Blackmail Emails Demand Bitcoin Payment

According to this email, the sender installed software on an X-rated website that you visited and was able to make a video of you viewing the material on the site.  And, claims the email, the software also collected all of your social media and email contacts.

The sender warns that, if you do not pay $1000 via Bitcoin within one day of opening the email, the compromising video will be sent to all of your contacts.

However, the email is just a scam designed to trick you into sending money to online criminals.  The sender does not really have a compromising video of you as claimed.

Despite the claims in the scam message, the email is not specifically targeted at you.  Instead, the scammers send out many thousands of identical emails in the hope that at least a few recipients will be panicked into sending the requested payment.

The email does not address you by name. Nor does it mention which particular site you supposedly visited, when the alleged incident took place, which contacts the software has supposedly collected, or any other identifying details. It does not even include a copy of the video.

If the criminals intent on blackmail really did have all of this information, and really did make the video, they would almost certainly include the video and at least some of the information as a means of proving that their threat was real.

To be sure, criminals can indeed distribute malware that is able to steal information from the infected computer. They may even be able to turn on your computer camera and record video without you realizing it.

However, in this case, the blackmail attempt is fake. There are many variants of the fake blackmail scam.  If you receive one of these bogus messages, do not respond to it.

An example of the scam email:

Let’s get straight to the point. No one has compensated me to check about you. You do not know me and you are probably thinking why you’re getting this e-mail? Actually, I installed a software on the X video clips (pornography) site and you know what, you visited this website to have fun (you know what I mean).

While you were watching videos, your web browser began functioning as a Remote control Desktop that has a keylogger which provided me accessibility to your display and also cam. Right after that, my software program collected every one of your contacts from your Messenger, social networks, and e-mail. After that I made a video.

1st part displays the video you were viewing (you’ve got a good taste omg), and second part shows the view of your webcam, yeah it is u. You got two different choices. We are going to take a look at the possibilities in details: First solution is to neglect this message.

As a result, I will send your very own video to each one of your contacts and just think concerning the embarrassment you will definitely get. And as a consequence should you be in a romance, precisely how it will affect?

In the second place option will be to compensate me $1000. I will name it as a donation. In this situation, I most certainly will right away remove
your videotape. You can continue your daily routine like this never took place and you will never hear back again from me.

You’ll make the payment via Bitcoin (if you don’t know this, search for “how to buy bitcoin” in Google search engine).

If you may be planning on going to the cops, well, this email cannot be

traced back to me. I have covered my moves. I am also not trying to ask you for a whole lot, I want to be compensated.

You now have one day in order to make the payment. I’ve a special pixel within this e mail, and at this moment I know that you have read this email message. If I don’t receive the Bitcoins, I definitely will send your video to all of your contacts including close relatives, coworkers, etc.

Having said that, if I do get paid, I will erase the recording right away. This is a non-negotiable offer, therefore please don’t waste my time & yours by replying to this email. If you need proof, reply Yup! & I definitely will send your video recording to your 10 contacts.

Here is another example of the scam emails:

Let's get straight to the point. I know that 98769876 is your password. More to the point, I'm aware about your secret and I have evidence of your secret. You do not know me and no one hired me to examine you.

It is just your misfortune that I stumbled across your bad deeds. Well, I setup a malware on the adult vids (pornographic material) and you visited this website to have fun (you know what I mean). While you were watching videos, your browser began operating as a Rdp (Remote desktop) that has a key logger which gave me access to your display and also cam. Just after that, my software obtained your complete contacts from fb, as well as email.

After that I put in much more time than I should have investigating into your life and generated a two view video. 1st part shows the recording you were watching and next part displays the capture of your cam (it’s you doing nasty things).

Honestly, I am willing to forget everything about you and allow you to continue with your life. And my goal is to provide you 2 options which will accomplish that. The two options are either to ignore this letter, or perhaps pay me $ 1900. Let’s understand those 2 options in more detail.

Option One is to ignore this email. Let us see what is going to happen if you opt this path. I will certainly send your video recording to all your contacts including family members, coworkers, and many others. It doesn't save you from the humiliation your household will face when friends find out your dirty details from me.

Other Option is to pay me $ 1900. We’ll call it my “privacy charges”. I will explain what will happen if you opt this choice. Your secret will remain your secret. I will delete the video immediately. You continue on with your life as if none of this ever occurred.

Now you may be thinking, “I should call the cops”. Without a doubt, I've covered my steps in order that this message cannot be linked back to me also it won't stay away from the evidence from destroying your daily life. I'm not seeking to dig a hole in your pocket. I just want to be paid for the time I placed into investigating you. Let's hope you decide to produce this all go away and pay me the confidentiality fee. You will make the payment by Bitcoins (if you don't know how, type "how to buy bitcoins" on google)

Transfer Amount: $ 1900
Bitcoin Address to Send to: 1Gsgt8XrvoUAvLZ1H68tJbvUe6JuQV7P6h
(It is case sensitive, so copy and paste it carefully)

Explain nobody what you would use the Bitcoins for or they possibly will not sell it to you. The process to obtain bitcoin will take a few days so do not put it off.

I have a specific pixel in this email message, and now I know that you've read this email. You now have 1 day in order to make the payment. If I do not receive the Bitcoin, I definitely will send out your video recording to your entire contacts including friends and family, co-workers, etc. You better come up with an excuse for friends and family before they find out.

Nonetheless, if I receive the payment, I'll erase the video and all other proofs immediately. It's a non-negotiable one-time offer, so do not waste my personal time & yours. Time is running out.

When you receive something like this contact the police.

Hoax-Slayer:

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Cryptocurrency Cybercrime Surging In The UK:

 

« Internet of Things For Healthcare
Malware – The Hateful Eight »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

CLUSIF

CLUSIF

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) undertakes cyber security research and plays a leading role in securing Pakistan’s Cyberspace.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.