Jump to content

FYI: Email Blackmail Scam still current


David H. Lipman

Recommended Posts

The Blackmail Email was a product of a Breach and you are now aware of several.

Your changing your password associated with the email address is what is warranted.  Now it's a matter of recognizing the fraud and understanding why you are targeted.  Just delete any future Blackmail Emails.

 

Link to post
Share on other sites

  • 9 months later...

This is still going on.  Here is a latest rendition of this ploy...

 

Quote
Hi there,

Wish you do not care about my english language sentence structure, because
i'm from Philippines. I toxified your machine with a trojan and im in
possession of all your personal files from your operating-system. 

It was set up on a mature internet page and then you've selected the video
and  it, my application instantly got into your computer. 

Then simply, your web-cam recorded you wank, besides i captured a vid that
you've viewed. 

Just after a while additionally, it picked up every one of your social
contact info. In case u wish me to wipe out your everything i have got -
transmit me 640 us in btc it is a crypto. Its my btc wallet transfer address
- bc1qcnl7q0a0yxxxxxxxxxxy0tjgdscdr6kac9c

At this point you will have 28hr s. to decide The minute i will receive the
transaction i am going to wipe out this video and everything completely.
Otherwise, you should be sure this evidence would be forwarded to all of
your contacts.

Do Not Reply to This Email

 

  • Haha 1
Link to post
Share on other sites

  • 5 months later...

Greetings!
Have you seen lately my e-mail to you from an account of yours?
Yeah, that merely confirms that I have gained a complete access to device of yours.

Within the past several months, I was observing you.
Are you still surprised how could that happen? Frankly speaking, malware has infected your devices and it's coming from an adult website, which you used to visit.
Although all this stuff may seem unfamiliar to you, but let me try to explain that to you.

With aid of Trojan Viruses, I managed to gain full access to any PC or other types of devices.
That merely means that I can watch you whenever I want via your screen just by activating your camera as well as microphone, while you don't even know about that.
Moreover, I have also received access to entire contacts list as well as full correspondence of yours.

You may be wondering, "However, my PC is protected by a legitimate antivirus, so how could that happen? Why couldn't I get any alerts?"
To be honest, the reply is quite straightforward: malware of mine utilizes drivers, which update the signatures on 4-hourly basis,
which turns them to become untraceable, and hereby making your antivirus remain idle.

I have collected a video on the left screen where you enjoy wanking, while the video on the right screen shows the video you were watching at that point of time.
Still puzzled how much damage could that cause? One mouse click is enough for me to share this video to your social networks, as well as e-mail contacts of yours.
In addition, I am also able to gain access to all e-mail correspondence as well as messengers used by you.

Below are simple steps required for you to undertake in order to avoid that from occurring - transfer $1550 in Bitcoin equivalent to my wallet
(if you don't know how to complete that, just open your browser and make a google search: "Buy Bitcoin").

My bitcoin wallet address (BTC Wallet) is:

Once the payment has been confirmed, I shall remove the video without delay, and that is end of story - afterwards you won't hear about me again for sure.
The time for you to perform the transaction is 2 days (48 hours).
After this e-mail is opened by you, I will get an automatic notice, which will start my timer.

Any effort to complain will not change anything at all, because this e-mail is simply untraceable, just like my bitcoin address.
I have been developing these plans for quite an extended period of time; so, don't expect any mistake from my side.

If, get to know that you tried to send this message to anyone else, I will distribute your video as described earlier.
 

Edited by AdvancedSetup
Corrected font issue
Link to post
Share on other sites

  • Root Admin
  • Thanks 1
Link to post
Share on other sites

Report the BitCoin Address Here:  https://www.bitcoinabuse.com/

A few more references:

BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites
Malwarebytes' Blog - Sextortion emails: They’re probably not watching you
Malwarebytes Forum sample thread - Got strange threating email.
 

 

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
  • Thanks 1
Link to post
Share on other sites

 

https://www.bitcoinabuse.com/reports/1PUwf7ybLvvKLJ8NpWeaEChz4WFQtnC2Gx

 

 

Wow . This got paid 9 times. It has received a total of 0.30866899 BTC ($12,946.01)  😡

Edited by AdvancedSetup
Corrected font issue
Link to post
Share on other sites

  • 1 month later...

New variant...

Quote

Hey!

 

So, let me be direct, I know you like to watch PONR0GRAPHY videos with yours smartphone and I recorrded you when you MASTURRBATE. Your smart-phone got infected which gave me acess to use your front camera in background , also I copied all your contacts, emails, phone list, social media contacts so I can get a benefit.

So! If u don`t send me 800$ value in lT[C]OIN the video with u doing... you know what, will be sent to each from your entire contacts lists. You can search on Google for [P]axful in order to get the coins and send them to the next address.

 

The amount(approximately): 0.020

The Address Part 1: 199CseQtcZxLJqrfsRMw

The Address Part 2: wWboYvzPzgmXg3

 

Now, you have to copy and paste manually Part 1 and Part 2 in one string made of 34 characters with no space between parts that start with "1" and end with "3" is, the actually address which is CASE SENSITIVE where you must to send my bribery. Time limit is... a few days!

Also... to remove my sneaky stuff from your device search for this, how to restore to factory settings [your phone model] and follow the instructions. As well, you may want to quit this addiction, not good for health.

 

Link to post
Share on other sites

  • 6 months later...

New variation...

Quote
Your Website Has Been CompromisedY0ur Site Has Been Hacked
 
PLEASE FoRWARD THIS EMAIL T0 SoME0NE IN YoUR CoMPANY WH0 iS ALLoWED To MAKE IMPORTANT DECISIoNS!
 
We have hacked your website
https://sickcompany.com
  and extracted your databases.
 
