πΈ’π πππ πππππ ππ ππππππππ π’πππ ππππππππππππ ππππππππ is a new Bitcoin Email Scam that has been spreading on the Internet recently. Many people around the world have received similar email letters and reported about them on Reddit, other websites and public forums. We have repeatedly written about such emails, for example here and here.
Scammers use threats to get a ransom from the recipients of the emails. Despite the fact that these email messages are very suspicious, and most people simply delete them, scammers hope that at least a few recipients will be naive enough and pay a ransom.
There are variations in the wording of the email body, but all of these messages are basically the same. Below are some examples of this spam:
Example 1:
πΈ’π πππ πππππ ππ ππππππππ π’πππ ππππππππππππ ππππππππ. πΌπ’ ππ’ππ πππ πππππππ’ ππππππ ππ π’ππ. ππππ ππππππππ ππ π’πππ πππππ πππ πππ’ πππ πππππππ ππππππ, π’πππ ππππ’ππππ ππππππππ πππ , ππππππππ. πΈπ π’ππ ππππ π’ππ πππ ππππππ’ πππππππ πππ ππππππ πππππ πππ ππππ ππ π πππ π’πππ πππππ’πππ’ ππππ, π’ππ πππ πππππππππππ’ πππππππ π ππππ, ππππ. πΈ ππ πππππππ πππ πππππ ππππππππππ πππππππππ’ ππ πΈ πππππ ππππ πππππ. πΈ ππ πππππππ πππππ’πππ π ππππ ππππππππππ’ ππππ πππ π πππ π’πππ πππππ πππππ. πππ ππππ ππππ ππ ππππππππππ, πππ ππππ π ππ ππ ππππππ πΈ πππ ππ ππππππ. πΈπ π’ππ πππ’π ππππ πππ πππππ’ (π’ππ πππ, πππππ πππ πππππππππ πππ !) ππ πππ ππππππππππ πππππππ πππππππ, πΈ π πππ π-ππππ π’πππ πππππ ππ π’πππ ππππππππ πππππππ, ππππππ’ πππππππ, πππππ’ ππππππ πππππππ ππππππ π’ππ ππππππππ£π. π±ππ² π°ππππππ: 1CNGA**mgz7vNZTPJntn7jo**XiqHEhd1C6Qw5 π²πππ’ & πππππ ππ πππ ππππππ ** ππππ ππ ππππππππ’: πΆ.πΊ π±ππ² ππππ ππππ. ππππ ππ ππππππππππ’ ππΈπ²πΊπΈπ½πΆ. ππππ πππππ’ ππππππ πππππππ ππππππ, π’ππ π πππ ππ π ππππ’ πππ ππππππ ππ ππππππππππππ ππππ ππππππππ πππ ππππ ππππ. πΈ πππππππ π’ππ π πππ ππππ ππππππππππππππ’ πππ ππππ ππππππππ πππ πππππππ ππ ππ’ πππ. πΎπ ππππ π’ππ πππ ππππππππ πππππππππ π’πππππππ ππ ππ πππππππππ ππππ πππ ππππππππππππ. ππΎπ π·π°π π΄ π·πΎ π·πΎπππ π°π½π³ πΊπ· πΌπΈπ½πππ΄π πΏ.π: πΈπ π’ππ ππππ πππππ ππππππ πππππ ππππ π-ππππ… πΈπ π’ππ ππππ ππ ππππππ… πΈπ π’ππ ππππ ππ πππππππ πππ ππππππππππ (πππ ππππ πππππ πππ’ πππππππ ππππππ) πΈ π πππ π½ππ πππππ ππ!
