The Truth Behind the “Have You Heard About Pegasus?” Email Scam

A new form of digital blackmail has been terrorizing unsuspecting email users – the “Have you heard of Pegasus?” sextortion scam. This fraudulent email greets recipients as “pervert” and claims the sender has accessed all their devices using potent spyware.

The lengthy, graphic message insists the hacker has recordings of the recipient’s most private and potentially embarrassing online activities. They threaten to release the supposed videos publicly unless a ransom is paid immediately.

This compelling article will unravel exactly how this scam works, providing readers with the knowledge needed to protect themselves. Key topics include:

  • An In-Depth Overview of the Scam
  • Step-by-Step Explanation of the Scam Methodology
  • What to Do If You’ve Fallen Victim
  • Key Takeaways and Preventative Measures

Let’s explore the twisted deception underlying this scam, and the simple actions you can take to stay safe. The threats are fabricated, but the peace of mind is real.

BTC Scam

Overview of the “Have You Heard of Pegasus?” Scam

The “Have you heard of Pegasus?” email scam typically begins with an alarming message addressed to the recipient as “pervert.” The sender introduces themselves as if they’ve been spying on the recipient’s online activity for months.

The email claims they’ve installed powerful malware called Pegasus on all the target’s devices which allowed them to remotely monitor everything – emails, messages, webcam footage, and more.

It goes on to describe, in disturbingly graphic detail, supposed videos the hacker captured depicting the recipient engaging in illegal and deviant online behavior. The sender threatens to release the videos to the victim’s entire contact list – family, friends, co-workers – unless a ransom is paid immediately.

In reality, the threats are completely fabricated. The scammer does not possess any inappropriate videos nor have they hacked any devices. There is no malware or spyware. The vivid details are fiction, crafted intentionally to frighten and intimidate recipients into complying.

Here is how the “Have you heard of Pegasus?” sextortion scam looks:

Hello pervert,
I want to inform you about a very bad situation for you. However, you can benefit from it, if you will act wisely.
Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, and Windows. I guess, you already figured out where I’m getting at.
It’s been a few months since I installed it on all your devices because you were not quite choosy about what links to click on the internet. During this period, I’ve learned about all aspects of your private life, but one is of special significance to me.
I’ve recorded many videos of you jerking off to highly controversial porn videos. Given that the “questionable” genre is almost always the same, I can conclude that you have sick perversion.
I doubt you’d want your friends, family and co-workers to know about it. However, I can do it in a few clicks.
Every number in your contact book will suddenly receive these videos – on WhatsApp, on Telegram, on Skype, on email – everywhere. It is going to be a tsunami that will sweep away everything in its path, and first of all, your former life.
Don’t think of yourself as an innocent victim. No one knows where your perversion might lead in the future, so consider this a kind of deserved punishment to stop you.
Better late than never.
I’m some kind of God who sees everything. However, don’t panic. As we know, God is merciful and forgiving, and so do I. But my mercy is not free.

Transfer $1220 USD to my bitcoin wallet: 1JVMTup4zuS1JMGXAYYRgvyr2PUmNnY6g2

Once I receive confirmation of the transaction, I will permanently delete all videos compromising you, uninstall Pegasus from all of your devices, and disappear from your life. You can be sure – my benefit is only money. Otherwise, I wouldn’t be writing to you, but destroy your life without a word in a second.

I’ll be notified when you open my email, and from that moment you have exactly 48 hours to send the money. If cryptocurrencies are unchartered waters for you, don’t worry, it’s very simple. Just google “crypto exchange” and then it will be no harder than buying some useless stuff on Amazon.

I strongly warn you against the following:
) Do not reply to this email. I sent it from a temp email so I am untraceable.
) Do not contact the police. I have access to all your devices, and as soon as I find out you ran to the cops, videos will be published.
) Don’t try to reset or destroy your devices.
As I mentioned above: I’m monitoring all your activity, so you either agree to my terms or the videos are published.

Also, don’t forget that cryptocurrencies are anonymous, so it’s impossible to identify me using the provided address.
Good luck, my perverted friend. I hope this is the last time we hear from each other.

And some friendly advice: from now on, don’t be so careless about your online security.”

This scam email began circulating widely around 2020, though Pegasus spyware itself has been around since 2016. Pegasus is real – a powerful cyber weapon sold only to government agencies and nation states. But this has no relation to the “Have you heard of Pegasus” email scam utilizing fear of that technology.

The email often includes one of the recipient’s passwords in the body which lends credence to the hacking claims. In truth, these passwords originate from leaked third-party data breaches, purchased by scammers to add personalization and urgency.

The threats prey on human fear of public embarrassment and exposure. The recipient feels violated and at risk, panicking into rash decisions to make the supposed videos disappear before their life is ruined. But it’s all an elaborate bluff. No videos exist, and paying the ransom only funds more scam attempts.

How the “Have you heard of Pegasus” Scam Works

The “Have you heard of Pegasus?” devious extortion scam can be broken down into several critical stages that result in recipients unwittingly paying ransom for non-existent embarrassing videos. Understanding each step can help recipients recognize red flags before they are deceived.

1. Scammers Purchase Massive Lists of Leaked Login Credentials

The starting point for this scam is amassing huge databases of real emails, usernames and passwords that have been compromised in past third-party data breaches. Billions of leaked credentials are available for sale on black market sites and dark web forums. Scammers purchase these credentials in bulk for pennies apiece.

Having real emails and passwords linked to those accounts allows scammers to make their subsequent threats seem more credible and personalized to each recipient. This kicks off their scam on solid footing.

2. Malware Claims Crafted About Spying Through Webcams and Devices

Using the leaked credentials, scammers send out mass customized emails to recipients claiming the senders have installed potent spyware called Pegasus on all the targets’ devices.

The emails describe, in alarming detail, how this malware allegedly granted access to the recipient’s webcam, messages, and online accounts, allowing them to monitor all activity remotely. These vivid descriptions aim to unsettle and frighten recipients.

Of course, these claims about hacking devices and watching through webcams are complete fabrications designed to enable the next phase of threats and demands. No such access was ever gained.

3. Threats Made About Releasing Fabricated Videos

Building on the fake narrative of compromised devices, scammers threaten that they’ve recorded videos of recipients engaged in disturbing or illegal online acts through this access. The supposed behavior described is designed to horrify the recipient.

The email threatens immediate release of the fictional embarrassing videos to the recipient’s entire contact list – family, friends, colleagues – unless a ransom demand is paid right away.

No such videos exist, but this threat of public humiliation and reputational destruction is crafted to provoke panic and desperation.

4. Demand for Untraceable Ransom Payment Made

The scam email specifies payment must be made urgently with untraceable cryptocurrency, usually Bitcoin, sent to the scammer’s provided wallet address. It emphasizes that if the ransom is not paid within a short timeframe (48 hours), the fictional videos will be released.

These details are designed to frighten recipients into skipping over logical scrutiny of the situation and quickly complying with demands. But no evidence exists for any of the claims.

5. Disappear After Payment with No Videos Provided

For recipients scared into paying the ransom, the scammer simply disappears after receiving the funds. Of course, there were never any embarrassing videos to delete. The victims realize too late it was an empty threat meant to trick payment.

Sadly, the pseudonymous nature of cryptocurrency makes it nearly impossible to recoup lost ransom funds. Meanwhile, the scammers move on to repeat the process at scale to earn more fraudulent income.

Gaining awareness of how these scammers operate at each step is key to recognizing red flags early and protecting yourself. If something seems suspicious, take time to scrutinize before reacting. Don’t become another victim.

What to Do If You’ve Fallen Victim

If you received this scam email, especially if you already paid the ransom, here are the vital next steps:

