these criminal extortion campaigns for good. Don’t allow these bad actors to profit off innocent victims any longer.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.