Example 2:
πΈ’π πππ πππππ ππ πππππππ π’πππ ππππππππππππ ππππππππ. πΌπ’ ππ’ππ πππ ππππππ ππ π’ππ. πππΎπΏ πππππππ ππ π’πππ πππππ πππ πππ’ πππ πππππ πππ ππππππ, π’πππ ππππ’ ππππ ππππ πππ , ππππππππ. πΈπ π’ππ ππππ π’ππ πππ ππππππ’ ππππππ πππ πππππ πππ ππ ππ π πππ π’πππ ππππ, π’ππ πππ πππππππππππ’ πππππππ ππππππππ, πππ. πΈ ‘π ππππππππππ πππ ππππππ πππππππππππ’ ππ πΈ πππππ ππππ π πππππππ. πΈ ππ ππππ ππππππ π ππππ ππππππππππ’ ππππ ππππππππ ππ π’πππ πππππ. πππ ππππ ππππ ππ πππππππ, πππ ππππ π ππ ππ ππππππππ πΈ ππππππ ππ ππππππ. πΈπ π’ππ ππ πππ ππππ πππ πππππ’ (ππππππ, πππ πππ ππππ ππ πππ !) ππ πππ πππππ πππππππ πππππππ, πΈ π πππ πππππ π’πππ πππππ ππππ ππ π’πππ ππππππππ πππππππ, ππππππ’ πππππππ, ππππππ πππππ’ ππππππ πππππππ πππππ πππππ π’ππ ππππ . π±ππ² π°ππππππ: 1JcAf**Bm8ojyBC82Hqj4r**wiXVyGU3vLsCDM π²πππ’ & πππππ ππ πππ ππππππ ** ππππ ππ ππππππππ’: πΆ.π» π±ππ² ππππ ππππ. πΏπππππππ ππππ ππ ππππππππππ’ ππΈπ²πΊπΈπ½πΆ. ππππ πππππ’ ππππππ πππππππ ππππππ, π’ππ π πππ ππ π ππππ’ πππ ππππππ ππ ππππππππππππ πππ ππππ π πππππ ππ πππππ πππ ππππ ππππ. πΈ ππππππ’ ππππ π’ππ π πππ ππππ πππ πππππ πππππππ πππ ππππππππ ππ ππ’ ππππππππππ. πΎπ ππππ π’ππ πππ’ πππππ πππππππ π’πππππππ πππππ’ ππ ππππππ ππππ πππ ππππππππππππ. ππΎπ π·π°π π΄ πΈπ· π·πΎπππ π°π½π³ π»πΈ πΌπΈπ½πππ΄π πΏ.π: πΈπ π’ππ ππππππ πππππ ππππππ πππππ ππππ πππππ… πΈπ π’ππ πππππππ ππ ππ πππ ππππππππ… πΈπ π’ππ ππππ ππ ππππ πππ ππππππππππ (πππ πππ’ πππππππ ππππππ) πΈ π πππ πππππππππ’ π½ππ ππππππ ππ!
Example 3:
πΈ’π πππ πππππ ππ ππππππ π’πππ ππππππππππππ ππππππππ. πΌπ’ ππ’ππ πππ ππππππ ππ π’ππ. πππΎπΏ ππππ’πππ ππ π’πππ ππππ πππ πππ ππππ πππ πππππ πππ ππππππ, π’πππ ππππ’ ππππ πππππ ππ ππ πππ πππ , ππππππππ. πΈπ π’ππ πππππ π’ππ πππ ππππππ’ πππππππ πππ ππππππ π-ππππ πππ ππππ ππ π πππ π’πππ ππππ, π’ππ πππ ππππππππππππππ’ πππππππ ππππππππ, ππππππ. πΈ ππ πππππππ πππ πππππ ππππππππππ πππππ ππ ππ’ ππ πΉ πππππ πππππ. πΈ ππ ππππ πππππ’πππ π ππππ πππππ’ π’πππ πππππ πππππ. πππ ππππ ππππ ππ ππππππππππ, πππ ππππ π ππ ππ ππππππππ πΈ ππππππ ππ ππππ. πΈπ π’ππ ππ πππ ππππ πππ πππππ’ (ππππππ, ππππππ πππ πππππππππ πππ !) ππ πππ πππ π πππππ πππππππ πππππππ, πΈ π πππ πππππππ π’πππ πππππ πππππππ ππ π’πππ πππππππ, ππππππ’ πππππππ, ππππ πππ πππππ’ ππππππ πππππππ πππππ πππππ π’ππ ππππππππ’. π±ππ² π°ππππππ: 1AGX7oToekEVPn5b**PEty7qPnRi1f1nqDJj π²πππ’ πππ πππππ ππ πππ ππππππ ** ππππ ππ π°πππππ: πΆ.π» π±ππ² ππππ ππππ. ππππ ππππππ’ ππΈπ²πΊπΈπ½πΆ. ππππ πππππ’ ππππππ πππππππ ππππππ, π’ππ πππ π ππππππ πππ ππππππ ππ ππππππππππππ ππ π πππ ππ ππππππππ πππ ππππππππ. πΈ ππ‘ππππ π’ππ π πππ ππππ ππππππππππππππ’ πππ πππππππ ππππππππ πππ ππππππππ ππ πππ ππππππππππππ. πΎπ ππππ π’ππ πππ πππππ πππππππ π’πππππππ πππππ’ ππ ππππππ ππππ πππ ππππππππππππ. ππΎπ π·π°π π΄ πΈπΉ π·πΎπππ π°π½π³ πΉπ» πΌπΈπ½πππ΄π πΏ.π: πΈπ π’ππ ππππ ππππππ πππππ ππππ π ππππ… πΈπ π’ππ πππππππ ππ ππ πππ ππππππππ… πΈπ π’ππ ππ πππ πππππππ ππ ππππ πππ πππ πππ’ππππ (πππ ππππ πππππ πππ’ πππππππ ππππππ) πΈ π πππ π½ππ ππππππππ ππ!
Example 4:
πΈ’π πππ πππππ ππ πππππππππ π’πππ ππππππππππππ ππππππππ. πΌπ’ ππ’ππ πππ πππππππ’ ππππππ ππ π’ππ. πππΎπΏ ππππ’πππ ππ ππππ πππ πππ ππππ πππ πππππ πππ ππππππ, π’πππ ππππ’ ππππ πππππ πππ , ππππππππ. πΈπ π’ππ πππππ π’ππ πππ ππππππ’ πππππππ πππ ππππππ πππππ πππ ππ ππ π πππ π’πππ πππππ’πππ’ ππππ, π’ππ πππ πππππππππππ’ πππππππ πππππ, ππππ. πΈ ‘π πππππππ πππ πππππ πππππ πππππ ππππ ππππππ ππ πΉ πππππππππππ’ π πππππππ. πΈ ππ πππππππ πππππ’πππ π ππππ ππππππππππ’ ππππ ππππππππ ππ π’πππ ππππππ. πππ ππππ ππππ ππ ππππππππππ, πππ ππππ π ππ ππ ππππππππ πΈ ππππππ ππ ππππ. πΈπ π’ππ πππ’π ππππ πππ πππππ’ (ππππ’π πππππ, ππππππ πππ ππππ ππ πππ !) ππ πππ πππππ πππππππ πππππππ, πΈ π πππ π-ππππ π’πππ πππππ ππ π’πππ ππππππππ πππππππ, ππππππ’, πππππ’ ππππ ππππππ πππππππ ππππππ π’ππ ππππππππ£π. π±ππ² π°ππππππ: 19Vp12UV5**AqUnrpnuCTYJKs7Wz4fF**SnSJE π²πππ’ & πππππ ππ πππ ππππππ ** ππππ ππ π°πππππ: πΆ.π» π±ππ² ππππ ππππ. πΏπππππππ ππππ ππ ππππππππππ’ ππΈπ²πΊπΈπ½πΆ. ππππ ππππ πππ πππππ’ πππππππ ππππππ, π’ππ πππ π ππππππ πππ ππππππ ππ ππππππππππππ ππππ ππππππππ πππ ππππ ππππ. πΈ ππππππ’ ππππ π’ππ π πππ ππππ ππππππππππππππ’ πππ πππππππ ππππππππ πππ ππππππππ ππ πππ πππ’ππππ. πΎπππππ πππ π’ππ πππ ππππππππ πππππππππ π’πππππππ ππ ππ ππππ ππ ππππππ ππππ πππ ππππππππππππ. ππΎπ π·π°π π΄ πΈπΆ π·πΎπππ π°π½π³ πΈπ» πΌπΈπ½πππ΄π πΏ.π: πΈπ π’ππ ππππ πππππ ππππππ πππππ ππππ π-ππππ… πΈπ π’ππ πππππππ ππ ππ πππ ππππππππ… πΈπ π’ππ ππ πππ πππππππ ππ πππππππ πππ πππ’ππππ (πππ ππππ πππππ πππ’ πππππππ ππππππ) πΈ π πππ π½ππ ππππππππ ππ!.
What is Bitcoin email scam
Bitcoin email scam is old extortion scheme β which try to guilt people into paying off someone claiming to have secretly recorded video or compromising information. Scammers uses the database of emails to sent this email scam out to millions of people around the World. The messages are sent to email addresses exposed in previous known data breaches in which the user database (email address and/or password) was indexed online.
Should you pay?
The best advice is: Don’t pay the ransom! If you receive the blackmail scam, just ignore the scammersβ empty threats. The best way to deal with the scam email is simply to move it to trash!
Threat Summary
Name | πΈ’π πππ πππππ ππ ππππππππ π’πππ ππππππππππππ ππππππππ EMAIL SCAM |
Type | Phishing, Bitcoin Email Scam, Fraud, Scam |
Ransom amount | 0.4 – 0.5 Btc |
Bitcoin wallet | 19Vp12UV5AqUnrpnuCTYJKs7Wz4fFSnSJE, 1CNGAmgz7vNZTPJntn7joXiqHEhd1C6Qw5, 1JcAfBm8ojyBC82Hqj4rwiXVyGU3vLsCDM, 1AGX7oToekEVPn5bPEty7qPnRi1f1nqDJj |
Distribution method | spam email campaigns |
Removal | If you gets an email like the πΈ’π πππ πππππ ππ ππππππππ π’πππ ππππππππππππ ππππππππ EMAIL SCAM, our computer security experts recommend follow some easy steps below |
What to do when you receive the πΈ’π πππ πππππ ππ ππππππππ π’πππ ππππππππππππ ππππππππ EMAIL SCAM
We advice to someone who gets this fraudulence message:
- Do not panic.
- Scammers will try to rush you, pressure you to make a decision to pay him. We recommend you do not pay a ransom, because your payment will only increase attacks against you.
- If thereβs a link in the scam email, do not click it, otherwise you could unwittingly install malware or ransomware on your computer.
- Report the email spam to the FTC at https://www.ftc.gov/
- Scan your computer for malware.
- Install an anti-phishing software.
How to scan your PC for malware
Using free malware removal tools to scan for and remove malware hiding on your PC is probably the easiest solution to remove adware, trojans, spyware, worms, potentially unwanted software, toolbars, keyloggers, browser hijackers, and popup generators. We recommends the Zemana Anti-malware for Windows personal computers.
Zemana Anti-malware is a malware removal tool for Windows OS. Visit the page linked below to download Zemana setup file called Zemana.AntiMalware.Setup on your PC. Save it to your Desktop.
164107 downloads
Author: Zemana Ltd
Category: Security tools
Update: July 16, 2019
Run the install package after it has been downloaded successfully and then follow the prompts to set up this utility on your system.
During setup you can change some settings, but we recommend you do not make any changes to default settings.
When install is complete, this malicious software removal tool will automatically run and update itself. You will see its main window as shown below.
Now press the “Scan” button to perform a system scan for trojans, spyware and other malicious software. A system scan can take anywhere from 5 to 30 minutes, depending on your personal computer. During the scan Zemana AntiMalware (ZAM) will locate threats exist on your computer.
When finished, a list of all threats found is produced. Once you have selected what you want to remove from your computer click “Next” button.
The Zemana Anti Malware will begin to remove malware. Once finished, you may be prompted to restart your system to make the change take effect.
How to protect yourself from phishing, malicious and misleading websites
If you want to protect yourself from phishing websites, then install an ad blocker program such as AdGuard. It can block malicious and misleading web sites, stop unwanted advertisements and popups when using the Internet Explorer, Google Chrome, Firefox and Edge. So, if you like surf the Internet, and want to protect your computer from malicious web pages, then the AdGuard is your best choice.
Installing the AdGuard is simple. First you’ll need to download AdGuard by clicking on the link below.
26656 downloads
Version: 6.4
Author: Β© Adguard
Category: Security tools
Update: November 15, 2018
After downloading it, double-click the downloaded file to start it. The “Setup Wizard” window will show up on the computer screen as displayed below.
Follow the prompts. AdGuard will then be installed and an icon will be placed on your desktop. A window will show up asking you to confirm that you want to see a quick guide as displayed on the screen below.
Click “Skip” button to close the window and use the default settings, or press “Get Started” to see an quick guidance which will assist you get to know AdGuard better.
Each time, when you start your system, AdGuard will start automatically and stop unwanted advertisements, block phishing, as well as other harmful or misleading websites. For an overview of all the features of the application, or to change its settings you can simply double-click on the AdGuard icon, which can be found on your desktop.
Finish words
We hope that this article helped you understand what the “πΈ’π πππ πππππ ππ ππππππππ π’πππ ππππππππππππ ππππππππ” EMAIL SCAM is and not succumb to the threats of scammers. If you receive an email that is similar but not the same as the example above, make sure you remove any personal info in this message, then post it as comment on this article. It will help our team monitor the latest scams.