- About This Email Scam
Is this threat real?
No, and don't panic. This email is a scam that tries to trick you into thinking that your device or email has been hacked, then demands payment or else they will send compromising information -such as images of you captured through your web camera or your pornographic browsing history - to all your friends and family. And in classic ransomware fashion, there’s typically a ticking clock. Giving users a short time limit to deliver the payment is social engineering at its finest.
Threats, intimidation and high-pressure tactics are classic signs of a scam.
As you can imagine, this email and anything it states is just a scam to try and scare you into paying the ransom.
They have my password! How did they get my password?
To make the threats more credible, these scammers may include one of your passwords in this email. The scammers have your password from sites that were hacked, and in this case, likely matched up to a database of emails and stolen passwords and sent this scam out to potentially millions of people. You can check if your email or password was compromised in a data breach on Haveibeenpwned.
If the password emailed to you is one that you still use, in any context whatsoever, stop using it and change it NOW. It's also recommended that you enable two-factor authentication for your email and online accounts whenever that is an option.
Should I pay the ransom?
You should not pay the ransom. If you pay the ransom, you’re not only losing money but you’re encouraging the scammers to continue phishing other people.
Delete this email, and under no circumstances pay these cybercriminals a penny/dime/bitcoin.
This is the text of this mail, including the grammatical and spelling errors.
Subject: Access to your account [edited] in my hands
I am a hacker who has access to your operating system.
As you can see - I sent you this email from your account.
Yes! I have full access to [edited].
At the time of hacking your account [edited] had this password: [edited]
Moreover, I have full access to your device.
I have been watching you for several months.
The thing is, you got infected with my spyware about three months ago.
I first infected the router to which you connected to access the Internet.
Then through the router your device was infected.
If you do not understand the nuances, then I will explain
Spyware gives me full access and control over a computer or any other device.
This means that I can see everything on your screen, scan your hard drive, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why didn't your antivirus detect malware?
The fact is that my program updates its signatures every 6 hours, so the anti-virus database does not have time to track it.
I scanned your hard drive and found enough of your frank and very sexy photos to be surprised.
Oh yeah! You are beautiful and amazing. I would not mind having an affair with you but I need the funds.
YES! With a single keystroke, I can send these photos to all your contacts in the mail, phone and social networks.
I can also publish access to all your accounts that you use, including the current one.
If you do not want to allow this, then:
transfer $699 to my bitcoin address (if you don't understand something, write to Google: "Buy bitcoin").
My Bitcoin address (BTC wallet): 1HrQYZRewTNKFSd1kVYSMyNdqppA8udfjX
After receiving the payment, I will delete all your photos and other data, and you will never see me again.
I will also launch a team that will remove my virus from your device!
I give you 48 hours (2 days) for payment.
I have a notice of this letter being read, and the countdown will work when you see this letter.
There is no point in complaining or writing anywhere, since this letter cannot be traced.
I'm never wrong!
Know that I am closely watching your device and all your accounts.
If I see that you share with someone about this letter, then all your photos and data will be instantly distributed!
Remember that if during the specified time I do not receive payment - photos and data will be instantly distributed, and your device will be encrypted!
Be clever girl!
Your respectable observer.[/quoote]
- Recommended Actions
We recommend that you ignore the content of this email and delete it from your Inbox.
If you have downloaded any attachments, clicked on any links from this email, or suspect that your computer might be infected with malware, we recommend that you run a scan with Malwarebytes Anti-Malware Free.
Malwarebytes is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected device, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware. The first time you install Malwarebytes, you’re given a free 14-day trial of the premium edition, which includes preventative tools like real-time scanning and specific protection from ransomware. After two weeks, it automatically reverts to the basic free version that will detect and clean up malware infections only when you run a scan. It is important to note that Malwarebytes will run alongside antivirus software without conflicts.
You can download Malwarebytes by clicking the link below.MALWAREBYTES DOWNLOAD LINK (The above link will open a new page from where you can download Malwarebytes)
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the mb3-setup-consumer-x.x.x.xxxx.exe file to install Malwarebytes on your PC. In most cases, downloaded files are saved to the Downloads folder.
You may be presented with an User Account Control pop-up asking if you want to allow Malwarebytes to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes Setup Wizard which will guide you through the installation process. To install Malwarebytes on your PC, click on the "Agree and Install" button.
Click on "Scan Now".
Once installed, Malwarebytes will automatically start and update the antivirus database. To perform a system scan, click on the "Scan Now" button.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your computer for adware and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on "Quarantine Selected".
When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malicious programs that Malwarebytes has found, click on the "Quarantine Selected" button.
Reboot your computer.
Malwarebytes will now remove all the malicious files and registry keys that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.