The “Boa tarde, amigo ingénuo” email scam is a concerning new threat targeting Portuguese speakers. This coercive scheme aims to extort money from victims by threatening to publicly expose private images and information.
Overview of the ‘Boa tarde, amigo ingénuo’ Sextortion Scam
This scam email is a Portuguese-language variant of a wider global extortion campaign. The emails claim the sender has compromising images and/or videos of the recipient, along with access to their device.
The sender threatens to share this sensitive material unless paid a ransom in Bitcoin within 48 hours. The email states they work for a Russian hacking group and have been monitoring the recipient’s online activity.
Origins and Prevalence
This scam email template first emerged in mid-late 2022, though sextortion scams have existed for years. Many report receiving the “Boa tarde, amigo ingénuo” email in Brazil, though it may target Portuguese speakers worldwide.
By preying on victims’ fears of public shaming, these schemes have defrauded individuals out of millions globally. Their prevalence continues to grow, as does their sophistication.
Tactics and Implications
The email subject line is often vague, such as “Notice” or “Attention Required,” to avoid raising suspicions. The text contains shocking claims intended to create fear and urgency.
Though often untrue, the threats can deeply unsettle victims. The potential public exposure of intimate material leverages psychological coercion for financial gain.
This scheme represents a concerning new evolution of cyber extortion. While early sextortion scams were often unsophisticated, current variants leverage more advanced social engineering and distribution tactics.
Here is how the scam email look:
Boa tarde, amigo ingénuo.
Infelizmente, há um antes e depois da tua vida após esta mensagem.
Contudo, a boa notícia é que vais aprender muito, tal como o que podes ou não podes fazer na Internet,
como cuidar da tua segurança online corretamente, ou como não deixar uma pegada digital.
É possível que já tenhas ouvido falar de grupos de hackers russos como o Cozy Bear, o Killnet, e outros. Bem, nós trabalhamos para eles.
Odeio dizê-lo, mas agora estás envolvido na nossa trapalhada. Para além das nossas atividades de hacking,
também estamos à procura de várias contas online suspeitas com as quais podemos fazer dinheiro. Talvez estejas a começar a compreender como te encontrámos.
Todas as pessoas têm as suas próprias preferências sexuais.
No entanto, o que estás a tentar encontrar na Internet não encaixa nem nos mais soltos standards de moralidade.
Agora, temos as tuas pesquisas e imagens de webcam enquanto estás a dar prazer a ti próprio.
A seu tempo, serão tornadas públicas. Mas não te preocupes, também temos boas notícias.
Dinheiro é o nosso único interesse.
Existem pessoas estranhas mesmo entre nós, mas elas trazem-nos tanto lucro que acabamos por ignorar os seus desvios morais.
Neste caso, TU deves trazer-nos lucro. Por R$ 5000, eu e tu podemos esquecer-nos um do outro para sempre.
Tens 48 horas, a partir do momento em que abriste este email, para transferir estes R$ 5000.
Seremos notificados assim que leres esta mensagem.
Este é o endereço da carteira de Bitcoin que deves usar para o pagamento: 1M69iG8DsFwLuSyu18CJGJm8LGUgH6wGF8
A contagem decrescente começou, por isso não nos deixes à espera.
Caso contrário, todos os teus amigos e familiares receberão uma cópia dos teus registos, incluindo o histórico de pesquisa, vídeos webcam, e até mensagens pessoais.
Não envies esta mensagem a ninguém, nem mesmo à polícia.
Se o fizeres, a informação que temos acerca de ti será automaticamente partilhada.
Estamos a monitorizar tudo o que fazes.
Não respondas a esta mensagem. Foi enviada a partir de uma conta de email descartável, sem possibilidade de resposta, e completamente indetetável.
Se nunca usaste crypto antes, é bastante simples: basta fazer uma pesquisa no Google.
Este é o final da nossa mensagem. Como se diz, esperamos uma colaboração frutífera no futuro. Caso contrário, isto ainda vai acabar mal para ti.
Adeus, e esperemos que esta seja a nossa última interação.
P.S. No futuro, lembra-te de que a Internet não é uma espécie de Velho Oeste em que podes fazer tudo o que desejas.
Na verdade, é um arrepiante conjunto de tubarões famintos à procura de pessoas irresponsáveis como tu.
How the ‘Boa tarde, amigo ingénuo’ Scam Works
The criminals behind this scam are masters of manipulation. By understanding their tactics, we can recognize and resist their deceit. Here is how the scam unfold in 5 stages:
1. Recipients Receive the Malicious Email
The initial email arrives in the target’s inbox unprompted. Most report receiving it out of the blue, with no prior contact from the sender. The message may end up in the spam folder due to its suspicious nature.
The sender name and address are usually random strings of letters and numbers. This makes the email untraceable, a key tactic of cybercriminals.
2. The Email Makes Bold Claims and Threats
The message presents shocking, often false, claims about hacking the recipient’s device and accessing illicit content. This creates feelings of violation and anxiety, which the scammer leverages.
Threats follow to share the supposedly compromising material with the target’s contacts if payment isn’t received promptly. The email often states they are being monitored to heighten unease.
3. A Ransom Demand is Made
A Bitcoin wallet address is provided for the ransom payment, along with a deadline of usually 24-48 hours. The amount demanded varies across scam variants, from hundreds to thousands of dollars.
Bitcoin is requested due to its pseudonymous nature. Payments are difficult to reverse or trace, ideal for criminal activity. The short deadline spurs urgency to pay.
4. The Majority Don’t Pay the Ransom
Security experts overwhelmingly advise against paying sextortion scammers. There is no guarantee your information won’t still be misused. Payment also enables and encourages more scam attempts.
Most victims don’t pay, though a concerning minority do. In many cases, the scammers’ threats are false with no compromising material in their possession. Paying is counterproductive.
5. Scammers Disappear After the Deadline
The vast majority of sextortion scams prove hollow, with no actual hacked content. Once the payment deadline passes, the criminals typically move on having extracted whatever funds they could.
For unwitting victims, the threats in these emails can cause serious distress. But understanding their false nature is key to overcoming fears of extortion and refusing payment.
What to Do if You’re Targeted by This Scam
Discovering you’re the target of an online extortion scheme is alarming. But there are steps you can take to protect yourself and report these criminal imposters:
- Don’t panic – Easier said than done, but succumbing to fear is what scammers want. Take a breath and carefully consider your response.
- Don’t pay the ransom – This only enables cybercrime while offering no guarantees. Chances are your data is safe.
- Secure your accounts – Change passwords just in case. Enable two-factor authentication wherever possible.
- Collect evidence – Keep a copy of the scam email with sender details. Screenshot any communication.
- Contact authorities – Report the scam attempt to local law enforcement and cybercrime divisions.
- Warn contacts – Advise friends and family in case the scammers target them next. Share awareness.
- Watch for repeat attempts – Scammers may send follow-up threats if no payment received. Maintain vigilance.
- Seek support if distressed – Talk to someone you trust and don’t hesitate to contact a counselor if severely impacted.
Scammers bank on their victims’ shame and fear. But by responding calmly and strategically, we can disrupt their ploys and even help bring them to justice.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
Frequently Asked Questions about the “Boa tarde, amigo ingénuo” Sextortion Scam
1. What is the “Boa tarde, amigo ingénuo” sextortion scam?
The “Boa tarde, amigo ingénuo” scam is a extortion email targeting Portuguese speakers. It threatens to share supposedly compromising photos, videos or other information publicly if the recipient doesn’t pay a ransom in Bitcoin. The email claims the sender hacked the victim’s device to obtain illicit material. In reality, it’s just a deceitful ploy to coerce funds.
2. How do criminals carry out this scam?
The scammers send an unsolicited email containing threats to expose intimate content. The message states they work for a Russian hacking group and have been spying on the recipient’s online activity. A Bitcoin wallet is provided to pay the ransom within 24-48 hours. The email leverages fear and urgency to trick victims into immediate payment.
3. Is there really compromising material they can share?
In most cases, no. The claims of hacking someone’s device and accessing illicit content are bogus. The scammers are counting on victims assuming the worst and paying up out of fear. There have been rare cases where actual compromised data was used, but this is not typical.
4. How much money do they try to extort with this scam?
The ransom demands vary across scam variants, ranging from a few hundred to thousands of dollars. The amounts are sized to extract maximum funds while still seeming somewhat plausible. The scammers want to wring out whatever they can from each target.
5. Why do they want payment in Bitcoin?
Bitcoin allows semi-anonymous transfers ideal for criminal activity like this. Payments can’t be reversed, letting scammers easily cash out. Standard bank transfers could allow tracing the recipient, so cryptocurrency helps them avoid identification.
6. What should I do if I receive the “Boa tarde, amigo ingénuo” email?
First, don’t panic. The scammers want you anxious and compliant. Don’t pay anything – this will likely just lead to further extortion attempts. Secure your online accounts by changing passwords and enabling two-factor authentication. Save the scam email as evidence and report the incident to local authorities.
7. Could this really ruin my reputation if I don’t pay?
It’s unlikely. In most cases, the scammers’ threats are completely empty with nothing to expose. Even in rare cases with actual compromised content, giving in to extortionists’ demands is risky and unwise. Avoid allowing fear or embarrassment to cloud your judgment if targeted.
8. Who is behind these types of sextortion scams?
Experts believe various global cybercriminal groups are behind the recent rise in sextortion scams. They operate online across international borders, making them difficult to trace. The scams’ sophistication continues to grow, but so does public awareness and resilience against them.
9. How can I protect myself from this scam?
Be wary of any unsolicited, threatening emails demanding immediate payment. Secure your devices and accounts by using strong, unique passwords and multi-factor authentication everywhere possible. Maintain vigilant security habits online and never send compromising content electronically.
10. What should I do if a loved one is targeted by this scam?
Provide non-judgmental support if a friend or family member is impacted. Advise them not to act rashly out of fear by paying the scammers. Help them report the incident to authorities and reassure them these criminals prey on many vulnerable victims. With compassion and resilience, we diminish their power.
The Bottom Line
The “Boa tarde, amigo ingénuo” sextortion scam is a deceitful scheme attempting to monetize victims’ anxieties. Psychological coercion underpins threats to share intimate material if payment isn’t received.
However, awareness of the scam’s workings makes one far less vulnerable. These criminals rely on fear and urgency to profit. But by keeping calm, securing accounts and refusing payment, their power is diminished.
Online extortion using sensitive personal data will likely persist as a cybercrime tactic. But an informed public aware of the schemes can play a vital role in preventing harm and mitigating damage.
Stay vigilant about cyber scams by learning the warning signs. Seek help if targeted, but avoid enabling extortionists by meeting their demands. With caution, knowledge and collective action, we can stand resilient against malicious threats.