You may have arrived at this article because you are seeing the “So I’m the hacker who broke your email” message in your mail box. Lots of people had received emails from someone claiming to have hacked their email and device. The scammers threatened to send “insane images from darker secret life” — to all of their contacts unless they paid a ransom. The wording varies to some extent, but the email looks something like this:
Hey there So I'm the hacker who broke your email and device a several weeks ago. You entered your passcode on one of the internet sites you visited, and I intercepted it. This is your password from *** on moment of compromise: *** However you can can change it, or even already changed it. Nevertheless this would not make a difference, my personal malware modified it every time. Do not really attempt to get in touch with me or even find me, it is impossible, since I sent you mail from your account only. Through your own e-mail, I uploaded malware code to your Operation System. I saved all of your current contacts along with friends, colleagues, relatives as well as a total record of visits to the World wide web resources. Also I installed a Virus on your device. You're not my only prey, I typically lock computers and ask for the ransom. Nonetheless I ended up being struck through the web pages of intimate content material that you frequently pay a visit to. I am in great shock of your own fantasies! I have certainly not noticed something like this! Consequently, when you had fun on piquant web pages (you know what I am talking about!) I made screen shot with using my program by your camera of yours system. After that, I combined them to the content of the currently viewed site. There will be giggling when I send these images to your associates! Yet I'm certain you wouldn't like that. Hence, I expect to have payment from you for my quiet. I consider $900 is an acceptable price regarding this! Pay with Bitcoins. My BTC wallet: 16Qb89akfcw4yVP6TR9pURFkAgdHc6sC5T In case you do not really know how to do this - enter into Google 'how to transfer money to the bitcoin wallet'. It is simple. Immediately after receiving the specified amount, all your data will be immediately destroyed automatically. My virus will additionally remove itself through your os. My Trojan viruses have auto alert, so I know when this specific e mail is opened. I give you two days (48 hours) to make a payment. If this does not occur - every your associates will get insane images from your darker secret life and your device will be blocked as well after two days. Do not end up being foolish! Law enforcement or buddies won't aid you for sure ... P.S I can provide you with advice with regard to the future. Do not enter your security passwords on unsafe web pages. I wish for your discretion. Farewell.
How are you? So I am the hacker who broke your email and device a several weeks ago. You typed in your password on one of the websites you visited, and I intercepted it. This is your password from *** on moment of hack: *** Of course you can can change it, or perhaps already changed it. However this will not matter, my malware modified it each and every time. Do not consider to make contact with me or even find me, it is impossible, since I sent you email from your account only. Via your e-mail, I uploaded malicious program code to your Operation System. I saved all your contacts along with buddies, fellow workers, family members as well as the full history of visits to the Internet resources. Also I installed a Trojan on your system. You aren't my only victim, I typically lock computer systems and ask for a ransom. But I ended up being hit through the web pages of passionate content material that you often pay a visit to. I am in shock of your current fantasies! I've never ever noticed anything like this! So, when you had enjoyment on piquant internet sites (you know what I mean!) I made screenshot with utilizing my program via your camera of yours device. And then, I put together them to the content of the currently seen website. Now there is going to be giggling when I send these pics to your friends! However I'm sure you do not want that. Therefore, I expect to have payment from you for my quiet. I think $900 is an acceptable cost for this! Pay with bitcoins. My BTC wallet is E6W7ANMjGrz5o2FJxFNGziD3siCeiGwqm If you do not understand how to do this - submit into Google 'how to send money to the bitcoin wallet'. It is not difficult. Following getting the given amount, all your information will be promptly eliminated automatically. My malware will also remove itself from your computer. My Trojan have auto alert, so I know when this particular e-mail is opened. I give you 2 days (Forty eight hrs) for you to make a payment. If this does not happen - all your friends will get nuts pictures from your dark secret life and your system will be blocked as well after two days. Do not end up being stupid! Cops or friends won't assist you for sure ... PS I can give you recommendation for the future. Do not key in your security passwords on unsafe websites. I expect for your wisdom. Good-bye.
Scammers claim to have Trojan or malicious program onto your device to take screenshots when you’re watching piquant web pages (passionate content material or p*rn?). Having supposedly stolen your contacts along with friends, workers, family members, they demand a $900 ransom within 2 days (Forty eight hrs) or they’ll send the “pictures from your dark secret life” to everyone you know.
Should you pay? The best advice is: Don’t pay the ransom.
The “So I’m the hacker who broke your email” message is a phishing spam. It is based on the fact that:
- this email has been sent to countless people like any other widespread email spam
- this fraudulent message have the “spam” style grammar
- computer security professionals has determined that this scam email attempts to force users into paying the requested ransom and that no actual screenshots exists
So, do not fall for this email scam, just delete it.
How to Protect Yourself
To Protect Yourself, use the steps below:
- If your password was included in this email scam, then change it immediately (might be smart to change passwords for all important accounts)
- Keep anti-phishing, anti-malware and anti-virus software updated and run scan for malware routinely
- Beware of email messages demanding private information
- Uninstall unknown and suspicious software
- Scan your computer for malware with MalwareBytes Free
- Install anti-phishing protection software
Uninstall unknown and suspicious software
In order to remove unknown and suspicious software, open the MS Windows Control Panel and click on “Uninstall a program”. Check the list of installed applications. For the ones you do not know, run an Internet search to see if they are ad supported software, browser hijacker or PUPs. If yes, delete them off. Even if they are just a software that you do not use, then uninstalling them off will increase your computer start up time and speed dramatically.
Make sure you have closed all web browsers and other applications. Next, delete any undesired and suspicious applications from your Control panel.
Windows 10, 8.1, 8
Now, click the Windows button, type “Control panel” in search and press Enter. Choose “Programs and Features”, then “Uninstall a program”.
Look around the entire list of apps installed on your personal computer. Most probably, one of them is the PUP and other security threats. Select the questionable program or the application that name is not familiar to you and delete it.
Windows Vista, 7
From the “Start” menu in MS Windows, select “Control Panel”. Under the “Programs” icon, select “Uninstall a program”.
Select the questionable or any unknown software, then click “Uninstall/Change” button to remove this unwanted program from your personal computer.
Click the “Start” button, select “Control Panel” option. Click on “Add/Remove Programs”.
Select an undesired program, then click “Change/Remove” button. Follow the prompts.
Scan your computer for malware with MalwareBytes Free
You can scan for and remove malware through the use of MalwareBytes Anti-Malware. We recommend this free malware removal tool because it may easily remove potentially unwanted programs, adware, potentially unwanted apps and toolbars with all their components such as files, folders and registry entries.
Installing the MalwareBytes is simple. First you will need to download MalwareBytes AntiMalware (MBAM) on your MS Windows Desktop from the link below.
Category: Security tools
Update: July 25, 2019
When the downloading process is finished, run it and follow the prompts. Once installed, the MalwareBytes AntiMalware will try to update itself and when this task is finished, click the “Scan Now” button to detect malware related files, folders and registry keys. A system scan can take anywhere from 5 to 30 minutes, depending on your computer. When a malware, ad supported software or potentially unwanted programs are detected, the count of the security threats will change accordingly. When you’re ready, click “Quarantine Selected” button.
The MalwareBytes Anti-Malware is a free program that you can use to get rid of all detected folders, files, services, registry entries and so on. To learn more about this malicious software removal utility, we recommend you to read and follow the few simple steps or the video guide below.
Install anti-phishing protection software
It is important to use ad-blocking apps such as AdGuard to protect your personal computer from Phishing, misleading and malicious pages. Most security experts says that it is okay to stop annoying and unwanted advertisements. You should do so just to stay safe!
Please go to the following link to download AdGuard. Save it to your Desktop.
Author: © Adguard
Category: Security tools
Update: November 15, 2018
After the download is finished, start the downloaded file. You will see the “Setup Wizard” screen as displayed in the following example.
Follow the prompts. When the setup is finished, you will see a window as shown on the screen below.
You can click “Skip” to close the install program and use the default settings, or click “Get Started” button to see an quick tutorial that will allow you get to know AdGuard better.
In most cases, the default settings are enough and you don’t need to change anything. Each time, when you start your system, AdGuard will start automatically and block unwanted pop up ads, as well as other phishing, malicious or misleading web pages. For an overview of all the features of the program, or to change its settings you can simply double-click on the AdGuard icon, that can be found on your desktop.