H0w did this happen?
 
our team has f0und a vulnerability within y0ur site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and m0ve the inf0rmati0n t0 an offshore server.
 
What does this mean?
 
We will systematically go through a series 0f steps 0f t0tally damaging y0ur reputati0n. First y0ur database will be leaked 0r s0ld t0 the highest bidder which they will use with whatever their intenti0ns are. Next if there are e-mails f0und they will be e-mailed that their inf0rmation has been s0ld or leaked and your site
https://sickcompany.com
was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that y0u have indexed in the search engines will be de-indexed based off of blackhat techniques that we used in the past to de-index 0ur targets.
 
H0w do i stop this?
 
We are willing t0 refrain fr0m destroying your site’s reputation f0r a small fee. The current fee is $3000 in bitcoins (0.15 BTC).
 
Please send the bitcoin to the foll0wing Bitcoin address (C0py and paste as it is case sensitive):
 
35AwqnL###########AWQv1Am4rMkT
 
 once y0u have paid we will aut0matically get inf0rmed that it was y0ur payment. Please n0te that y0u have to make payment within 3 days after opening this e-mail or the database leak, e-mails dispatched, and de-index 0f your site WiLL start!
 
How do i get Bitcoins?
 
Y0u can easily buy bitcoins via several websites 0r even offline fr0m a Bitcoin-ATM.
 
What if i don’t pay?
 
if you decide n0t t0 pay, we will start the attack at the indicated date and uph0ld it until you do, there’s n0 c0unter measure to this, y0u will only end up wasting more money trying to find a s0luti0n. We will completely destr0y y0ur reputati0n amongst google and your cust0mers.
 
This is n0t a hoax, do n0t reply to this email, d0n’t try t0 reas0n 0r neg0tiate, we will not read any replies. 0nce y0u have paid we will stop what we were d0ing and you will never hear from us again!
 
Please n0te that Bitcoin is an0nym0us and n0 0ne will find out that you have complied. Finally d0n't reply as this email is unmonit0red.

 

Edited by AdvancedSetup
Disabled live hyperlinks
Link to post
Share on other sites

  • 7 months later...

UPDATE: 06/08/'23

Warning: Victims' faces placed on explicit images in sextortion scam

Quote

Posted: June 8, 2023 by Christopher Boyd

The FBI has issued a warning about criminals digitally manipulating people's faces on to pornographic images—known as deepfaking—and then using those images to harass or extort money out of their victim in a practice known as sextortion.

The FBI said the victims include children. From the release:

The FBI continues to receive reports from victims, including minor children and non-consenting adults, whose photos or videos were altered into explicit content. The photos or videos are then publicly circulated on social media or pornographic websites, for the purpose of harassing victims or sextortion schemes.

To hear that children are now being inserted into deepfake creations is horrifying, though perhaps unsurprising. The way these attacks work is that potential victims are contacted through a variety of methods, most commonly by instant messaging apps. Here’s how the FBI describes sextortion:

Sextortion, which may violate several federal criminal statutes, involves coercing victims into providing sexually explicit photos or videos of themselves, then threatening to share them publicly or with the victim's family and friends. The key motivators for this are a desire for more illicit content, financial gain, or to bully and harass others. Malicious actors have used manipulated photos or videos with the purpose of extorting victims for ransom or to gain compliance for other demands (e.g., sending nude photos).

There’s a few different ways sextortion attacks can play out. One of the most basic forms is sending emails to people whose login details have been exposed in a password breach. The email claims to have nude photographs of the recipient, and threaten to release the photos unless the recipient pays up. There are no images, it’s all a lie. 

The more traditional form of sextortion is where a fraudster convinces the person they’re speaking to that they’re interested in romance, obtains revealing images of the victim, and then uses those images for blackmail. The victim is asked to pay money, often wired or through digital currency, or else the images will be sent to the victim’s friends and family. As it’s usually easy to build up a picture of someone’s network on social media like Facebook and Twitter, the pressure may well be too much for the person on the receiving end of such a scam.

That's how it usually works. With deepfakes on the scene, a lot of the pre-scam work can simply be discarded. Now fraudsters go and grab some photos of their target, and feed those images into their faking tool of choice. All of that social engineering, the possibility of the victim not falling for it and sending revealing images is completely done away with. Why bother, when you can just swipe a photograph and press a few buttons?

The end result is the same. In fact, it’s arguably much worse as the pornographic movie creations thrown together by these tools are almost always a lot more graphic than anything a target would probably come up with. The pressure to pay up is going to be immense, and realistically non-internet savvy relatives or friends may not have even heard the word “deepfake” before. What are the chances of them knowing a file landing in their mailbox is fraudulent?

There are several general pieces of advice we can give when talking about the different sextortion tactics which exist:

  • Don’t engage: report. If you’re shown evidence of stolen images, report to your local authorities and the FBI as soon as you can. Never engage with the sextortionist.
  • Be cautious about what you say to someone online. When asked certain questions, be vague and never give specifics.
  • Remember that online, people can pretend to be someone they’re not, and can even look and sound like a different person with today's technology.
  • Personalize your security and privacy settings. Lock down your accounts as much as you can, and keep as much hidden from public view as possible.
  • Data is typically forever. Remember that once you send something to someone—whether they're a stranger, a romantic partner, relative, or friend—you have no control over where it goes next.

 

  • Like 1
  • Thanks 1
Link to post
Share on other sites

4 hours ago, David H. Lipman said:

Never ending supply of losers on the internet eh

  • Like 1
Link to post
Share on other sites

8 minutes ago, mountaintree16 said:

Never ending supply of losers on the internet eh

It is sad that... that is so true.

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
Link to post
Share on other sites

  • 2 weeks later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.