Your heart drops as you read the subject line:
“I Was Planning to Say Hello.”
With a mix of curiosity and dread, you open the email. The message inside immediately plunges your stomach into free fall.
A unknown sender claims to have infiltrated your computer and seized control of your webcam. They say they’ve caught you in embarrassingly compromising positions. Videos that could destroy your life.
And now they are threatening to expose the footage to everyone you know unless you pay a hefty ransom in untraceable Bitcoin within 48 hours.
You feel violated. Exposed. Hunted. With your reputation hanging by a thread, paying up seems like the only option. But is everything as sinister as it seems?
This email scam has been terorrizing countless recipients, leveraging fear and blackmail for profit. In this comprehensive guide, we’ll break down exactly how it ensnares victims step-by-step, arming you with knowledge to protect yourself and fight back.
Here’s everything you need to know about the increasingly common “I Was Planning to Say Hello” extortion scheme and how to beat it at its own psychological game.
Overview of the “I Was Planning to Say Hello” Email Scam
The “I Was Planning to Say Hello” email scam is an example of a sophisticated spear phishing attack targeting victims in order to extort money from them. This deceptive scam typically starts with an email that appears relatively harmless at first glance, before taking an ominous turn by making shocking claims and threats intended to elicit fear and urgency in the recipient.
The criminals carrying out this scam are experts in social engineering and manipulation, using carefully crafted language and psychological tactics to exploit vulnerable victims. This scam email has been crafted to instill embarrassment, anxiety and desperation in recipients in order to coerce them into complying with exorbitant ransom demands.
Here is how the “I Was Planning to Say Hello” email looks:
I was planning to say hello, but now I think greetings are unnecessary.
Firstly, I already know you and all your loved ones very well.
Secondly, the occasion for which I’m writing to you is not the happiest one for a friendly greeting.You’ve heard that the Internet is a dangerous place, infested with malicious links and hackers like me?
Of course, you’ve heard, but what’s the point in it if you are so dismissive of your internet security and don’t care what websites you visit?
Times have changed. You read about AI, judging by your browser history, and still didn’t understand anything?Technologies have stepped far forward, and now hackers like me use artificial intelligence.
Thanks to it, I can get not only access to your webcam and record your fun with highly controversial video
(I recorded it also, but now that’s not the point), but also to all your devices and not only yours.
And I saved a special sauce for this dish. I went further and sent malicious links to all your contacts from your account.Yes, someone was smarter and realized that this was a trap and you were hacked, but believe me,
about 70% of your contact list (and these are your friends, colleagues, and family) bought into my scam.
They have as many skeletons in their closet as you do. Some turn out to be hidden homosexuals…I have accumulated and analyzed a huge amount of compromising data on you and those with whom you communicate.
Very soon I’ll start a crossfire – everyone will receive the full history of correspondence
(and there are enough of “sensitive moments”) and recordings from the other contact’s webcam.
I can go further and put all these files, as well as the recorded fun of you and your hacked contacts with “hardcore videos” into the public domain.You can imagine, it will be a real sensation!
And everyone will understand where it came from – from you.
For all your contacts and, you will be enemy number one. Even your relatives will take a long time to forgive you and forget such a family shame…It will be the real end of the world. The only difference is that there will be not four horsemen of the apocalypse, but only one – (=
But there is no such thing as a completely black stripe without any white dots.
Luckily for you, in my case the “Three M Rule” comes into play – Money, Money and Money again.I’m not interested in your worthless life, I’m interested in people from whom I can profit.
And today you are one of them.That’s why: Transfer $1390 in Bitcoin to: 1PPJpvSPbbMwbESJZXGS8VtKiFQkmm7DvK …within 48 hours!
You don’t know how to use cryptocurrencies? Use Google, everything is simple.
Once payment is received, I will delete all information associated with you and you will never hear from me again.
Remember one thing: my crypto address is anonymous, and I generated this letter in your mailbox and sent it to you.
You can call the cops, do whatever you want – they won’t find me, my demands won’t change, but you’ll just waste precious time.The clock is ticking. Tick tock, a minute out of 48 hours has passed right now. An hour will soon pass, and in two days your old life will pass forever.
Either goodbye forever (if I get my payment), or hello to a brave new world in which there will be no place for you.Hasta La Vista, Baby!
P.S. Almost forgot. Finally learn what incognito tabs, two-factor authentication, and the TOR browser are, for God’s sake!
In the email, the sender claims to have compromised the recipient’s computer and other devices without their knowledge, giving them extensive access to their personal information, browsing history, video recordings, and contact lists. The email asserts that the sender has recorded videos of the recipient in compromising positions and situations of an adult nature by illegally accessing their webcam.
To further the deception, the email claims that through the use of artificial intelligence and sophisticated hacking techniques, the sender has also sent malware-laden links to all of the recipient’s contacts, fooling many of them into installing viruses that provided access to their own private files and communications.
The litany of intrusions and privacy violations described in the email are designed to overwhelm the recipient with an impending sense of catastrophe and destroy their sense of security. The scenario described is meant to convince the victim that their personal and professional reputation will be utterly ruined unless they immediately comply with the demands.
This is further reinforced by threats of releasing embarrassing videos, nude photos, recordings, correspondence history and other sensitive data to all of the recipient’s friends, family members, colleagues and business associates. The sender emphasizes total social and professional annihilation, intended to scare the recipient into paying without thinking rationally.
Of course, providing an untraceable Bitcoin wallet address as the desired method of payment is a key red flag, as real hackers would be unlikely to reveal their cryptocurrency wallets so easily. But victims in an panicked, desperate state of mind may overlook such signs in their haste to meet demands before the threatened deadline.
The various ploys and manipulation tactics used in the “I Was Planning to Say Hello” scam email highlight the cold, cunning psychology behind many cyber extortion schemes. Rather than relying solely on technical means, these scams also leverage social engineering, fear mongering, and intimidation to exploit human vulnerabilities on a psychological level.
The scammers deliberately cultivate feelings of violation, anxiety, embarrassment and isolation in recipients to bypass critical thinking and rationale. By pushing victims into an emotional state of desperation and panic, bad decision-making is induced. The email is structured to rob recipients of hope or perspective, railroading them into paying up as the only perceived way out.
This scam stands as a prime example of just how effectively even a simple email can be weaponized for extortion purposes when crafted with malicious mastery. The pathos-driven narrative depicts an inescapable downward spiral, whereas in reality the supposed hacking and compromising of accounts is nothing more than a fabrication. But the emotional distress elicited can cause victims to abandon reason in favor of stopping the feeling of catastrophe.
By understanding the psychological manipulation involved in scams like this, individuals can equip themselves to recognize red flags and remain level-headed in the face of such criminal trickery. Technical security measures are not always enough – one must be on guard against phishing emails designed not just to infiltrate devices, but infiltrate minds. With awareness and vigilance, such unethical exploits of human psyche can be defeated.
How the “I Was Planning to Say Hello” Scam Works
The “I Was Planning to Say Hello” scam is meticulously designed to leverage social engineering techniques and psychological pressure tactics to extort money from victims. This step-by-step breakdown reveals what’s happening behind the scenes at each phase to perpetrate an advanced phishing attack:
1. Obtaining Target Email Addresses
The scammers first acquire large databases of target email addresses through data breaches, malware attacks, dark web shops and hacking forums. Compiled lists of usernames, passwords and emails provide fertile hunting ground. Names and emails can also be scraped from public directories, social media sites and domain WHOIS records.
Casting a wide initial net boosts chances of success. Spoofing the sender email address to look legitimate also increases open rates. Personalization with names and details builds trust.
2. Crafting Manipulative Email Content
The email content is carefully constructed to manipulate emotions and exploit vulnerabilities. The narrative of compromised accounts and data breaches is intended to shock, while cultivating feelings of violation and vulnerability.
Threats are designed to create catastrophic thinking, while urgent demands pressure quick payments. Fear, uncertainty, jealousy, embarrassment and desperation are deliberately triggered. Syntax, semantics and psychology converge manipulatively.
3. Executing the Mass Email Campaign
The scam emails are sent en masse to the compiled victim email list through botnets and spam tools. Additional spear phishing filters may segment targets by demographics and interests most likely to yield payments, based on dark web market research.
Subject lines and preview text are optimized for urgency and high open rates. The sender domains and display names are spoofed to increase perceived legitimacy.
4. Recipients Open Emails and Engage Content
Curious, concerned or confused email recipients open the scam message in their inbox. Personal details create a false sense of legitimacy. The alarming content grabs attention and elicits distressing emotions before logic can be applied.
5. Leveraging Fear and Urgency
The harrowing threat narrative takes hold, creating acute emotional duress. Fight, flight or freeze responses are triggered. Critical thinking is bypassed in favor of self-preservation. The imminent consequences seize focus, overshadowing objective analysis.
6. Overwhelming Victims with Threats
Feelings of violation, shame and catastrophe overload the recipient’s psyche. Too many threats at once short circuit reason. The walls feel like they’re closing in as imagined ruin looms from all sides, creating a willingness to do anything to make it stop.
7. Ransom Payment Demanded
With the victim reeling, ransom demands are issued along with a short deadline meant to eliminate any chance of level headedness returning. The threat to privacy and normalcy continues pressing down. A path to make it all go away appears.
8. Scare Tactics Used to Prevent Reporting
Any instinct to report the scam is preempted by warnings that authorities won’t be able to trace them. Technobabble about encryption and anonymity sounds convincing to panicked ears. Fears of further life ruination are stoked.
9. Fake Hackers Stay Hidden
No real hacking group would reveal their cryptocurrency wallets so easily. But victims in survival mode overlook this, willing to grab any lifeline back to normalcy. The criminals remain safely hidden behind spoofed emails and anonymous crypto accounts.
10. Victims Pay Ransom
In a final act of desperation and compliance, victims wire over funds to the Bitcoin wallet, rationalizing it as the only way to escape doomsday. With no hack actually executed, the scammers simply pocket the crypto, leaving the target drained and violated.
11. Criminals Disappear and Cover Tracks
After securing the ransom payments, the scammers wipe traces, abandon email addresses, and go dark without releasing any actual compromising material, since it never existed. Victims are left to pick up the pieces.
By recognizing these psychological manipulation stages, individuals can detect and defuse “I Was Planning to Say Hello” phishing scams at the very start, rather than be steered down the path to financial and emotional ruin.
Signs the Email is a Scam
While the threats and claims in this email can seem intimidating and real, there are a number of indicators that reveal it is fraudulent:
- Errors – The emails often contain spelling, grammar and formatting errors. Genuine emails from a hacking group would be unlikely to contain such mistakes.
- No actual proof – The email does not provide any actual evidence of having compromising footage or having hacked your devices.
- Technobabble – Vague claims about using “AI” and “hacking tools” are not proof of anything. This technobabble is designed to sound sophisticated.
- No custom details – Aside from including your name or email address, the content is not customized or demonstrate any real knowledge of you.
- Bluffing – The claims are simply designed to scare, and it is highly unlikely the sender actually has access to anything compromising.
- Bitcoin – Demanding untraceable Bitcoin is a red flag, as real hacking groups would not reveal their cryptocurrency wallets so easily.
- Threats – Genuine hacking groups would not warn their victims about reporting them to authorities or threaten them so directly.
When scrutinized logically, it becomes clear this scam email does not have any teeth behind its sinister facade. However, the fear tactics used can still trick unsuspecting recipients.
What to Do If You Have Fallen Victim to This Scam
If you have unfortunately already fallen prey to the “I Was Planning to Say Hello” scam and paid the ransom demand, don’t panic. Here are the steps you should take right away:
- Contact your bank – If you paid by bank transfer, contact your bank immediately and flag it as fraudulent. Depending on how fast you act, it may be possible to stop or reverse the transaction.
- Report to authorities – File reports with the FBI Internet Crime Complaint Center and your local authorities detailing the scam. Provide all details of the scam email, Bitcoin wallet, and any payments.
- Enhance security – Change all passwords immediately using unique, complex passwords for each account. Enable two-factor authentication wherever possible. Scan devices for malware or viruses.
- Watch for further scams – The cyber criminals may attempt further contact to get more money out of you now they know you paid once. Do not respond to any new emails.
- Contact email provider – Report the scam/phishing email to your email provider e.g. Google or Microsoft and mark it as spam. They can use this to strengthen filters.
- Monitor accounts – Keep a close eye on all your financial accounts and credit reports for any signs of misuse of your information over the next few months.
- Seek help – Speak to your employer if the scammers had access to any work devices or accounts containing proprietary information. Engage computer forensics help if required.
- Don’t blame yourself – Scammers are experts in psychological manipulation. Do not blame yourself for falling for their underhanded techniques. You are the victim here.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
How to Protect Yourself from the Scam
Here are some key tips to safeguard yourself from falling victim to the “I Was Planning to Say Hello” sextortion scam in the first place:
- Never pay – No matter how threatening the email seems, never pay the ransom demand. This will likely lead to further extortion attempts.
- Secure accounts – Use strong, unique passwords for all accounts, and set up two-factor authentication where possible. This makes it much harder for scammers to hack in.
- Beware suspicious links/attachments – Do not click on links or attachments from unknown senders, as these could contain malware.
- Update software – Ensure your devices, operating systems and antivirus software are updated and patched against the latest threats. Turn on automatic updates where possible.
- Back up data – Maintain an offline backup of your most important personal data and files in case of ransomware attacks. This removes leverage from scammers.
- Be skeptical – Approach any unsolicited email demanding money with skepticism, no matter how real or threatening it appears. Verify the claims being made rather than blindly panicking.
- Use an email spam filter – Effective email spam filters from providers like Google or Microsoft can automatically detect and block phishing emails before they reach you.
- Delete scam email – Do not reply to or forward scam emails, simply delete them. Reporting them as spam/phishing helps improve filters.
Staying vigilant and keeping your cybersecurity tight makes you a much harder target for predatory scammers carrying out campaigns like the “I Was Planning to Say Hello” extortion scam.
Frequently Asked Questions About the “I Was Planning to Say Hello” Scam
1. What is the “I Was Planning to Say Hello” email scam?
The “I Was Planning to Say Hello” scam is a type of sextortion phishing attack where cybercriminals send an email claiming to have hacked the recipient’s computer and gained access to compromising and embarrassing videos/information about them. The email threatens to release the sensitive material to the victim’s contacts if a ransom is not paid.
2. What are the key characteristics of the scam email?
- Claims of hacking accounts/devices to obtain inappropriate videos and information
- Threats to send adult content and other embarrassing data to all contacts
- Demand for ransom payment in Bitcoin within 24-48 hours
- Warnings not to report the scam to authorities
- Intimidation tactics and threats of life ruination
3. What is the typical ransom amount demanded?
The ransom demands are usually in the range of $500 to $2000 worth of Bitcoin. The criminals want to extort as much as possible while still making the amount seem plausibly affordable enough for victims to pay.
4. How do the criminals carry out this scam?
They use botnets to blast out emails en masse to purchased lists of credentials leaked from data breaches. Well-crafted social engineering tricks recipients into panicking and paying the ransom. No actual hacking takes place – it is all a bluff.
5. What persuasive tactics does the scam email use?
- Personalization to build false familiarity
- Shocking claims to overwhelm critical thinking
- Threats tailored to instill fear and embarrassment
- False authority implying expertise in hacking/AI
- Short deadline to eliminate careful deliberation
6. Why Bitcoin ransom payment?
Bitcoin allows anonymous, fast payments that are difficult to trace or reverse, enabling the scammers to quickly collect ransom funds without being tracked or identified. Fiat currency has more oversight.
7. Are the threats in the email real?
No, this is an empty extortion threat. The scammers have not actually hacked the recipient or obtained any compromising videos or data about them. The threats are a bluff designed to scare victims into paying.
8. Should I pay the ransom?
No, you should never pay the ransom demands. This will likely result in more extortion attempts. The scammers do not actually possess anything to release about you. Paying encourages more scamming.
9. What should I do if I get the scam email?
Do not respond to the email. Report it as phishing/spam to your email provider. Scan your device for malware just in case. Change account passwords and enable two-factor authentication as a precaution.
10. What if I already paid the ransom?
Contact your bank to try stopping the transaction and report to authorities. Enhance account security, monitor financial statements, and watch out for further extortion attempts. Do not pay any additional demands.
Staying vigilant against phishing and proactively protecting accounts/data makes one a harder target for “I Was Planning to Say Hello” extortion scammers seeking to manipulate and defraud victims.
The Bottom Line
The “I Was Planning to Say Hello” email scam uses devious psychological tactics to extort money from recipients by threatening to expose embarrassing or damaging material. However, scrutiny reveals that the sinister claims of compromised accounts, videos, and hacking tools are simply a bluff designed to trick victims into paying Bitcoin ransoms.
If you have received this scam email, stay calm and do not pay the demands. The email does not demonstrate any actual proof of hacking or access to sensitive information. Look out for red flags like poor grammar, technobabble, Bitcoin payment, and intimidation tactics.
It is highly unlikely the scammers actually possess anything incriminating on you. Paying the ransom simply makes you vulnerable to further extortion attempts. You can protect yourself by enhancing your online security, never paying ransoms, and using email spam filters.
If you have fallen victim already, act quickly to report the scam to authorities and financial institutions before the trail goes cold. Place security freezes on your credit if needed to lock down your accounts. Be vigilant for any potential misuse of your information by scammers.
Email scams can be incredibly convincing, preying on fear and embarrassment. But awareness of common techniques like used in the “I Was Planning to Say Hello” scam helps guard against being manipulated into panicking. Keep your cybersecurity tight and avoid paying any ransoms, no matter how intimidating the threats may seem.
With vigilance and proactive security habits, individuals can equip themselves to repel these hunting scammers seeking to profit off fear. Do not let them leverage sensitive content that may not even exist in the first place. Stand strong in the face of cyber extortion.