“Your local network has been compromised” Blackmail Email Scam

The “Your local network has been compromised” email is a scam that tries to trick you into thinking that your computer or phone is infected with malware and then asks you to send Bitcoins to keep your data private. Contrary to the claims in your email, you haven’t been hacked (or at least, that’s not what prompted that email). This is merely a new variation on an old scam which is popularly being called “sextortion”. Do not pay the ransom.

This is the text of the “Your local network has been compromised” blackmail email, including the grammatical and spelling errors:

Subject: Very very important

Hi!

Your local network has been compromised and I was able to get access and record you while you MSATURBATE on P O R N. The internet router had a vulnerability and allowed me to get in and place some code that was activated everytime a device connected on your network was visiting 18+ content. My code had some specific functions including recording with any camera available on any device, computer, smartphone, tablet and to collect your contacts lists, phone numbers, emails, and friends on social media accounts.

Now, maybe you ask… why your anti virus was no able to detect this. Well, my stuff was designed to not steal passwords, bank accounts, PINs, this kind of activity is seen by any protection software as malicious. So, my thing was able only to record video + audio in hidden mode and grabbing contacts information which do not trigger any protection software because this activity is looking normal.

To get rid of my stuff from your local network you had to restart any device that was connected on your network, so the code will dump from RAM memory on reboot. The router was already secured by the manufacture and I lost access on it a few days ago which means my code will not run again.

So, in order to not send the video to your contacts with you doing, you know what… Well, you have to pay 500 $ worth in BlT-COIN. I’m well aware that you have the money because I seen your balance. This was the second function of my code, to look for balances.

BTC Amount (approximately): 0.055

My Address Part1: 1HZ6QJD4pBuxhQa8shRn4Mzst

My Address Part2: w2XM9KmVe

Important! The address was split in 2 parts, you have to manually copy and paste Part1+Part2 and that is actually my final address where you can send the coins. Also you can search on Google for Paxful, there you can get the coins very easy. Once the coins are sent, the video with you will be deleted and you will never hear from me again. You have 3 days, (72 hours).

Also, my advice is to stop watching this kind of content, is messing with your brain. We live in this society and from you ages men are teach to worship women, which is the wrong move. See this got you in this position to seek and look for this type of content. Now I’m now saying to treat women bad, hell no! What I’m trying to say is, the more you ignore women and you focus on other important things, the more they will chase you… women do feel when a male is beta. Watching this type of content is beta.

Stop this addiction and replace it with something beneficial like gym, eat healthier, learn a something new. Remember, the more you ignore women and you do not worship them, the more they will chase you.

The above email and anything it states is just a scam to try and scare you into paying the ransom. If you have received the “Your local network has been compromised” email, we recommend to delete it and under no circumstances send any money to these cybercriminals.

Is the “Your local network has been compromised” email real?

No, and don’t panic. The “Your local network has been compromised” email is a scam that tries to trick you into thinking that your device or email has been hacked, then demands payment or else they will send compromising information -such as images of you captured through your web camera or your pornographic browsing history – to all your friends and family. And in classic ransomware fashion, there’s typically a ticking clock. Giving users a short time limit to deliver the payment is social engineering at its finest.
Threats, intimidation, and high-pressure tactics are classic signs of a scam.

As you can imagine, the “Your local network has been compromised” email and anything it states is just a scam to try and scare you into paying the ransom.

They have my password! How did they get my password?

To make the threats more credible, the scammers may include one of your passwords in this email. The scammers have your password from sites that were hacked, and in this case, likely matched up to a database of emails and stolen passwords and sent this scam out to potentially millions of people. You can check if your email or password was compromised in a data breach on Haveibeenpwned.

If the password emailed to you is one that you still use, in any context whatsoever, stop using it and change it NOW. It’s also recommended that you enable two-factor authentication for your email and online accounts whenever that is an option.

Should I pay the ransom?

You should not pay the ransom. If you pay the ransom, you’re not only losing money but you’re encouraging the scammers to continue phishing other people.
Delete the “Your local network has been compromised” email, and under no circumstances pay these cybercriminals a penny/dime/bitcoin.

What should I do now?

We recommend that you ignore the content of the “Your local network has been compromised” email and delete it from your Inbox. However, if you have downloaded any attachments or clicked on any links from this email, suspect that your computer might be infected with malware, you can follow the below steps to and scan your device for malware and remove it for free.

Depending on which operating system is installed on the device you want to scan for malicious programs, follow the removal guide.

Scan and remove malware from Windows
To check your computer for malware and remove it from a Windows computer, follow these steps:

STEP 1: Use Malwarebytes Free to remove malware from Windows

In this first step, we will install and run a scan with Malwarebytes to remove adware, browser hijackers, and potentially unwanted programs that might be installed on your computer.

Malwarebytes Free is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected device, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes Free.

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the MBSetup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on MBSetup installer to install Malwarebytes
    You may be presented with an User Account Control pop-up asking if you want to allow Malwarebytes to make changes to your device. If this happens, you should click “Yes” to continue with the Malwarebytes installation.
    Windows asking for permission to run the Malwarebytes installer

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes setup wizard which will guide you through the installation process. The Malwarebytes installer will first ask you on what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Malwarebytes setup: Click on Personal Computer step 1

    On the next screen, click “Install” to install Malwarebytes on your computer.
    Malwarebytes Setup: Click on Install

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Use Malwarebytes Free”.

    After installing Malwarebytes, you’ll be prompted to select between the Free and the Premium version. The Malwarebytes Premium edition includes preventative tools like real-time scanning and ransomware protection, however, we will use the Free version to clean up the computer.
    Click on “Use Malwarebytes Free“.
    Click on Use Malwarebytes Free to continue with the install

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning for malicious programs

  7. Click on “Quarantine”.

    When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malicious programs that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove Your local network has been compromised

  8. Restart computer.

    Malwarebytes will now remove all the malicious files and registry keys that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes requesting to restart computer to complete the Your local network has been compromised removal process
    When the malware removal process is complete, you can close Malwarebytes and continue with the rest of the instructions.

STEP 2: Use HitmanPro to scan for malware and unwanted programs

In this second step, we will run a scan with HitmanPro to do a final check for any other malicious programs that may be present on your computer.

HitmanPro is a second opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that’s not already known, HitmanPro sends it to their clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.
Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is actually no limit in scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one time 30-days trial to enable the clean up.

  1. Download HitmanPro.

    You can download HitmanPro by clicking the link below.

    HITMANPRO DOWNLOAD LINK
    (The above link will open a new web page from where you can download HitmanPro)
  2. Install HitmanPro.

    When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your PC. In most cases, downloaded files are saved to the Downloads folder.
    Double-click on the HitmanPro setup file - Help Guide
    You may be presented with an User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
    Windows asking for permissions to run the HitmanPro setup file - Help Guide

  3. Follow the on-screen prompts.

    When HitmanPro starts you will be presented with the start screen as shown below. Click on the “Next” button to perform a system scan.

    Click Next to install HitmanPro

    HitmanPro final installer screen

  4. Wait for the HitmanPro scan to complete.

    HitmanPro will now begin to scan your computer for malicious programs. This process will take a few minutes.
    HitmanPro while scanning for malware - Help Guide

  5. Click on “Next”.

    When HitmanPro has finished the scan, it will display a list of all the malware that the program has found. Click on the “Next” button to remove the malicious programs.
    HitmanPro scan summary. Click Next to remove Your local network has been compromised pop-up ads

  6. Click on “Activate free license”.

    Click on the “Activate free license” button to begin the free 30 days trial and remove all the malicious files from your PC.
    Activate the free HitmanPro license keyEnter your email to complete the HitmanPro activation - Help Guide


Your computer should now be free of the “Your local network has been compromised” malware. If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan and remove malware from Mac

To check your computer for malware and remove it from a Macbook or iMac, follow these steps:

STEP 1: Use Malwarebytes Free to remove malware from Mac

In this first step, we will install and run a scan with Malwarebytes to remove adware, browser hijackers, and potentially unwanted programs that might be installed on your computer.

Malwarebytes Free is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected device, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes Free.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts in order to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you on what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Select “Use Malwarebytes Free”.

    You’ll be then prompted to select between the Malwarebytes Free and the Premium version. The Malwarebytes Premium edition includes preventative tools like real-time scanning and ransomware protection, however, we will use the Free version to clean up the computer.
    Click on “Use Malwarebytes Free“.
    Click on Use Malwarebytes Free Mac

  6. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  7. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for pop-up adss and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for Your local network has been compromised pop-up ads

  8. Click on “Quarantine”.

    When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malicious programs that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine Your local network has been compromised pop-up ads

  9. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your computer should now be free of the “Your local network has been compromised” malware. If your current antivirus allowed a malicious program on your computer, you may want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan and remove malware from Android

To check your device for malware and remove it from an Android phone or tablet, follow these steps:

STEP 1: Use Malwarebytes Free to remove malware from Android

In this first step, we will install and run a scan with Malwarebytes to remove adware, browser hijackers, and potentially unwanted programs that might be installed on your phone or tablet.

Malwarebytes Free is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected phone, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes.

    You can download Malwarebytes by clicking the button below.

    MALWAREBYTES DOWNLOAD LINK
    (The above link open a Google Play Store from where you can download Malwarebytes)
  2. Install Malwarebytes on your phone

    In the Google Play Store, tap “Install” to install Malwarebytes on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When the Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens which explain the difference between the Premium and Free version. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to give permission to Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning phone for malware

  6. Click on “Remove Selected”.

    When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malicious apps from your phone

  7. Restart your phone.

Your computer should now be free of the “Your local network has been compromised” malware. If your current antivirus allowed a malicious program on your computer, you may want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to a malicious program from your computer, please ask for help in our Mobile Malware Removal Help & Support forum.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment