Blackmail Emails Demand Bitcoin Payment

According to this email, the sender installed software on an X-rated website that you visited and was able to make a video of you viewing the material on the site.  And, claims the email, the software also collected all of your social media and email contacts.

The sender warns that, if you do not pay $1000 via Bitcoin within one day of opening the email, the compromising video will be sent to all of your contacts.

However, the email is just a scam designed to trick you into sending money to online criminals.  The sender does not really have a compromising video of you as claimed.

Despite the claims in the scam message, the email is not specifically targeted at you.  Instead, the scammers send out many thousands of identical emails in the hope that at least a few recipients will be panicked into sending the requested payment.

The email does not address you by name. Nor does it mention which particular site you supposedly visited, when the alleged incident took place, which contacts the software has supposedly collected, or any other identifying details. It does not even include a copy of the video.

If the criminals intent on blackmail really did have all of this information, and really did make the video, they would almost certainly include the video and at least some of the information as a means of proving that their threat was real.

To be sure, criminals can indeed distribute malware that is able to steal information from the infected computer. They may even be able to turn on your computer camera and record video without you realizing it.

However, in this case, the blackmail attempt is fake. There are many variants of the fake blackmail scam.  If you receive one of these bogus messages, do not respond to it.

An example of the scam email:

Let’s get straight to the point. No one has compensated me to check about you. You do not know me and you are probably thinking why you’re getting this e-mail? Actually, I installed a software on the X video clips (pornography) site and you know what, you visited this website to have fun (you know what I mean).

While you were watching videos, your web browser began functioning as a Remote control Desktop that has a keylogger which provided me accessibility to your display and also cam. Right after that, my software program collected every one of your contacts from your Messenger, social networks, and e-mail. After that I made a video.

1st part displays the video you were viewing (you’ve got a good taste omg), and second part shows the view of your webcam, yeah it is u. You got two different choices. We are going to take a look at the possibilities in details: First solution is to neglect this message.

As a result, I will send your very own video to each one of your contacts and just think concerning the embarrassment you will definitely get. And as a consequence should you be in a romance, precisely how it will affect?

In the second place option will be to compensate me $1000. I will name it as a donation. In this situation, I most certainly will right away remove
your videotape. You can continue your daily routine like this never took place and you will never hear back again from me.

You’ll make the payment via Bitcoin (if you don’t know this, search for “how to buy bitcoin” in Google search engine).

If you may be planning on going to the cops, well, this email cannot be

traced back to me. I have covered my moves. I am also not trying to ask you for a whole lot, I want to be compensated.

You now have one day in order to make the payment. I’ve a special pixel within this e mail, and at this moment I know that you have read this email message. If I don’t receive the Bitcoins, I definitely will send your video to all of your contacts including close relatives, coworkers, etc.

Having said that, if I do get paid, I will erase the recording right away. This is a non-negotiable offer, therefore please don’t waste my time & yours by replying to this email. If you need proof, reply Yup! & I definitely will send your video recording to your 10 contacts.

Here is another example of the scam emails:

Let's get straight to the point. I know that 98769876 is your password. More to the point, I'm aware about your secret and I have evidence of your secret. You do not know me and no one hired me to examine you.

It is just your misfortune that I stumbled across your bad deeds. Well, I setup a malware on the adult vids (pornographic material) and you visited this website to have fun (you know what I mean). While you were watching videos, your browser began operating as a Rdp (Remote desktop) that has a key logger which gave me access to your display and also cam. Just after that, my software obtained your complete contacts from fb, as well as email.

After that I put in much more time than I should have investigating into your life and generated a two view video. 1st part shows the recording you were watching and next part displays the capture of your cam (it’s you doing nasty things).

Honestly, I am willing to forget everything about you and allow you to continue with your life. And my goal is to provide you 2 options which will accomplish that. The two options are either to ignore this letter, or perhaps pay me $ 1900. Let’s understand those 2 options in more detail.

Option One is to ignore this email. Let us see what is going to happen if you opt this path. I will certainly send your video recording to all your contacts including family members, coworkers, and many others. It doesn't save you from the humiliation your household will face when friends find out your dirty details from me.

Other Option is to pay me $ 1900. We’ll call it my “privacy charges”. I will explain what will happen if you opt this choice. Your secret will remain your secret. I will delete the video immediately. You continue on with your life as if none of this ever occurred.

Now you may be thinking, “I should call the cops”. Without a doubt, I've covered my steps in order that this message cannot be linked back to me also it won't stay away from the evidence from destroying your daily life. I'm not seeking to dig a hole in your pocket. I just want to be paid for the time I placed into investigating you. Let's hope you decide to produce this all go away and pay me the confidentiality fee. You will make the payment by Bitcoins (if you don't know how, type "how to buy bitcoins" on google)

Transfer Amount: $ 1900
Bitcoin Address to Send to: 1Gsgt8XrvoUAvLZ1H68tJbvUe6JuQV7P6h
(It is case sensitive, so copy and paste it carefully)

Explain nobody what you would use the Bitcoins for or they possibly will not sell it to you. The process to obtain bitcoin will take a few days so do not put it off.

I have a specific pixel in this email message, and now I know that you've read this email. You now have 1 day in order to make the payment. If I do not receive the Bitcoin, I definitely will send out your video recording to your entire contacts including friends and family, co-workers, etc. You better come up with an excuse for friends and family before they find out.

Nonetheless, if I receive the payment, I'll erase the video and all other proofs immediately. It's a non-negotiable one-time offer, so do not waste my personal time & yours. Time is running out.

When you receive something like this contact the police.

Hoax-Slayer:

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Cryptocurrency Cybercrime Surging In The UK:

 

« Internet of Things For Healthcare
Malware – The Hateful Eight »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

ArcusTeam

ArcusTeam

ArcusTeam is at the forefront of the firmware and applications security industry, with a mission to increase the level of security on all IoT devices and applications.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.