Blackmail Emails Demand Bitcoin Payment

According to this email, the sender installed software on an X-rated website that you visited and was able to make a video of you viewing the material on the site.  And, claims the email, the software also collected all of your social media and email contacts.

The sender warns that, if you do not pay $1000 via Bitcoin within one day of opening the email, the compromising video will be sent to all of your contacts.

However, the email is just a scam designed to trick you into sending money to online criminals.  The sender does not really have a compromising video of you as claimed.

Despite the claims in the scam message, the email is not specifically targeted at you.  Instead, the scammers send out many thousands of identical emails in the hope that at least a few recipients will be panicked into sending the requested payment.

The email does not address you by name. Nor does it mention which particular site you supposedly visited, when the alleged incident took place, which contacts the software has supposedly collected, or any other identifying details. It does not even include a copy of the video.

If the criminals intent on blackmail really did have all of this information, and really did make the video, they would almost certainly include the video and at least some of the information as a means of proving that their threat was real.

To be sure, criminals can indeed distribute malware that is able to steal information from the infected computer. They may even be able to turn on your computer camera and record video without you realizing it.

However, in this case, the blackmail attempt is fake. There are many variants of the fake blackmail scam.  If you receive one of these bogus messages, do not respond to it.

An example of the scam email:

Let’s get straight to the point. No one has compensated me to check about you. You do not know me and you are probably thinking why you’re getting this e-mail? Actually, I installed a software on the X video clips (pornography) site and you know what, you visited this website to have fun (you know what I mean).

While you were watching videos, your web browser began functioning as a Remote control Desktop that has a keylogger which provided me accessibility to your display and also cam. Right after that, my software program collected every one of your contacts from your Messenger, social networks, and e-mail. After that I made a video.

1st part displays the video you were viewing (you’ve got a good taste omg), and second part shows the view of your webcam, yeah it is u. You got two different choices. We are going to take a look at the possibilities in details: First solution is to neglect this message.

As a result, I will send your very own video to each one of your contacts and just think concerning the embarrassment you will definitely get. And as a consequence should you be in a romance, precisely how it will affect?

In the second place option will be to compensate me $1000. I will name it as a donation. In this situation, I most certainly will right away remove
your videotape. You can continue your daily routine like this never took place and you will never hear back again from me.

You’ll make the payment via Bitcoin (if you don’t know this, search for “how to buy bitcoin” in Google search engine).

If you may be planning on going to the cops, well, this email cannot be

traced back to me. I have covered my moves. I am also not trying to ask you for a whole lot, I want to be compensated.

You now have one day in order to make the payment. I’ve a special pixel within this e mail, and at this moment I know that you have read this email message. If I don’t receive the Bitcoins, I definitely will send your video to all of your contacts including close relatives, coworkers, etc.

Having said that, if I do get paid, I will erase the recording right away. This is a non-negotiable offer, therefore please don’t waste my time & yours by replying to this email. If you need proof, reply Yup! & I definitely will send your video recording to your 10 contacts.

Here is another example of the scam emails:

Let's get straight to the point. I know that 98769876 is your password. More to the point, I'm aware about your secret and I have evidence of your secret. You do not know me and no one hired me to examine you.

It is just your misfortune that I stumbled across your bad deeds. Well, I setup a malware on the adult vids (pornographic material) and you visited this website to have fun (you know what I mean). While you were watching videos, your browser began operating as a Rdp (Remote desktop) that has a key logger which gave me access to your display and also cam. Just after that, my software obtained your complete contacts from fb, as well as email.

After that I put in much more time than I should have investigating into your life and generated a two view video. 1st part shows the recording you were watching and next part displays the capture of your cam (it’s you doing nasty things).

Honestly, I am willing to forget everything about you and allow you to continue with your life. And my goal is to provide you 2 options which will accomplish that. The two options are either to ignore this letter, or perhaps pay me $ 1900. Let’s understand those 2 options in more detail.

Option One is to ignore this email. Let us see what is going to happen if you opt this path. I will certainly send your video recording to all your contacts including family members, coworkers, and many others. It doesn't save you from the humiliation your household will face when friends find out your dirty details from me.

Other Option is to pay me $ 1900. We’ll call it my “privacy charges”. I will explain what will happen if you opt this choice. Your secret will remain your secret. I will delete the video immediately. You continue on with your life as if none of this ever occurred.

Now you may be thinking, “I should call the cops”. Without a doubt, I've covered my steps in order that this message cannot be linked back to me also it won't stay away from the evidence from destroying your daily life. I'm not seeking to dig a hole in your pocket. I just want to be paid for the time I placed into investigating you. Let's hope you decide to produce this all go away and pay me the confidentiality fee. You will make the payment by Bitcoins (if you don't know how, type "how to buy bitcoins" on google)

Transfer Amount: $ 1900
Bitcoin Address to Send to: 1Gsgt8XrvoUAvLZ1H68tJbvUe6JuQV7P6h
(It is case sensitive, so copy and paste it carefully)

Explain nobody what you would use the Bitcoins for or they possibly will not sell it to you. The process to obtain bitcoin will take a few days so do not put it off.

I have a specific pixel in this email message, and now I know that you've read this email. You now have 1 day in order to make the payment. If I do not receive the Bitcoin, I definitely will send out your video recording to your entire contacts including friends and family, co-workers, etc. You better come up with an excuse for friends and family before they find out.

Nonetheless, if I receive the payment, I'll erase the video and all other proofs immediately. It's a non-negotiable one-time offer, so do not waste my personal time & yours. Time is running out.

When you receive something like this contact the police.

Hoax-Slayer:

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Cryptocurrency Cybercrime Surging In The UK:

 

« Internet of Things For Healthcare
Malware – The Hateful Eight »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

FortiGuard Labs

FortiGuard Labs

FortiGuard Labs is the threat intelligence and research organization at Fortinet. Its mission is to provide Fortinet customers with the industry’s best threat intelligence.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.