If you are reading this because you have received a email titled “Security Notice. Someone have access to you system.” and you are worried, you can stop worrying! This message is a new highly effective email scam. This email scam uses your email account name and old password to convince you that the hacker was able to hack your computer or other device, get full access to your email and use you webcam to record a video clip while you watch adult websites (porn). In order to keep this video from being sent to your contacts, the criminal demands a ransom payment in bitcoins.
Myantispyware.com continue to receive reports of fraudulent messages. There are variations in the wording of the email body, but all of these messages are basically the same. The scammers constantly switch up the body of scam emails in order to bypass spam filters.
Here below is an example. Recent version demands $700 ransom payment (Bitcoin Wallet Address is: 1FVuyuSN41aa3JN9sn8qkuD2PmaMEMHHnc).
Security Notice. Someone have access to you system. I'll begin with the most important. I hacked your device and then got access to all your accounts... Including ***. It is easy to check - I wrote you this email from your account. Also I have an old password for the hacking day: *** Moreover, I know your intim secret, and I have proof of this. You do not know me personally, and no one paid me to check you. It is just a coincidence that I discovered your mistake. In fact, I posted a malicious code (exploit) to an adult site, and you visited this site... While watching a video Trojan virus has been installed on your device through an exploit. This darknet software working as RDP (remote-controlled desktop), which has a keylogger, which gave me access to your microphone and webcam. Soon after, my software received all your contacts from your messenger, social network and email. At that moment I spent much more time than I should have. I studied your love life and created a good video series. The first part shows the video that you watched, and the second part shows the video clip taken from your webcam (you are doing inappropriate things). Honestly, I want to forget all the information about you and allow you to continue your daily life. And I will give you two suitable options. Both are easy to do. First option: you ignore this email. The second option: you pay me $700(USD). Let's look at 2 options in detail. The first option is to ignore this email. Let me tell you what happens if you choose this path. I will send your video to your contacts, including family members, colleagues, etc. This does not protect you from the humiliation that you and your family need to know when friends and family members know about your unpleasant details. The second option is to pay me. We will call this "privacy advice." Now let me tell you what happens if you choose this path. Your secret is your secret. I immediately destroy the video. You continue your life as if none of this has happened. Now you might think: "I'll call to police!" Undoubtedly, I have taken steps to ensure that this letter cannot be traced to me, and it will not remain aloof from the evidence of the destruction of your daily life. I don't want to steal all your savings. I just want to get compensation for my efforts that I put in to investigate you. Let us hope that you decide to create all this in full and pay me a fee for confidentiality. You make a Bitcoin payment (if you don't know how to do it, just enter "how to buy bitcoins" in Google search) Shipping amount: $700(USD). Getting Bitcoin Addresses: 1FVuyuSN41aa3JN9sn8qkuD2PmaMEMHHnc (This is sensitive, so copy and paste it carefully) Don't tell anyone what to use bitcoins for. The procedure for obtaining bitcoins can take several days, so do not wait. I have a spetial code in Trojan, and now I know that you have read this letter. You have 48 hours to pay. If I don't get BitCoins, I'll send your video to your contacts, including close relatives, co-workers, and so on. Start looking for the best excuse for friends and family before they all know. But if I get paid, I immediately delete the video. This is a one-time offer that is non-negotiable, so do not waste my and your time. Time is running out. Bye!
It’s important to understand that the email scam is social engineering tool. Scammers uses the database of emails and stolen passwords to increase trust and sent this email scam out to millions of people around the World in the hope of tricking a least a few people into sending the requested ransom. If the password emailed to you is one that you still use, then stop using it and change it right now!
What to do when you receive “Security Notice. Someone have access to you system.” email scam
Relax, Here are some easy steps which you need to follow after receiving these emails.
- Do not panic.
- We recommend you do not pay a ransom, because your payment will only increase attacks against you.
- Stop using the password that the scammer used in the email scam and change it. Make sure that you do not repeat passwords.
- If there’s a link in the scam email, do not click it, otherwise you could unwittingly install malware or ransomware on your computer.
- Report the email scam to the FBI.
- Scan your computer for malware.
- Install an anti-phishing software.
- If you receive an email that is similar but not the same as the example above, make sure you remove any personal info in this message, then post it as comment on this article. It will help our team monitor the latest scams.
How to scan your computer for malware
There are not many good free malware removal tools with high detection ratio. The effectiveness of malware removal utilities depends on various factors, mostly on how often their virus/malware signatures DB are updated in order to effectively detect modern malicious software, ad-supported software, hijacker infections and other potentially unwanted apps. We recommend to run several applications, not just one. These applications that listed below will allow you remove all components of the ad supported software from your disk and Windows registry.
How to remove malware with Zemana Anti Malware (ZAM)
You can remove malware automatically with a help of Zemana Free. We advise this malware removal utility because it can easily detect and remove malware, browser hijackers, PUPs, adware with all their components such as folders, files and registry entries.
Visit the page linked below to download Zemana Anti-Malware. Save it on your Microsoft Windows desktop or in any other place.
Author: Zemana Ltd
Category: Security tools
Update: July 16, 2019
After the downloading process is finished, close all software and windows on your PC system. Double-click the install file called Zemana.AntiMalware.Setup. If the “User Account Control” prompt pops up as displayed in the following example, click the “Yes” button.
It will open the “Setup wizard” which will help you install Zemana Anti-Malware (ZAM) on your personal computer. Follow the prompts and do not make any changes to default settings.
Once installation is done successfully, Zemana Anti Malware (ZAM) will automatically start and you can see its main screen as shown below.
Now press the “Scan” button to perform a system scan for malware. A system scan can take anywhere from 5 to 30 minutes, depending on your PC system. While the Zemana Anti-Malware is scanning, you may see count of objects it has identified either as being malware.
Once Zemana has finished scanning, the results are displayed in the scan report. Review the scan results and then press “Next” button. The Zemana will delete malicious software and add threats to the Quarantine. After the process is finished, you may be prompted to reboot the system.
How to protect yourself from phishing web-sites
One of the worst things is the fact that you cannot stop all phishing web-sites using only built-in Windows capabilities. However, there is a program out that you can use to block phishing web-sites, malicious and misleading web-pages in any modern browsers including Google Chrome, Microsoft Internet Explorer, Mozilla Firefox and Microsoft Edge. It’s called Adguard and it works very well.
- Click the link below to download AdGuard. Save it to your Desktop.
Author: © Adguard
Category: Security tools
Update: November 15, 2018
- After downloading it, start the downloaded file. You will see the “Setup Wizard” program window. Follow the prompts.
- After the install is finished, click “Skip” to close the setup program and use the default settings, or click “Get Started” to see an quick tutorial that will allow you get to know AdGuard better.
- In most cases, the default settings are enough and you don’t need to change anything. Each time, when you launch your computer, AdGuard will launch automatically and stop unwanted ads, block phishing web-sites, as well as other malicious or misleading pages. For an overview of all the features of the program, or to change its settings you can simply double-click on the icon called AdGuard, which can be found on your desktop.