“Hello Pervert” Email Is A Total Scam – What You Need To Know

Have you ever received an email accusing you of watching inappropriate videos and threatening to expose you unless you pay up? This terrifying extortion scheme, known as the “Hello Pervert” email scam, has claimed countless victims. But before you give into panic, know that this is nothing but a treacherous hoax.

This article will provide an in-depth look at the devious workings of the “Hello Pervert” scam and empower you with the knowledge needed to protect yourself. We’ll explore how the scam operates, what to do if you fall prey, and most importantly, why you should never let fear and embarrassment manipulate you into filling these criminals’ pockets.

scam 3

Overview of the Scam

The “Hello Pervert” scam starts with an email sent to the victim’s email account, often claiming to be from their own email service provider like iCloud, Gmail, Yahoo, etc.

The email will contain accusations that the sender has access to the victim’s devices and has been spying on them through their webcam. It will then claim to have embarrassing or incriminating videos of the victim, often of an adult nature, that will be sent to all of their contacts if a ransom is not paid.

Here is how a typical email scam looks:

Hello pervert, I’ve sent this message from your iCloud mail.

I want to inform you about a very bad situation for you. However, you can benefit from it, if you will act wisеly.

Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, and Windows. I guess, you already figured out where I’m getting at.

It’s been a few months since I installed it on all your devices because you were not quite choosy about what links to click on the intеrnеt. During this period, I’ve learned about all aspects of your private life, but one is of special significance to me.

I doubt you’d want your friends, family and co-workers to know about it. However, I can do it in a few clicks.

Every number in your contact list will suddenly receive these vidеоs– on WhatsApp, on Telegram, on Instagram, on Facebook, on email – everywhere. It is going to be a tsunami that will sweep away everything in its path, and first of all, your fоrmеr life.

Don’t think of yourself as an innocent victim. No one knows where your реrvеrsiоn might lead in the future, so consider this a kind of deserved рunishmеnt to stop you.

I’m some kind of God who sees everything. However, don’t panic. As we know, God is merciful and forgiving, and so do I. But my mercy is not free.

Transfer 800 USD to my Litecoin (LTC) wallet: ltc1q0sfhklq82kxps8kpx7e4el538jf6rs6h3x34ta

Once I receive confirmation of the transaction, I will permanently delete all videos compromising you, uninstаll Pegasus from all of your devices, and disappear from your life. You can be sure – my benefit is only money. Otherwise, I wouldn’t be writing to you, but destroy your life without a word in a second.

I’ll be notified when you open my email, and from that moment you have exactly 48 hours to send the money. If cryptocurrencies are unchartered waters for you, don’t worry, it’s very simple. Just google “crypto exchange” or “buy Litecoin” and then it will be no harder than buying some useless stuff on Amazon.

I strongly warn you against the following:

Do not reply to this email. I’ve sent it from your iCloud mail.
Do not contact the police. I have access to all your devices, and as soon as I find out you ran to the cops, videos will be published.
Don’t try to reset or destroy your devices. As I mentioned above: I’m monitoring all your activity, so you either agree to my terms or the vidеоs are published.
Also, don’t forget that cryptocurrencies are anonymous, so it’s impossible to identify me using the provided address.

Good luck, my perverted friend. I hope this is the last time we hear from each other.

And some friendly advice: from now on, don’t be so careless about your online security.

This is what cybersecurity experts refer to as a sextortion scam, where criminals exploit fear and embarrassment to extort money. It is an increasingly common tactic, though the “Hello Pervert” variant with its ominous tone and spyware claims makes it particularly sinister.

How the Scam Works

Here is a step-by-step look at how the “Hello Pervert” scam operates:

1. Victims Receive a Malicious Email

The scam email arrives in the victim’s inbox unsolicited. The sender address is often spoofed to appear as if it is from the victim’s own email provider or other legitimate company.

The email contains alarming claims that spyware has been installed on all the victim’s devices, allowing the sender access to their personal information and webcam.

2. Threats of Blackmail

The email goes on to claim that embarrassing videos have been recorded through the victim’s webcam, threatening to send the videos to all of the victim’s contacts unless a ransom payment is made.

The message creates a sense of urgency, giving a deadline of usually 48 hours to pay the ransom before the videos are distributed.

3. Demand for Payment

Payment is demanded in the form of untraceable cryptocurrency, such as Bitcoin. The email provides a specific cryptocurrency wallet address where the funds should be sent.

The amount of money demanded varies, but is often between $500-$1000. The criminals rely on victims paying out of fear their contacts will see the videos.

4. Reassurances That Videos Will Be Deleted

The email promises that if the ransom is paid in full by the deadline, the videos will be permanently deleted and the malware removed from the victim’s devices.

This provides incentive for victims to quickly pay the money demanded. However, in reality, there is no guarantee the criminals will hold up their end of the bargain.

What to Do If You’ve Fallen Victim to This Scam

If you receive a “Hello Pervert” extortion email, stay calm and do not pay the ransom. Here are the steps you should take:

1. Do Not Reply to the Email

Replying could confirm your email address is active, potentially exposing you to more scam emails. The criminals cannot actually monitor if you’ve opened the email.

2. Check Your Devices for Malware

Run anti-virus scans on all your devices to check for signs of malware or remote access software. The odds are very low that actual spyware has been installed.

3. Change Your Passwords

Update passwords for your email, online banking, and other sensitive accounts. Use strong unique passwords for each account. Enable two-factor authentication where possible.

4. Contact Law Enforcement

Report the scam attempt to your local authorities and the FBI’s Internet Crime Complaint Center. Provide them with details including the Bitcoin address.

5. Warn Contacts Who May Also Be Targeted

Let your friends and family know about the scam so they don’t fall victim too. Awareness is key to stopping these scams.

The important thing is not to let fear and embarrassment push you into paying the ransom. The odds of the criminals actually having compromising videos of you are extremely slim. If you’ve taken steps to secure your devices and online accounts, there is little chance of the threats being carried out.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

The Bottom Line

The “Hello Pervert” scam capitalizes on victims’ fears of being extorted with embarrassing videos to turn a profit. If you receive such an email, discretely take steps to protect yourself, but rest assured the content of the email itself is almost certainly an empty threat.

Do not let yourself be manipulated into paying ransoms that only serve to enable criminal activity. With awareness of common tactics, Internet users can recognize and report these scams without giving in to demands.

Frequently Asked Questions About the “Hello Pervert” Email Scam

What is the “Hello Pervert” email scam?

This is an online extortion scam where victims receive an email threatening to expose embarrassing or explicit videos or information to the victim’s contacts if payment is not made. The email tries to scare recipients into paying quickly.

How does the scam email threaten victims?

The email will claim the sender has access to the recipient’s devices and private information. It threatens to send compromising videos, browsing history, or other info to friends, family, coworkers.

What information do the scammers threaten to expose?

The email may threaten to expose sexually explicit videos recorded through malware on the victim’s webcam. Or it may claim to have access to porn browsing history, messages, or other private info.

How much money do the scammers ask for?

Demands are usually between $500-$2000 paid in untraceable cryptocurrency like Bitcoin or Litecoin. Scammers provide a wallet address for transferring the funds.

What malware or tactics give scammers access to information?

Emails often claim to use Pegasus spyware to access devices and information without the victim’s knowledge. But this is usually an empty threat intended to scare recipients.

How do scammers pressure victims to pay quickly?

Short payment deadlines are imposed, usually 24-48 hours. Threats create fear and urgency to comply before considering alternatives.

What should you do if you receive a “Hello Pervert” email?

Do not respond, report to authorities, run antivirus software, change account passwords, notify contacts mentioned, and report the sender’s email.

Can scammers actually expose videos or information if payment is not made?

In most cases, no. The threats are simply a tactic to extort money from victims. Scammers cannot follow through but rely on fear.

Are cryptocurrency payments like Bitcoin or Litecoin truly anonymous?

While cryptocurrency offers more anonymity, payments can sometimes still be traced by law enforcement. But this requires effort, unlike credit cards.

What happens if a victim makes the payment as demanded?

After receiving the money, scammers typically disappear and do nothing. They will not uphold promises to delete data as their only goal is to profit from the scam.

What should you do if personal information is actually exposed?

Contact authorities, explain the situation to contacts impacted, search removal of videos/info online, and consult professionals like lawyers or reputation firms if needed.

How can potential victims protect themselves from this scam?

Being cautious online, using strong passwords, avoiding suspicious links, using antivirus software, and not engaging with extortionists will help avoid this scam.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment