A new form of digital blackmail has been terrorizing unsuspecting email users – the “Have you heard of Pegasus?” sextortion scam. This fraudulent email greets recipients as “pervert” and claims the sender has accessed all their devices using potent spyware.
The lengthy, graphic message insists the hacker has recordings of the recipient’s most private and potentially embarrassing online activities. They threaten to release the supposed videos publicly unless a ransom is paid immediately.
This compelling article will unravel exactly how this scam works, providing readers with the knowledge needed to protect themselves. Key topics include:
- An In-Depth Overview of the Scam
- Step-by-Step Explanation of the Scam Methodology
- What to Do If You’ve Fallen Victim
- Key Takeaways and Preventative Measures
Let’s explore the twisted deception underlying this scam, and the simple actions you can take to stay safe. The threats are fabricated, but the peace of mind is real.
Overview of the “Have You Heard of Pegasus?” Scam
The “Have you heard of Pegasus?” email scam typically begins with an alarming message addressed to the recipient as “pervert.” The sender introduces themselves as if they’ve been spying on the recipient’s online activity for months.
The email claims they’ve installed powerful malware called Pegasus on all the target’s devices which allowed them to remotely monitor everything – emails, messages, webcam footage, and more.
It goes on to describe, in disturbingly graphic detail, supposed videos the hacker captured depicting the recipient engaging in illegal and deviant online behavior. The sender threatens to release the videos to the victim’s entire contact list – family, friends, co-workers – unless a ransom is paid immediately.
In reality, the threats are completely fabricated. The scammer does not possess any inappropriate videos nor have they hacked any devices. There is no malware or spyware. The vivid details are fiction, crafted intentionally to frighten and intimidate recipients into complying.
Here is how the “Have you heard of Pegasus?” sextortion scam looks:
Hello pervert,
I want to inform you about a very bad situation for you. However, you can benefit from it, if you will act wisely.
Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, and Windows. I guess, you already figured out where I’m getting at.
It’s been a few months since I installed it on all your devices because you were not quite choosy about what links to click on the internet. During this period, I’ve learned about all aspects of your private life, but one is of special significance to me.
I’ve recorded many videos of you jerking off to highly controversial porn videos. Given that the “questionable” genre is almost always the same, I can conclude that you have sick perversion.
I doubt you’d want your friends, family and co-workers to know about it. However, I can do it in a few clicks.
Every number in your contact book will suddenly receive these videos – on WhatsApp, on Telegram, on Skype, on email – everywhere. It is going to be a tsunami that will sweep away everything in its path, and first of all, your former life.
Don’t think of yourself as an innocent victim. No one knows where your perversion might lead in the future, so consider this a kind of deserved punishment to stop you.
Better late than never.
I’m some kind of God who sees everything. However, don’t panic. As we know, God is merciful and forgiving, and so do I. But my mercy is not free.Transfer $1220 USD to my bitcoin wallet: 1JVMTup4zuS1JMGXAYYRgvyr2PUmNnY6g2
Once I receive confirmation of the transaction, I will permanently delete all videos compromising you, uninstall Pegasus from all of your devices, and disappear from your life. You can be sure – my benefit is only money. Otherwise, I wouldn’t be writing to you, but destroy your life without a word in a second.
I’ll be notified when you open my email, and from that moment you have exactly 48 hours to send the money. If cryptocurrencies are unchartered waters for you, don’t worry, it’s very simple. Just google “crypto exchange” and then it will be no harder than buying some useless stuff on Amazon.
I strongly warn you against the following:
) Do not reply to this email. I sent it from a temp email so I am untraceable.
) Do not contact the police. I have access to all your devices, and as soon as I find out you ran to the cops, videos will be published.
) Don’t try to reset or destroy your devices.
As I mentioned above: I’m monitoring all your activity, so you either agree to my terms or the videos are published.Also, don’t forget that cryptocurrencies are anonymous, so it’s impossible to identify me using the provided address.
Good luck, my perverted friend. I hope this is the last time we hear from each other.And some friendly advice: from now on, don’t be so careless about your online security.”
This scam email began circulating widely around 2020, though Pegasus spyware itself has been around since 2016. Pegasus is real – a powerful cyber weapon sold only to government agencies and nation states. But this has no relation to the “Have you heard of Pegasus” email scam utilizing fear of that technology.
The email often includes one of the recipient’s passwords in the body which lends credence to the hacking claims. In truth, these passwords originate from leaked third-party data breaches, purchased by scammers to add personalization and urgency.
The threats prey on human fear of public embarrassment and exposure. The recipient feels violated and at risk, panicking into rash decisions to make the supposed videos disappear before their life is ruined. But it’s all an elaborate bluff. No videos exist, and paying the ransom only funds more scam attempts.
How the “Have you heard of Pegasus” Scam Works
The “Have you heard of Pegasus?” devious extortion scam can be broken down into several critical stages that result in recipients unwittingly paying ransom for non-existent embarrassing videos. Understanding each step can help recipients recognize red flags before they are deceived.
1. Scammers Purchase Massive Lists of Leaked Login Credentials
The starting point for this scam is amassing huge databases of real emails, usernames and passwords that have been compromised in past third-party data breaches. Billions of leaked credentials are available for sale on black market sites and dark web forums. Scammers purchase these credentials in bulk for pennies apiece.
Having real emails and passwords linked to those accounts allows scammers to make their subsequent threats seem more credible and personalized to each recipient. This kicks off their scam on solid footing.
2. Malware Claims Crafted About Spying Through Webcams and Devices
Using the leaked credentials, scammers send out mass customized emails to recipients claiming the senders have installed potent spyware called Pegasus on all the targets’ devices.
The emails describe, in alarming detail, how this malware allegedly granted access to the recipient’s webcam, messages, and online accounts, allowing them to monitor all activity remotely. These vivid descriptions aim to unsettle and frighten recipients.
Of course, these claims about hacking devices and watching through webcams are complete fabrications designed to enable the next phase of threats and demands. No such access was ever gained.
3. Threats Made About Releasing Fabricated Videos
Building on the fake narrative of compromised devices, scammers threaten that they’ve recorded videos of recipients engaged in disturbing or illegal online acts through this access. The supposed behavior described is designed to horrify the recipient.
The email threatens immediate release of the fictional embarrassing videos to the recipient’s entire contact list – family, friends, colleagues – unless a ransom demand is paid right away.
No such videos exist, but this threat of public humiliation and reputational destruction is crafted to provoke panic and desperation.
4. Demand for Untraceable Ransom Payment Made
The scam email specifies payment must be made urgently with untraceable cryptocurrency, usually Bitcoin, sent to the scammer’s provided wallet address. It emphasizes that if the ransom is not paid within a short timeframe (48 hours), the fictional videos will be released.
These details are designed to frighten recipients into skipping over logical scrutiny of the situation and quickly complying with demands. But no evidence exists for any of the claims.
5. Disappear After Payment with No Videos Provided
For recipients scared into paying the ransom, the scammer simply disappears after receiving the funds. Of course, there were never any embarrassing videos to delete. The victims realize too late it was an empty threat meant to trick payment.
Sadly, the pseudonymous nature of cryptocurrency makes it nearly impossible to recoup lost ransom funds. Meanwhile, the scammers move on to repeat the process at scale to earn more fraudulent income.
Gaining awareness of how these scammers operate at each step is key to recognizing red flags early and protecting yourself. If something seems suspicious, take time to scrutinize before reacting. Don’t become another victim.
What to Do If You’ve Fallen Victim
If you received this scam email, especially if you already paid the ransom, here are the vital next steps:
- Don’t panic. As alarming as this feels, you are not alone in being deceived – this scam has ensnared people worldwide. Take a breath and proceed calmly with damage control.
- Immediately cease all communication with the scammer. Do not reply to anything further or comply with any additional demands for money. Cut off contact completely.
- Notify your bank/financial institutions if you paid via credit card, debit card, bank transfer etc. Report any unauthorized transactions so they can attempt to block and reverse the payments. Act quickly, timing is critical.
- Carefully monitor all your online accounts for suspicious activity. Change passwords on every account, opting for long, complex unique passwords for each one. Enable two-factor authentication everywhere possible for additional security.
- Report the scam attempt to authorities at ic3.gov and reportfraud.ftc.gov to aid prevention efforts. Provide any details you have on the scammer’s wallet ID, email addresses etc. The more data accumulated, the better chance of apprehending attackers.
- Seek mental health services if you are experiencing significant anxiety, depression or trauma related to being deceived. Counseling can help process feelings of violation or shame. You are the victim here – do not self-blame.
- Know that the scammer does not actually possess any embarrassing or compromising videos of you. The content described was pure fiction, designed to manipulate you. Do not let false threats continue controlling you.
- Use your experience to educate others on how to identify warning signs of this scam. Your vigilance now will help protect more potential victims. We must stand united against these tactics of intimidation and move forward.
The most difficult step is getting past the initial feelings of violation or embarrassment, but know there is light on the other side. You have bright days ahead. We must stand united against these scams, and your vigilance now protects others.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
Frequently Asked Questions About the “Have You Heard of Pegasus” Sextortion Scam Email
Wondering if you may have been targeted by the “Have you heard of Pegasus” cyber extortion scam? Get answers to the most commonly asked questions surrounding this malicious scam email below.
What is the “Have you heard of Pegasus” sextortion email scam?
This is a deceptive scam email that claims the sender hacked the recipient’s devices using malware called Pegasus to spy on their online activity. The email threatens to release supposed embarrassing videos unless ransom is paid in Bitcoin urgently. In reality, it is a complete scam designed to extort money through false threats.
How does the Pegasus extortion email scam operate?
- Criminals obtain leaked credentials like emails and passwords from data breaches.
- They send emails falsely claiming to have spied through webcams etc. using Pegasus.
- The email threatens to share fabricated explicit videos unless ransom is paid in Bitcoin.
- Victims pay out of fear, but receive no such videos in return.
What specific threats are made in the Pegasus email?
The email claims the sender used malware to access all the recipient’s devices and record inappropriate or illegal videos through the webcam. It threatens to send these fictional videos publicly to the recipient’s contacts unless ransom is paid within 48 hours.
Does paying the ransom make the supposed videos go away?
No, there are no such videos. The threats are a complete fabrication aimed to scare recipients into paying ransom. Even if paid, the scammers disappear without providing anything in return. Do not pay.
I already paid the ransom – what steps should I take?
Immediately cease contact with the scammer. Alert relevant financial institutions about any unauthorized payments. Monitor accounts closely for further suspicious activity and reset all passwords. Report the scam attempt to authorities. Seek counseling to cope with associated stress.
How can I identify this as a scam email?
Be skeptical of any message demanding urgent payment to avoid alleged damaging material being released. Look for typos, illogical threats that don’t make sense, and high pressure demands Acting solely out of fear enables scams – carefully scrutinize any suspicions.
How can I protect myself from this scam?
Use a unique complex password for every account and enable two-factor authentication where possible. Exercise caution with links and attachments. Report any scam attempts you identify to help authorities. Seek support if you feel you are being unfairly targeted or extorted online.
Why does this scam remain so common?
The ability to email threats anonymously to millions of addresses makes this scam highly efficient for criminals. Even a low success rate can generate substantial illicit profits. But public awareness of their tactics is the key to guarding against these scams and shutting them down.
Key Takeaways
The “Have you heard of Pegasus” email scam preys specifically on human anxieties around privacy violations and public shame. While personal in content, the threats are actually generic templates, dispersed en masse with no truth behind them.
If you receive this scam:
- Do NOT correspond, open attachments, or pay the ransom. The threats are empty but can turn into real extortion if engaged.
- ALERT authorities about the scam to help prevent spread. Report at ic3.gov and reportfraud.ftc.gov.
- RESET online account passwords immediately, opting for unique complex passwords for each. Enable two-factor authentication.
- BREATHE and speak with someone you trust. You are not alone. Millions receive scam emails daily.
- No embarrassing videos of you exist. The vivid details are fiction, customized to frighten and manipulate you.
Stay vigilant, but do not let fear push you into rash decisions. You have all the power to stop these scams by arming yourself with knowledge and using caution. We will dismantle these schemes together, one aware person at a time.