If you are reading this because you have received a email titled “High level of danger. Account was under attack.” and you are worried, you can stop worrying! This message is a new highly effective email scam. This scam uses your email account name to convince you that the hacker was able to hack your computer or other device, get full access to your email and use you webcam to take a video while you watch adult websites (porn). In order to keep this video from being sent to your contacts, the criminal demands a ransom payment in bitcoins.
Myantispyware.com continue to receive reports of fraudulent messages. Here below is an example. Recent version demands $779 ransom payment (BTC Wallet is: 1JmfaVr3x5fRKRmuhUBpWNQFy51Sfo4T6u).
High level of danger. Account was under attack. Hello! As you may have noticed, I sent you an email from your account. This means that I have full access to your account. I've been watching you for a few months now. The fact is that you were infected with malware through an adult site that you visited. If you are not familiar with this, I will explain. Trojan Virus gives me full access and control over a computer or other device. This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it. I also have access to all your contacts and all your correspondence. Why your antivirus did not detect malware? Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent. I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched. With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use. If you want to prevent this, transfer the amount of $779 to my bitcoin address (if you do not know how to do this, write to Google: “Buy Bitcoin”). My bitcoin address (BTC Wallet) is: 1JmfaVr3x5fRKRmuhUBpWNQFy51Sfo4T6u After receiving the payment, I will delete the video and you will never hear me again. I give you 48 hours to pay. I have a notice reading this letter, and the timer will work when you see this letter. Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address. I do not make any mistakes. If I find that you have shared this message with someone else, the video will be immediately distributed. Best wishes!
There are variations in the wording of the email body, but all of these messages are basically the same. The scammers constantly switch up the body of a scam email in order to bypass spam filters.
What to do when you receive “High level of danger. Account was under attack.” email scam
Here are some easy steps which you need to follow after receiving these emails.
- Do not panic.
- Do not pay the ransom.
- Do not respond to the email spam.
- Mark the email as SPAM (junk mail)
- Avoid clicking links in email.
- Cover over your computer’s cam and add a micblock to the microphone port.
- Report any scams like these to the FBI’s Internet Crime Complaint Center.
- Scan your computer for malware
- Install an anti-phishing software
- If you receive an email that is similar but not the same as the example above, make sure you remove any personal info in this message, then post it as comment on this article.
How to scan your computer for malware and protect your PC from phishing scams
There are a few methods that can be used to scan your computer for malware and protect your system from phishing scams. Most cyber threat analysts states that Zemana Anti Malware, MalwareBytes Anti Malware (MBAM) or HitmanPro tools are a right choice. These free applications are able to scan for and remove malware from your computer and protect your computer from phishing attacks.
- How to uninstall suspicious software through the Windows Control Panel
- How to detect and remove malware
- How to stay safe online
How to uninstall suspicious software through the Windows Control Panel
First method for manual malware removal is to go into the Windows “Control Panel”, then “Uninstall a program” console. Take a look at the list of applications on your system and see if there are any dubious and unknown software. If you see any, you need to remove them. Of course, before doing so, you can do an Internet search to find details on the application. If it is a potentially unwanted application, adware or malware, you will likely find information that says so.
Windows 10, 8.1, 8
Click the MS Windows logo, and then click Search . Type ‘Control panel’and press Enter as on the image below.
Once the ‘Control Panel’ opens, click the ‘Uninstall a program’ link under Programs category like below.
Windows 7, Vista, XP
Open Start menu and select the ‘Control Panel’ at right as displayed in the figure below.
Then go to ‘Add/Remove Programs’ or ‘Uninstall a program’ (MS Windows 7 or Vista) as shown on the screen below.
Carefully browse through the list of installed software and remove all suspicious and unknown apps. We suggest to press ‘Installed programs’ and even sorts all installed programs by date. After you’ve found anything questionable that may be a malware or other unwanted software, then select this program and click ‘Uninstall’ in the upper part of the window. If the suspicious program blocked from removal, then use Revo Uninstaller Freeware to completely remove it from your personal computer.
How to detect and remove malware
HitmanPro is a portable application which requires no hard install to detect and remove malware related files, folders and registry keys. The application itself is small in size (only a few Mb). HitmanPro does not need any drivers and special dlls. It’s probably easier to use than any alternative malware removal tools you have ever tried. HitmanPro works on 64 and 32-bit versions of Windows 10, 8, 7 and XP. It proves that removal utility can be just as useful as the widely known antivirus programs.
- HitmanPro can be downloaded from the following link. Save it on your Desktop.
Category: Security tools
Update: June 28, 2018
- After the downloading process is done, double click the Hitman Pro icon. Once this utility is started, click “Next” button to find out malware, adware and other unwanted software. A system scan can take anywhere from 5 to 30 minutes, depending on your computer. While the HitmanPro application is scanning, you can see count of objects it has identified as a security threat.
- When finished, a list of all threats detected is produced. In order to remove all threats, simply click “Next” button. Now click the “Activate free license” button to begin the free 30 days trial to remove all malware found.
How to stay safe online
If you surf the World Wide Web, you can’t avoid phishing web-sites and malicious advertising. But you can protect your web browser against it. Download and use an ad-blocking program. AdGuard is an ad-blocking which can filter out tons of of the malicious advertising, stoping dynamic scripts from loading harmful content.
Visit the page linked below to download AdGuard. Save it to your Desktop.
Author: © Adguard
Category: Security tools
Update: November 15, 2018
After downloading is finished, double-click the downloaded file to start it. The “Setup Wizard” window will show up on the computer screen as shown below.
Follow the prompts. AdGuard will then be installed and an icon will be placed on your desktop. A window will show up asking you to confirm that you want to see a quick instructions as displayed in the figure below.
Click “Skip” button to close the window and use the default settings, or click “Get Started” to see an quick tutorial that will allow you get to know AdGuard better.
Each time, when you start your personal computer, AdGuard will launch automatically and stop unwanted pop up advertisements, as well as other malicious or misleading web sites. For an overview of all the features of the program, or to change its settings you can simply double-click on the AdGuard icon, which can be found on your desktop.