Blackmail Emails Demand Bitcoin Payment

According to this email, the sender installed software on an X-rated website that you visited and was able to make a video of you viewing the material on the site.  And, claims the email, the software also collected all of your social media and email contacts.

The sender warns that, if you do not pay $1000 via Bitcoin within one day of opening the email, the compromising video will be sent to all of your contacts.

However, the email is just a scam designed to trick you into sending money to online criminals.  The sender does not really have a compromising video of you as claimed.

Despite the claims in the scam message, the email is not specifically targeted at you.  Instead, the scammers send out many thousands of identical emails in the hope that at least a few recipients will be panicked into sending the requested payment.

The email does not address you by name. Nor does it mention which particular site you supposedly visited, when the alleged incident took place, which contacts the software has supposedly collected, or any other identifying details. It does not even include a copy of the video.

If the criminals intent on blackmail really did have all of this information, and really did make the video, they would almost certainly include the video and at least some of the information as a means of proving that their threat was real.

To be sure, criminals can indeed distribute malware that is able to steal information from the infected computer. They may even be able to turn on your computer camera and record video without you realizing it.

However, in this case, the blackmail attempt is fake. There are many variants of the fake blackmail scam.  If you receive one of these bogus messages, do not respond to it.

An example of the scam email:

Let’s get straight to the point. No one has compensated me to check about you. You do not know me and you are probably thinking why you’re getting this e-mail? Actually, I installed a software on the X video clips (pornography) site and you know what, you visited this website to have fun (you know what I mean).

While you were watching videos, your web browser began functioning as a Remote control Desktop that has a keylogger which provided me accessibility to your display and also cam. Right after that, my software program collected every one of your contacts from your Messenger, social networks, and e-mail. After that I made a video.

1st part displays the video you were viewing (you’ve got a good taste omg), and second part shows the view of your webcam, yeah it is u. You got two different choices. We are going to take a look at the possibilities in details: First solution is to neglect this message.

As a result, I will send your very own video to each one of your contacts and just think concerning the embarrassment you will definitely get. And as a consequence should you be in a romance, precisely how it will affect?

In the second place option will be to compensate me $1000. I will name it as a donation. In this situation, I most certainly will right away remove
your videotape. You can continue your daily routine like this never took place and you will never hear back again from me.

You’ll make the payment via Bitcoin (if you don’t know this, search for “how to buy bitcoin” in Google search engine).

If you may be planning on going to the cops, well, this email cannot be

traced back to me. I have covered my moves. I am also not trying to ask you for a whole lot, I want to be compensated.

You now have one day in order to make the payment. I’ve a special pixel within this e mail, and at this moment I know that you have read this email message. If I don’t receive the Bitcoins, I definitely will send your video to all of your contacts including close relatives, coworkers, etc.

Having said that, if I do get paid, I will erase the recording right away. This is a non-negotiable offer, therefore please don’t waste my time & yours by replying to this email. If you need proof, reply Yup! & I definitely will send your video recording to your 10 contacts.

Here is another example of the scam emails:

Let's get straight to the point. I know that 98769876 is your password. More to the point, I'm aware about your secret and I have evidence of your secret. You do not know me and no one hired me to examine you.

It is just your misfortune that I stumbled across your bad deeds. Well, I setup a malware on the adult vids (pornographic material) and you visited this website to have fun (you know what I mean). While you were watching videos, your browser began operating as a Rdp (Remote desktop) that has a key logger which gave me access to your display and also cam. Just after that, my software obtained your complete contacts from fb, as well as email.

After that I put in much more time than I should have investigating into your life and generated a two view video. 1st part shows the recording you were watching and next part displays the capture of your cam (it’s you doing nasty things).

Honestly, I am willing to forget everything about you and allow you to continue with your life. And my goal is to provide you 2 options which will accomplish that. The two options are either to ignore this letter, or perhaps pay me $ 1900. Let’s understand those 2 options in more detail.

Option One is to ignore this email. Let us see what is going to happen if you opt this path. I will certainly send your video recording to all your contacts including family members, coworkers, and many others. It doesn't save you from the humiliation your household will face when friends find out your dirty details from me.

Other Option is to pay me $ 1900. We’ll call it my “privacy charges”. I will explain what will happen if you opt this choice. Your secret will remain your secret. I will delete the video immediately. You continue on with your life as if none of this ever occurred.

Now you may be thinking, “I should call the cops”. Without a doubt, I've covered my steps in order that this message cannot be linked back to me also it won't stay away from the evidence from destroying your daily life. I'm not seeking to dig a hole in your pocket. I just want to be paid for the time I placed into investigating you. Let's hope you decide to produce this all go away and pay me the confidentiality fee. You will make the payment by Bitcoins (if you don't know how, type "how to buy bitcoins" on google)

Transfer Amount: $ 1900
Bitcoin Address to Send to: 1Gsgt8XrvoUAvLZ1H68tJbvUe6JuQV7P6h
(It is case sensitive, so copy and paste it carefully)

Explain nobody what you would use the Bitcoins for or they possibly will not sell it to you. The process to obtain bitcoin will take a few days so do not put it off.

I have a specific pixel in this email message, and now I know that you've read this email. You now have 1 day in order to make the payment. If I do not receive the Bitcoin, I definitely will send out your video recording to your entire contacts including friends and family, co-workers, etc. You better come up with an excuse for friends and family before they find out.

Nonetheless, if I receive the payment, I'll erase the video and all other proofs immediately. It's a non-negotiable one-time offer, so do not waste my personal time & yours. Time is running out.

When you receive something like this contact the police.

Hoax-Slayer:

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Cryptocurrency Cybercrime Surging In The UK:

 

« Internet of Things For Healthcare
Malware – The Hateful Eight »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

BluescreenIT (BIT)

BluescreenIT (BIT)

BluescreenIT is an IT Security Consultancy and IT and Cyber Security Training company supporting industry, local authorities, MoD and governmental IT departments.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.