- About This Email Scam
Is this threat real?
No, and don't panic. This email is a scam that tries to trick you into thinking that your device or email has been hacked, then demands payment or else they will send compromising information -such as images of you captured through your web camera or your pornographic browsing history - to all your friends and family. And in classic ransomware fashion, there’s typically a ticking clock. Giving users a short time limit to deliver the payment is social engineering at its finest.
Threats, intimidation and high-pressure tactics are classic signs of a scam.
As you can imagine, this email and anything it states is just a scam to try and scare you into paying the ransom.
They have my password! How did they get my password?
To make the threats more credible, these scammers may include one of your passwords in this email. The scammers have your password from sites that were hacked, and in this case, likely matched up to a database of emails and stolen passwords and sent this scam out to potentially millions of people. You can check if your email or password was compromised in a data breach on Haveibeenpwned.
If the password emailed to you is one that you still use, in any context whatsoever, stop using it and change it NOW. It's also recommended that you enable two-factor authentication for your email and online accounts whenever that is an option.
Should I pay the ransom?
You should not pay the ransom. If you pay the ransom, you’re not only losing money but you’re encouraging the scammers to continue phishing other people.
Delete this email, and under no circumstances pay these cybercriminals a penny/dime/bitcoin.
This is the text of this mail, including the grammatical and spelling errors.
Subject: Access to your account [edited] in my hands
I am a hacker who has access to your operating system.
As you can see - I sent you this email from your account.
Yes! I have full access to [edited].
At the time of hacking your account [edited] had this password: [edited]
Moreover, I have full access to your device.
I have been watching you for several months.
The thing is, you got infected with my spyware about three months ago.
I first infected the router to which you connected to access the Internet.
Then through the router your device was infected.
If you do not understand the nuances, then I will explain
Spyware gives me full access and control over a computer or any other device.
This means that I can see everything on your screen, scan your hard drive, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why didn't your antivirus detect malware?
The fact is that my program updates its signatures every 6 hours, so the anti-virus database does not have time to track it.
I scanned your hard drive and found enough of your frank and very sexy photos to be surprised.
Oh yeah! You are beautiful and amazing. I would not mind having an affair with you but I need the funds.
YES! With a single keystroke, I can send these photos to all your contacts in the mail, phone and social networks.
I can also publish access to all your accounts that you use, including the current one.
If you do not want to allow this, then:
transfer $699 to my bitcoin address (if you don't understand something, write to Google: "Buy bitcoin").
My Bitcoin address (BTC wallet): 1HrQYZRewTNKFSd1kVYSMyNdqppA8udfjX
After receiving the payment, I will delete all your photos and other data, and you will never see me again.
I will also launch a team that will remove my virus from your device!
I give you 48 hours (2 days) for payment.
I have a notice of this letter being read, and the countdown will work when you see this letter.
There is no point in complaining or writing anywhere, since this letter cannot be traced.
I'm never wrong!
Know that I am closely watching your device and all your accounts.
If I see that you share with someone about this letter, then all your photos and data will be instantly distributed!
Remember that if during the specified time I do not receive payment - photos and data will be instantly distributed, and your device will be encrypted!
Be clever girl!
Your respectable observer.[/quoote]
- Recommended Actions
We recommend that you ignore the content of this email and delete it from your Inbox.
If you have downloaded any attachments, clicked on any links from this email, or suspect that your computer might be infected with malware, we recommend that you run a scan with Malwarebytes Anti-Malware Free and HitmanPro.
STEP 1: Use Malwarebys Free to scan for malware
Malwarebytes is one of the most popular and most used anti-malware software for Windows, and for good reasons. It is able to destroy many types of malware that other software tends to miss, without costing you absolutely nothing. When it comes to cleaning up an infected device, Malwarebytes has always been free and we recommend it as an essential tool in the fight against malware. The first time you install Malwarebytes, you’re given a free 14-day trial of the premium edition, which includes preventative tools like real-time scanning and specific protection from ransomware. After two weeks, it automatically reverts to the basic free version that will detect and clean up malware infections only when you run a scan. It is important to note that Malwarebytes will run alongside antivirus software without conflicts.
You can download Malwarebytes by clicking the link below.MALWAREBYTES DOWNLOAD LINK (The above link will open a new page from where you can download Malwarebytes)
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the mb3-setup-consumer-x.x.x.xxxx.exe file to install Malwarebytes on your PC. In most cases, downloaded files are saved to the Downloads folder.
You may be presented with an User Account Control pop-up asking if you want to allow Malwarebytes to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes Setup Wizard which will guide you through the installation process. To install Malwarebytes on your PC, click on the "Agree and Install" button.
Click on "Scan Now".
Once installed, Malwarebytes will automatically start and update the antivirus database. To perform a system scan, click on the "Scan Now" button.
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your computer for adware and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
Click on "Quarantine Selected".
When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malicious programs that Malwarebytes has found, click on the "Quarantine Selected" button.
Reboot your computer.
Malwarebytes will now remove all the malicious files and registry keys that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
When the process is complete, you can close Malwarebytes and continue with the rest of the instructions.
STEP 2: Double-check for malicious programs with HitmanProHitmanPro is a second opinion scanner that takes a unique cloud-based approach to malware scanning. HitmanPro scans the behavior of active files and also files in locations where malware normally resides for suspicious activity. If it finds a suspicious file that's not already known, HitmanPro sends it to their clouds to be scanned by two of the best antivirus engines today, which are Bitdefender and Kaspersky.
Although HitmanPro is shareware and costs $24.95 for 1 year on 1 PC, there is actually no limit in scanning. The limitation only kicks in when there is a need to remove or quarantine detected malware by HitmanPro on your system and by then, you can activate the one time 30-days trial to enable the cleanup.
You can download HitmanPro by clicking the link below.HITMANPRO DOWNLOAD LINK (The above link will open a new web page from where you can download HitmanPro)
When HitmanPro has finished downloading, double-click on “hitmanpro.exe” (for 32-bit versions of Windows) or “hitmanpro_x64.exe” (for 64-bit versions of Windows) to install this program on your PC. In most cases, downloaded files are saved to the Downloads folder. br/>
You may be presented with an User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
Follow the on-screen prompts.
When HitmanPro starts you will be presented with the start screen as shown below. Click on the "Next" button to perform a system scan.
Wait for the HitmanPro scan to complete.
HitmanPro will now begin to scan your computer for malicious programs. This process will take a few minutes.
Click on "Next".
When HitmanPro has finished the scan, it will display a list of all the malware that the program has found. Click on the "Next" button to remove the malicious programs.
Click on "Activate free license".
Click on the "Activate free license" button to begin the free 30 days trial and remove all the malicious files from your PC.
If you are still having problems with your computer after completing these instructions, then please ask for help in our Malware Removal Assistance for Windows forum.