  1. Don’t panic. As alarming as this feels, you are not alone in being deceived – this scam has ensnared people worldwide. Take a breath and proceed calmly with damage control.
  2. Immediately cease all communication with the scammer. Do not reply to anything further or comply with any additional demands for money. Cut off contact completely.
  3. Notify your bank/financial institutions if you paid via credit card, debit card, bank transfer etc. Report any unauthorized transactions so they can attempt to block and reverse the payments. Act quickly, timing is critical.
  4. Carefully monitor all your online accounts for suspicious activity. Change passwords on every account, opting for long, complex unique passwords for each one. Enable two-factor authentication everywhere possible for additional security.
  5. Report the scam attempt to authorities at ic3.gov and reportfraud.ftc.gov to aid prevention efforts. Provide any details you have on the scammer’s wallet ID, email addresses etc. The more data accumulated, the better chance of apprehending attackers.
  6. Seek mental health services if you are experiencing significant anxiety, depression or trauma related to being deceived. Counseling can help process feelings of violation or shame. You are the victim here – do not self-blame.
  7. Know that the scammer does not actually possess any embarrassing or compromising videos of you. The content described was pure fiction, designed to manipulate you. Do not let false threats continue controlling you.
  8. Use your experience to educate others on how to identify warning signs of this scam. Your vigilance now will help protect more potential victims. We must stand united against these tactics of intimidation and move forward.

The most difficult step is getting past the initial feelings of violation or embarrassment, but know there is light on the other side. You have bright days ahead. We must stand united against these scams, and your vigilance now protects others.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions About the “Have You Heard of Pegasus” Sextortion Scam Email

Wondering if you may have been targeted by the “Have you heard of Pegasus” cyber extortion scam? Get answers to the most commonly asked questions surrounding this malicious scam email below.

What is the “Have you heard of Pegasus” sextortion email scam?

This is a deceptive scam email that claims the sender hacked the recipient’s devices using malware called Pegasus to spy on their online activity. The email threatens to release supposed embarrassing videos unless ransom is paid in Bitcoin urgently. In reality, it is a complete scam designed to extort money through false threats.

How does the Pegasus extortion email scam operate?

  1. Criminals obtain leaked credentials like emails and passwords from data breaches.
  2. They send emails falsely claiming to have spied through webcams etc. using Pegasus.
  3. The email threatens to share fabricated explicit videos unless ransom is paid in Bitcoin.
  4. Victims pay out of fear, but receive no such videos in return.

What specific threats are made in the Pegasus email?

The email claims the sender used malware to access all the recipient’s devices and record inappropriate or illegal videos through the webcam. It threatens to send these fictional videos publicly to the recipient’s contacts unless ransom is paid within 48 hours.

Does paying the ransom make the supposed videos go away?

No, there are no such videos. The threats are a complete fabrication aimed to scare recipients into paying ransom. Even if paid, the scammers disappear without providing anything in return. Do not pay.

I already paid the ransom – what steps should I take?

Immediately cease contact with the scammer. Alert relevant financial institutions about any unauthorized payments. Monitor accounts closely for further suspicious activity and reset all passwords. Report the scam attempt to authorities. Seek counseling to cope with associated stress.

How can I identify this as a scam email?

Be skeptical of any message demanding urgent payment to avoid alleged damaging material being released. Look for typos, illogical threats that don’t make sense, and high pressure demands Acting solely out of fear enables scams – carefully scrutinize any suspicions.

How can I protect myself from this scam?

Use a unique complex password for every account and enable two-factor authentication where possible. Exercise caution with links and attachments. Report any scam attempts you identify to help authorities. Seek support if you feel you are being unfairly targeted or extorted online.

Why does this scam remain so common?

The ability to email threats anonymously to millions of addresses makes this scam highly efficient for criminals. Even a low success rate can generate substantial illicit profits. But public awareness of their tactics is the key to guarding against these scams and shutting them down.

Key Takeaways

The “Have you heard of Pegasus” email scam preys specifically on human anxieties around privacy violations and public shame. While personal in content, the threats are actually generic templates, dispersed en masse with no truth behind them.

If you receive this scam:

  • Do NOT correspond, open attachments, or pay the ransom. The threats are empty but can turn into real extortion if engaged.
  • ALERT authorities about the scam to help prevent spread. Report at ic3.gov and reportfraud.ftc.gov.
  • RESET online account passwords immediately, opting for unique complex passwords for each. Enable two-factor authentication.
  • BREATHE and speak with someone you trust. You are not alone. Millions receive scam emails daily.
  • No embarrassing videos of you exist. The vivid details are fiction, customized to frighten and manipulate you.

Stay vigilant, but do not let fear push you into rash decisions. You have all the power to stop these scams by arming yourself with knowledge and using caution. We will dismantle these schemes together, one aware person at a time.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment