“We’ve Known Each Other For A While” Email Scam Explained

Emails threatening to expose private secrets, demanding Bitcoin ransoms, and claiming “I’ve known you for a while” are circulating — and they can alarm even savvy users. But behind the fear and urgency is a scam, not a real hacker watching you.

In this article you will learn:

  • What the “We’ve Known Each Other For A While” email scam is and why it works
  • Exactly how the scam operates (step by step)
  • What to do if you’ve been targeted or actually paid
  • How to protect yourself in the future

If you or someone you know ever sees such a threatening message, you’ll be armed with knowledge — and less likely to fall for it.

1 6

Scam Overview

What is the “We’ve Known Each Other For A While” email scam?

The “We’ve Known Each Other For A While” email scam is a type of sextortion / blackmail email. The scammer claims (falsely) that they have infiltrated your computer or device—accessing your webcam, microphone, browsing history, and files—and recorded embarrassing or compromising video or audio footage. Then they demand a ransom (commonly in Bitcoin or another cryptocurrency) or else they threaten to release that alleged content to your contacts, social networks, or publicly.

In your example, the email says:

“Well, hello there Do Not Reply to this email, if you got questions ? email me at: [email] Let’s get straight to the point. We’ve known each other for a while, at least I know. A few months ago, I gained access to your device, including your internet history and webcam. And I captured some footage (with audio) of you doing something you wouldn’t want anyone to see. Let’s just say it involves activities that are far from your usual routine. It’s unlikely that you’d want your family, colleagues, or contacts to see what I have. (we both know what I’m talking about), I also plan to release these data on many websites and expose the real you. At this stage, it will be impossible to undo it. You may ask how did I do that? You allowed my ransomware to your device. After that, I gained remote access to it. After infecting one device, I was able to access all other devices and your WiFi network without any issue. I’ll just lay out a condition for you now. A little payment to save your reputation is a fair deal. Transfer Exactly 1200 USD to my bіtсοіո wallet. WALLET: 1EHyhZnwNymJ8Pr6KQP8rfe2YQjjBSBTS Once the transfer is confirmed, I will remotely remove the virus from your devices, the data will be permanently deleted and you will never hear from me again. Yes, it’s a very tiny amount to pay to avoid ruining your reputation in the eyes of people who believe you to be a good person. You have 48 hours – I’ll be notified as soon as you open this email, and from then on it’s a countdown. If you’ve never dealt with сrурtοсսrrеոсу before, it’s super easy – search for “btс exchanger” “MoonPay” “ΒіtΡау”, or else you can use cash to buy using “ВТᏟ ATM” within your local area.”

This is a classic modern sextortion template. It uses fear, urgency, and intimidation to pressure the recipient into paying, even though the threat is almost always baseless.

Such extortion emails have been widely reported by cybersecurity firms, consumer protection agencies, and tech media.

Why this scam is so frightening

These emails succeed precisely because they prey on fear, shame, and urgency. A recipient may think:

  • “What if it’s true?”
  • “If this spreads, my family, friends, or colleagues will see it.”
  • “I must act quickly else I’ll be ruined.”

When a message uses threatening language, a countdown timer, or claims deep access (“I have your devices, I have your contacts, I have your webcam footage”), people may panic and pay before verifying.

Moreover, scammers often include a few real details (e.g. an old password, an email address, or data from a past leak) to make the claim feel more credible. But those details are usually unrelated to the scam—they were acquired via data breaches or “dumps” of public data and used opportunistically.

Common patterns & variants

Although content can vary, many of these emails share common traits:

  • They begin with something personal or familiar: “We’ve known each other for a while,” or “Hello my perverted friend.”
  • They threaten to publicize private content (photos, videos, audio) unless paid.
  • They claim to have installed malware or a “Trojan,” “njRAT,” or another remote access tool (RAT) to spy on you.
  • They demand cryptocurrency (especially Bitcoin) to an address they provide.
  • They impose a time limit (e.g. “48 hours,” “24 hours,” “50 hours”) to heighten panic.
  • They warn you not to respond or report, or threaten that if you do, the contents will be released immediately.
  • They may include personal details (name, email, a past password, address) to intimidate you.
  • Sometimes they attach a PDF or image (often to bypass spam filters).

Despite the confident tone and threatening complexity, these messages rarely indicate a real breach or actual video. They are designed to bluff.

Why it’s not usually real

Here’s why most security experts agree the threat is fake:

  1. No evidence of actual hacking
    The scammers do not actually have access to your webcam, microphone, or files. They make that claim to instill fear—but in nearly all cases, they possess only your email address and perhaps a password from a past leak.
  2. Spoofed sender address
    The email may appear to come from your own address (or something very close). But that is typically done via email spoofing—a technique that fakes the “From:” field. It does not mean they truly control your account.
  3. Bitcoin addresses are untraceable / dynamic
    Even if someone pays, there is no guarantee they will delete anything or leave you alone. Scammers often shift funds or never had anything. Many of the Bitcoin wallets used are empty or just intermediaries.
  4. Use of public or leaked personal data
    When scammers include a past password or personal information, it likely came from a data breach or from public sources—not from real-time hacking or remote surveillance.
  5. Scalability / mass sending
    These emails are often part of large-scale “spray and pray” campaigns, sent to thousands of addresses blindly. Most recipients get them even though the scammer has no prior relationship or knowledge about them.

In short: the threats are psychological, not technical.

Prevalence & reporting

These sextortion / extortion emails are not isolated incidents. Consumer protection agencies and scam-watch organizations have flagged them repeatedly.

  • In Australia, Scamwatch warns that criminals falsely claim to have hacked computers and demand payment or release of “compromising images” if not paid.
  • In the U.S., the FTC calls these “cryptocurrency blackmail scams” and strongly urges victims not to pay.
  • In Oregon, the state Department of Justice warned about a variant that included a photo of the person’s home (pulled from Google Maps) to intensify fear.

Despite the volume, many victims do not report the scams due to embarrassment, fear, or lack of confidence in authorities.

Thus, spreading awareness is key. If more people recognize the scam, it loses its power.

How The Scam Works

Here is a detailed breakdown of how the “We’ve Known Each Other For A While” sextortion email scam typically operates, from the scammer’s preparation to the victim’s possible reaction.

Step 1: Collecting victim data

Before sending emails, scammers often perform reconnaissance. They gather publicly available or leaked data to make their message appear more credible. This data may include:

  • Your email address (almost always required)
  • A past password (from a data breach)
  • Your full name, birthdate, or partial address (from social media, public records, or breached databases)
  • Your contacts or friend lists (if they can get them)
  • Publicly accessible images (e.g. your house from Google Maps, or your social media photos)

By incorporating one or more of these details, the email feels personalized and threatening—even though the scammers did not hack your system.

Step 2: Crafting the threatening email

Scammers then prepare an email that combines a plausible narrative, emotional pressure, and technical-sounding jargon. Key components include:

  • A greeting that suggests familiarity, such as “We’ve known each other for a while.”
  • The claim that they gained remote access to your device(s), through a Trojan, RAT, or spyware.
  • A narrative of how they captured video/audio of you in a “compromising” act.
  • Threats to expose that content (to family, friends, or publicly) unless you pay.
  • A demand for payment (often in Bitcoin).
  • A time ultimatum (e.g. “You have 48 hours” or “Once you open the email, the timer starts”).
  • A warning not to contact law enforcement or reply (or risk immediate release).

At this stage, they may attach a PDF, image, or embedded file to bypass spam filters.

Step 3: Delivering the email

The email is then sent (often en masse) to many addresses using automated campaigns or botnets. Key delivery tactics include:

  • Spoofing the “From” field to make it appear the email came from yourself or a trusted address.
  • Embedding code or pixel trackers to detect when you open the email (to start the countdown). Many emails claim “I’ll be notified as soon as you open this email.”
  • Using images or attachments to avoid spam filters.
  • Randomizing Bitcoin addresses or including unique addresses per recipient to track who pays.

When you open the email, the scammer may register that you’ve viewed it (via the tracking pixel) and activate the “countdown” threat.

Step 4: Psychological pressure

Once the email is delivered, the scam relies heavily on emotional manipulation:

  • Urgency: “You have 48 hours,” or “Countdown started”
  • Fear: “I captured footage … I will expose it”
  • Shame: The threat often involves sexual or embarrassing acts
  • Isolation: “Don’t tell anyone, don’t involve law enforcement”
  • Credibility: Use of technical terms, passwords, or personal data
  • Legal confusion: “Bitcoin is untraceable” or “I can’t be caught”

These tactics push victims to act before thinking clearly.

Step 5: Victim’s decision

From the victim’s standpoint, there are several possible reactions:

  • Panic buys: Victim pays the demanded Bitcoin in hopes of stopping the release
  • Partial compliance: Victim responds, negotiates, or asks for proof
  • Investigation: Victim tries to verify validity (e.g., checking for installed malware)
  • Reporting: Victim notifies authorities or cybersecurity professionals
  • Ignoring / deleting: Victim ignores the email, deletes, blocks sender

If a victim pays, they may or may not receive the promised deletion or silence. Some scammers double-bluff—taking payment and still threatening further exposure or demanding more.

Step 6: After payment (or non-payment)

If payment is made:

  • The scammer may not delete anything (because they never had anything real).
  • They may try to extort further payments or additional threats (“If you tell anyone, I’ll release it now”).
  • The Bitcoin is generally irreversible and hard to trace.
  • The victim receives no guarantees.

If the victim doesn’t pay:

  • The scammer often does nothing and moves on to new targets.
  • Some may send follow-up emails to re-intimidate.
  • At worst, the scammer may collect a new email address and try again.

In many cases, once the victim does not respond, the scam fades away.

A working example (based on your provided text)

Let’s map your provided email into the above model:

  1. Collected data: The scammer knows your email address, perhaps an old password or other detail.
  2. Crafted content: “We’ve known each other for a while,” they claimed they “gained access to your device, including your internet history and webcam,” and “captured footage with audio.”
  3. Payment demand: “Transfer exactly 1200 USD to my Bitcoin wallet … you have 48 hours.”
  4. Threats: “The data will be permanently deleted once payment confirmed … you will never hear from me again.”
  5. Urgency / tracking: “I’ll be notified as soon as you open this email.”
  6. Pressure: “It’s a very tiny amount to pay to avoid ruining your reputation.”

This is nearly textbook for a sextortion scam.

Why victims sometimes pay

  • Emotional vulnerability: Fear, panic, and shame cloud judgment
  • Belief in the threat: The language feels credible
  • Ignorance about Bitcoin or cybersecurity
  • Desire to avoid exposure
  • Lack of support (not knowing who to turn to)

Understanding that the scam is all about emotional leverage is key. If you strip away the fear tactics, there is usually no real threat.

What to Do If You Have Fallen Victim to This Scam

If you’ve received such an email — or worse, already paid — here is a structured, practical guide to help you respond, recover, and protect yourself.

1. Stop further contact

  • Do not reply to the scammer. Any reply confirms your email is active and may invite more threats.
  • Do not negotiate or ask for “proof” — that gives them more time or leverage.
  • Do not respond to follow-up threats.

2. Secure and assess your accounts

  • Change the password for your email and any account that uses the same or a similar password.
  • Enable two-factor authentication (2FA) wherever possible.
  • Review login activity or account security logs for any unexpected access.
  • Use a password manager to generate safe, unique passwords.

3. Scan for malware or intrusion

Even though the scam is likely bluff, it is wise to:

  • Disconnect your device from the network (if possible)
  • Run a full antivirus / anti-malware scan (using reputable software)
  • Check for suspicious processes, remote access tools, or unknown software
  • If unsure, seek a professional IT / cybersecurity specialist

If no malware is found, that further supports the idea the threat was empty.

4. Document the evidence

Preserve all evidence before deleting anything:

  • Take screenshots of the threatening email
  • Note the email headers (sender address, timestamps, IP if possible)
  • Record the Bitcoin address given by the scammer
  • Save any attachments or related files
  • Log the date and time when you first received or opened the email

This documentation may be useful if you report the case to law enforcement or cybersecurity organizations.

5. Report it

  • Report the scam to your local law enforcement or cybercrime unit
  • File a complaint with consumer protection agencies (e.g. FTC in the U.S.)
  • Report to your email provider (via their phishing / abuse system)
  • If relevant, report to national or regional cybercrime agencies
  • Consider reporting to anti-scam or anti-phishing platforms in your country

Even if payment is irrecoverable, reporting helps authorities track patterns and warn others.

6. If you paid — you still may have recourse

If you already sent the Bitcoin, there’s no guarantee of recovery because crypto is hard to trace and irreversible. But you can still:

  • Report the transaction to law enforcement (provide wallet address, timing, records)
  • Report to your national cybercrime agency or fraud bureau
  • Inform your banking institution or payment service (if any other linked accounts were breached)
  • Seek professional cyber-forensic assistance (if the amount is significant)
  • Monitor your accounts, identity, and credit for further abuse

While full recovery is unlikely, swift action can help mitigate further damage.

7. Inform your contacts (optional, sensitive decision)

If you believe your contacts are at risk of being targeted by the same scam (via your email address), you may choose to alert them discreetly. But do not broadcast your own embarrassment — limit to close friends or trusted contacts.

8. Rebuild confidence and protect yourself going forward

  • Use strong, unique passwords and a password manager
  • Always enable 2FA
  • Keep your operating system, browser, and applications up to date
  • Use reliable antivirus/antimalware software
  • Cover your webcam when not in use (a simple sticker or webcam cover)
  • Be very cautious about opening attachments or clicking links from unknown senders
  • Monitor your email for suspicious messages or login notices
  • Periodically check if your personal data appears in known breaches (e.g. via “Have I Been Pwned”)

9. Emotional support & counseling

These threats are stressful and can cause shame, anxiety, or fear. If you feel overwhelmed:

  • Talk to someone you trust
  • Consider professional counseling or therapy
  • Know that being targeted does not mean you did anything wrong

Summary checklist

Here’s a quick checklist you can follow if affected:

  1. Stop responding
  2. Change passwords & enable 2FA
  3. Scan your system for malware
  4. Document evidence
  5. Report to authorities and email provider
  6. If payment was made, report that too
  7. Protect future security
  8. Seek emotional support if needed

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

The Bottom Line

The “We’ve Known Each Other For A While” email scam is a manipulative, fear-based extortion tactic. It claims that a hacker has compromising video or audio of you and threatens exposure unless you pay in Bitcoin. In reality, most such claims are false. The scammers rely on psychological pressure, urgency, and shame to force victims to pay without verifying the threat.

If you receive such an email:

  • Don’t panic
  • Don’t respond
  • Change your passwords, enable two-factor authentication
  • Scan your device for malware
  • Document the email
  • Report it to authorities
  • Consider whether you must notify close contacts

Even if you’ve already paid, there is still value in reporting and securing your accounts. Spread awareness, so these scams lose their potency.

Frequently Asked Questions

1. What is the “We’ve Known Each Other For A While” email scam?

The “We’ve Known Each Other For A While” email scam is a sextortion or blackmail email that claims the sender has hacked your computer, accessed your webcam, and recorded compromising footage of you. The scammer threatens to release this alleged video or data to your friends, family, or colleagues unless you pay a ransom, usually in Bitcoin or another cryptocurrency.

In reality, this scam is completely fake. The scammer has not hacked your device or recorded you. They are simply trying to intimidate you into sending money through fear and embarrassment.

2. Why does the email say “We’ve known each other for a while”?

That phrase is a psychological tactic used to make the message seem personal. By claiming familiarity, the scammer tries to lower your defenses and make you think it’s someone you actually know.

This false sense of connection increases the likelihood that you’ll panic and believe the threat. In reality, the email is mass-produced and sent to thousands of random addresses. The sender does not know you at all.

3. Is the “We’ve Known Each Other For A While” email scam real or fake?

It is 100% fake in almost all reported cases. Cybersecurity researchers and law enforcement agencies worldwide confirm that these emails are not linked to any real hacking incidents.

The scammer does not have access to your webcam, files, or private data. They rely entirely on fear and deception. The technical claims they make, such as “I infected your computer with ransomware,” are fabricated.

However, it’s still wise to check your computer for malware and change your passwords to ensure your security.

4. Why does the scammer demand payment in Bitcoin?

Scammers demand Bitcoin or other cryptocurrencies because these transactions are pseudonymous and irreversible. Once you send Bitcoin, it cannot be canceled or refunded. This makes it nearly impossible for authorities to track or recover the money.

Cryptocurrency is also widely accessible, and scammers know that even people unfamiliar with it can easily find guides online about how to buy Bitcoin. That’s why the emails often include instructions like “search for ‘how to buy Bitcoin’ or ‘Bitcoin ATM near me.’”

5. How did the scammer get my email address?

Scammers typically collect email addresses from public databases or past data breaches. When large websites or services are hacked, email addresses and passwords are often leaked and later sold or shared online.

Criminals then use this information to send bulk scams like the “We’ve Known Each Other For A While” email. They may even include your old password in the message to make it seem like they truly accessed your account.

You can check whether your data has been leaked by visiting HaveIBeenPwned.com or other data breach monitoring tools.

6. How can I tell if the email is a scam?

There are several clear signs that indicate the email is fraudulent:

  • It demands Bitcoin or cryptocurrency for silence.
  • It claims to have hacked your webcam or captured private footage.
  • It gives you a strict deadline (usually 24–72 hours).
  • It threatens to expose you to your contacts or family.
  • It uses scare tactics and emotional language.
  • It warns you not to reply or tell anyone.
  • It may appear to come from your own address (a spoofing trick).

If you see any of these signs, it’s almost certainly a sextortion scam.

7. What should I do if I receive the “We’ve Known Each Other For A While” email?

Follow these steps immediately:

  1. Do not respond. Never reply to the scammer or make payment.
  2. Do not click links or open attachments. They may contain malware.
  3. Change your passwords. Update your email, social media, and banking passwords.
  4. Enable two-factor authentication (2FA). This adds an extra layer of protection.
  5. Run a malware scan. Use trusted antivirus software to check your system.
  6. Report the email. Forward it to your country’s cybercrime agency or to your email provider’s abuse department.
  7. Delete the message. Once documented and reported, remove it to reduce stress.

8. Should I pay the ransom to stop the hacker from releasing the video?

No. Never pay.

The entire email is a scam. Paying will not stop future emails or threats. Since the scammer does not have any actual video or data, there is nothing to delete or “erase.”

In fact, paying the ransom may make you a target for further scams, as criminals often share lists of victims who have previously paid.

9. Can the scammer really access my webcam or files?

In almost every case, no. The scammer’s claims of controlling your webcam or stealing files are lies. They simply want to scare you.

If you’re worried, you can:

  • Check your device for unknown applications or remote access tools.
  • Review camera permissions and see which apps are allowed to use it.
  • Run a full antivirus and anti-malware scan.

As long as your system is secure and you haven’t downloaded suspicious files, you have nothing to fear.

10. Why does the email appear to come from my own address?

That’s called email spoofing. Scammers manipulate the “From” field in the email header so it appears as if the message came from your own account.

This trick is designed to make you believe your email has been hacked. In reality, the sender address can be faked easily using simple software tools. It does not mean your account is compromised.

To confirm, log into your email account directly (not through links in the message) and check for unusual login activity.

11. What if I already paid the scammer?

If you already sent Bitcoin or another cryptocurrency, there is usually no way to recover it. However, you should still take immediate action:

  1. Report the incident to your local cybercrime agency or law enforcement. Provide the Bitcoin wallet address and all details of the transaction.
  2. Preserve evidence — save the email, wallet address, payment records, and screenshots.
  3. Strengthen your accounts by updating passwords and enabling 2FA.
  4. Monitor your information for any further scams.
  5. Seek emotional support if you feel anxious or ashamed — remember, victims of scams are not to blame.

Authorities use such reports to track wallet addresses and build cases against cybercriminals, even if your money cannot be recovered.

12. Can I get in trouble for receiving or not paying the email?

No. You did nothing wrong. Receiving the scam email does not make you guilty of anything. In fact, you’re a victim of attempted extortion.

Do not let the language of the email make you feel guilty or fearful. These scammers rely on psychological pressure to make victims feel cornered. Deleting and reporting the message is the correct and legal response.

13. How common is this scam?

Extremely common. The “We’ve Known Each Other For A While” email scam has circulated worldwide since at least 2018 and continues to evolve.

Cybersecurity reports show millions of such emails are sent every year using automated systems. According to the FBI’s Internet Crime Complaint Center (IC3), sextortion scams caused more than $50 million in reported losses in 2023, and many cases go unreported due to embarrassment or fear.

The sheer volume of these messages proves that they are mass scams, not targeted attacks.


14. What should I do to protect myself from similar scams

Here are key steps to keep yourself safe:

  • Use strong, unique passwords for each account.
  • Enable two-factor authentication wherever available.
  • Keep your software and antivirus up to date.
  • Avoid clicking on links or opening attachments in suspicious emails.
  • Regularly check if your data appears in any known data breaches.
  • Educate yourself and others about online scams.
  • Consider using spam filters or advanced email protection tools.

Proactive digital hygiene dramatically reduces your risk of falling for future scams.

15. Is there any organization where I can report this scam?

Yes, several agencies handle reports of email extortion scams depending on your country:

  • United States: Report to the FBI Internet Crime Complaint Center (IC3.gov) or the Federal Trade Commission (FTC.gov).
  • United Kingdom: Forward the scam email to report@phishing.gov.uk (National Cyber Security Centre).
  • Australia: Report to Scamwatch.gov.au or the Australian Cyber Security Centre (cyber.gov.au).
  • Canada: File a report with the Canadian Anti-Fraud Centre (antifraudcentre-centreantifraude.ca).
  • European Union: Contact your local police or the Europol Internet Crime Unit.

Reporting helps authorities identify trends, issue warnings, and track criminal networks.

You may also like

Share This Article
Thomas is an expert at uncovering scams and providing in-depth reporting on cyber threats and online fraud. As an editor, he is dedicated to keeping readers informed on the latest developments in cybersecurity and tech.
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *