I sent you an email from your account is a new variant of Bitcoin blackmail scam. Bitcoin blackmail scam is a form of scam that uses emails containing threats to extortion and payment. These emails say that someone (hackers or a group of hackers) hacked into the computer (email account) and recorded the user visiting adult sites. Criminals threaten to distribute this video to the user’s friends and family within hours if the user does not pay the ransom to their Bitcoin address.
Text presented in this scam email:
As you may have noticed, I sent you an email from your account.
This means that I have full access to your account: On moment of hack your account has password: ***
You say: this is the old password!
Or: I will change my password at any time!
Yes! You’re right!
But the fact is that when you change the password, my trojan always saves a new one!
I’ve been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use.
If you want to prevent this, transfer the amount of $780 to my bitcoin address (if you do not know how to do this, write to Google: Buy Bitcoin).
My bitcoin addresses (BTC Wallets) are: 1NL9MTdnTxsVxEg9nHeY5oiw5U9Mxzsh8v
After receiving the payment, I will delete the video and you will never hear me again.
I give you 48 hours to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
There are many variants of this scam email, scammers constantly change the text of emails to make it difficult for spam filters to work. In addition, in some cases, criminals can translate the text of the scam emails into other languages, thus targeting a specific group of Internet users. But in any case, the meaning of the emails remains the same. Scammers claim that they have got full access to the victim’s e-mail (they know the username and password). As proof of this, the criminals indicate that the sender’s address is the victim’s email address. The scam email also claims that the victim’s computer is infected with a trojan virus that allows criminals to control the computer, turn on the connected microphone and camera, and also find out the password if the user creates a new one. The scammers claim that this trojan was installed on the computer when the user visited adult sites. Moreover, the people behind this scam claim that they were able to record a video that could compromise the recipient of the email. This video can be sent to all addresses of the victim if the victim does not pay $780 in bitcoins within 48 hours.
|Name||I sent you an email from your account EMAIL SCAM|
|Type||Bitcoin Blackmail Scam|
|Bitcoin address||1Q7VHR6XgCUFGTUDfVoaGTxLQUwR4xjHMv, 18vAy1BR5Ro5EZh8RCgL27pBSxJjWXK7u5, 19Q3HZtnznuB5cuWng8cacwqZV13gNpZaN, 1HPhZrmyevkNXKo1MYnZG1A65p2PtyEpqcw, 1NL9MTdnTxsVxEg9nHeY5oiw5U9Mxzsh8v, 12yCNJHAwda8Kgxv9DswpS9k16XnstSqcJ|
|Distribution method||spam email campaigns|
There is one thing that the scam email does to make itself appear real. It uses your own e-mail address as the “From” address, but do not be fooled. This scam uses so-called “email spoofing”. Email spoofing is the creation of email messages with a forged sender address. Email spoofing has been around for a long time! Scammers use it in phishing attacks to force users into thinking they have received mail message from a friend or trusted person.
What to do when you receive the “I sent you an email from your account” email scam
If you have received the “I sent you an email from your account” email scam, just ignore the scammers’ empty threats. The best way to deal with the Bitcoin email scam is to mark the email as spam (JUNK) and move it to trash! After that, follow some easy steps listed below!
- Do not panic.
- Do not pay the ransom!!!
- Do not respond to the email spam.
- If the password emailed to you is one that you still use, then stop using it and change it right now!
- Avoid clicking links in email.
- Scan your computer for malware
- Install an anti-phishing software
- If you receive an email scam that is similar but not the same as the example above, make sure you remove any personal info in this message, then post it as comment on this blog post.
How to scan your your computer malware
If you are having problems with malware or just wish to scan your PC system for malicious software, then download MalwareBytes Free. It’s free for home use, and searches for and deletes various undesired programs that attacks your system or degrades system performance. MalwareBytes Free can delete ad-supported software, potentially unwanted programs as well as malicious software, including ransomware and trojans.
Installing the MalwareBytes Free is simple. First you’ll need to download MalwareBytes Free by clicking on the following link. Save it to your Desktop.
Category: Security tools
Update: April 15, 2020
Once downloading is finished, close all programs and windows on your computer. Double-click the install file called mb3-setup. If the “User Account Control” dialog box pops up as shown on the screen below, click the “Yes” button.
It will open the “Setup wizard” that will help you install MalwareBytes on your PC system. Follow the prompts and don’t make any changes to default settings.
Once installation is finished successfully, press Finish button. MalwareBytes Free will automatically start and you can see its main screen as shown in the figure below.
Now press the “Scan Now” button to perform a system scan for malware and other kinds of potential threats such as trojans, adware and PUPs. A scan can take anywhere from 10 to 30 minutes, depending on the number of files on your computer and the speed of your computer. When a malware, adware or potentially unwanted applications are detected, the count of the security threats will change accordingly.
When the scan is finished, MalwareBytes Anti-Malware will show a list of all threats detected by the scan. All detected items will be marked. You can delete them all by simply press “Quarantine Selected” button. The MalwareBytes AntiMalware will remove malware and potentially unwanted applications and move threats to the program’s quarantine. After the cleaning procedure is complete, you may be prompted to restart the computer.
We advise you look at the following video, which completely explains the process of using the MalwareBytes Free to remove adware, hijacker and other malware.
How to protect your computer from phishing web-sites and stay safe online
If you browse the Internet, you cannot avoid malvertising and phishing web-sites. But you can protect your internet browser against it. Download and use an ad blocker program. AdGuard is an ad blocker which can filter out lots of of the malvertising, blocking dynamic scripts from loading harmful content.
- Download AdGuard by clicking on the link below. Save it to your Desktop so that you can access the file easily.
Author: © Adguard
Category: Security tools
Update: November 15, 2018
- When the downloading process is finished, launch the downloaded file. You will see the “Setup Wizard” program window. Follow the prompts.
- Once the installation is finished, click “Skip” to close the install program and use the default settings, or press “Get Started” to see an quick tutorial which will allow you get to know AdGuard better.
- In most cases, the default settings are enough and you do not need to change anything. Each time, when you start your computer, AdGuard will launch automatically and block unwanted ads, phishing web-sites, as well as other harmful or misleading web pages. For an overview of all the features of the program, or to change its settings you can simply double-click on the icon called AdGuard, which is located on your desktop.