Blackmail Emails Demand Bitcoin Payment

According to this email, the sender installed software on an X-rated website that you visited and was able to make a video of you viewing the material on the site.  And, claims the email, the software also collected all of your social media and email contacts.

The sender warns that, if you do not pay $1000 via Bitcoin within one day of opening the email, the compromising video will be sent to all of your contacts.

However, the email is just a scam designed to trick you into sending money to online criminals.  The sender does not really have a compromising video of you as claimed.

Despite the claims in the scam message, the email is not specifically targeted at you.  Instead, the scammers send out many thousands of identical emails in the hope that at least a few recipients will be panicked into sending the requested payment.

The email does not address you by name. Nor does it mention which particular site you supposedly visited, when the alleged incident took place, which contacts the software has supposedly collected, or any other identifying details. It does not even include a copy of the video.

If the criminals intent on blackmail really did have all of this information, and really did make the video, they would almost certainly include the video and at least some of the information as a means of proving that their threat was real.

To be sure, criminals can indeed distribute malware that is able to steal information from the infected computer. They may even be able to turn on your computer camera and record video without you realizing it.

However, in this case, the blackmail attempt is fake. There are many variants of the fake blackmail scam.  If you receive one of these bogus messages, do not respond to it.

An example of the scam email:

Let’s get straight to the point. No one has compensated me to check about you. You do not know me and you are probably thinking why you’re getting this e-mail? Actually, I installed a software on the X video clips (pornography) site and you know what, you visited this website to have fun (you know what I mean).

While you were watching videos, your web browser began functioning as a Remote control Desktop that has a keylogger which provided me accessibility to your display and also cam. Right after that, my software program collected every one of your contacts from your Messenger, social networks, and e-mail. After that I made a video.

1st part displays the video you were viewing (you’ve got a good taste omg), and second part shows the view of your webcam, yeah it is u. You got two different choices. We are going to take a look at the possibilities in details: First solution is to neglect this message.

As a result, I will send your very own video to each one of your contacts and just think concerning the embarrassment you will definitely get. And as a consequence should you be in a romance, precisely how it will affect?

In the second place option will be to compensate me $1000. I will name it as a donation. In this situation, I most certainly will right away remove
your videotape. You can continue your daily routine like this never took place and you will never hear back again from me.

You’ll make the payment via Bitcoin (if you don’t know this, search for “how to buy bitcoin” in Google search engine).

If you may be planning on going to the cops, well, this email cannot be

traced back to me. I have covered my moves. I am also not trying to ask you for a whole lot, I want to be compensated.

You now have one day in order to make the payment. I’ve a special pixel within this e mail, and at this moment I know that you have read this email message. If I don’t receive the Bitcoins, I definitely will send your video to all of your contacts including close relatives, coworkers, etc.

Having said that, if I do get paid, I will erase the recording right away. This is a non-negotiable offer, therefore please don’t waste my time & yours by replying to this email. If you need proof, reply Yup! & I definitely will send your video recording to your 10 contacts.

Here is another example of the scam emails:

Let's get straight to the point. I know that 98769876 is your password. More to the point, I'm aware about your secret and I have evidence of your secret. You do not know me and no one hired me to examine you.

It is just your misfortune that I stumbled across your bad deeds. Well, I setup a malware on the adult vids (pornographic material) and you visited this website to have fun (you know what I mean). While you were watching videos, your browser began operating as a Rdp (Remote desktop) that has a key logger which gave me access to your display and also cam. Just after that, my software obtained your complete contacts from fb, as well as email.

After that I put in much more time than I should have investigating into your life and generated a two view video. 1st part shows the recording you were watching and next part displays the capture of your cam (it’s you doing nasty things).

Honestly, I am willing to forget everything about you and allow you to continue with your life. And my goal is to provide you 2 options which will accomplish that. The two options are either to ignore this letter, or perhaps pay me $ 1900. Let’s understand those 2 options in more detail.

Option One is to ignore this email. Let us see what is going to happen if you opt this path. I will certainly send your video recording to all your contacts including family members, coworkers, and many others. It doesn't save you from the humiliation your household will face when friends find out your dirty details from me.

Other Option is to pay me $ 1900. We’ll call it my “privacy charges”. I will explain what will happen if you opt this choice. Your secret will remain your secret. I will delete the video immediately. You continue on with your life as if none of this ever occurred.

Now you may be thinking, “I should call the cops”. Without a doubt, I've covered my steps in order that this message cannot be linked back to me also it won't stay away from the evidence from destroying your daily life. I'm not seeking to dig a hole in your pocket. I just want to be paid for the time I placed into investigating you. Let's hope you decide to produce this all go away and pay me the confidentiality fee. You will make the payment by Bitcoins (if you don't know how, type "how to buy bitcoins" on google)

Transfer Amount: $ 1900
Bitcoin Address to Send to: 1Gsgt8XrvoUAvLZ1H68tJbvUe6JuQV7P6h
(It is case sensitive, so copy and paste it carefully)

Explain nobody what you would use the Bitcoins for or they possibly will not sell it to you. The process to obtain bitcoin will take a few days so do not put it off.

I have a specific pixel in this email message, and now I know that you've read this email. You now have 1 day in order to make the payment. If I do not receive the Bitcoin, I definitely will send out your video recording to your entire contacts including friends and family, co-workers, etc. You better come up with an excuse for friends and family before they find out.

Nonetheless, if I receive the payment, I'll erase the video and all other proofs immediately. It's a non-negotiable one-time offer, so do not waste my personal time & yours. Time is running out.

When you receive something like this contact the police.

Hoax-Slayer:

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Cryptocurrency Cybercrime Surging In The UK:

 

« Internet of Things For Healthcare
Malware – The Hateful Eight »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS)

CDFS is Australia’s premier supplier of digital forensic tools, industry-embedded training and certification to Law Enforcement, Government, and Corporate Enterprise.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.