What is Hackers have access to your device EMAIL?
Hackers have access to your device. Check details ASAP! is a new ‘sextortion’ scam that spreads through spam email campaigns. Sextortion is the practice of extorting money from victims by blackmailing them; threatening to reveal evidence of their sexual activity. It is an old scam scheme – which try to guilt people into paying off someone claiming to have secretly recorded video or compromising information. Scammers use a database of stolen email addresses and passwords to send out scam emails to millions of people around the World. The messages are sent to email addresses exposed in previous known data breaches in which the user database (email address and/or password) was indexed online.
- What is Hackers have access to your device EMAIL?
- Should you pay?
- What to do when you receive the email scam?
In this particular case, the sextortion email says that some professional programmer hacked into the OS and the device of the recipient of the email. The attacker claims that he managed to infect the victim’s device with a virus when the victim visited an adult site. This virus allows him to control the victim’s device, turn on the camera and microphone, and have access to the screen of the infected device. Hacker claims to have recorded a video in which the victim masturbates while browsing adult websites. The hacker threatens to send this video to the victim’s friends unless the victim pays him $1350. If the victim pays the required amount in Bitcoin, the hacker promises to delete the video. Next, the scam email contains the bitcoin address to which the ransom should be transferred. This email is just a sextortion scam, all statements are fake. Just ignore this email and other similar emails and emails containing similar content.
Text presented in the “Hackers have access to your device” message:
Let me introduce myself first – I am a professional programmer, who specializes in hacking during my free time.
This time you were unlucky to become my next victim and I have just hacked the Operating System and your device.
I have been observing you for several months.
To put things in a simple way, I have infected your device with my virus while you were visiting your favorite adult website.
I will try to explain the situation in more details, if you are not really familiar with this kind of situations.
Trojan virus grants me with full access as well as control of your device.
Hence, I can see and access anything on your screen, switch on the camera and microphone and do other stuff, while you don’t even know that.
In addition, I also accessed your whole contacts list at social networks and your device too.
You may be questioning yourself – why didn’t your antivirus detect any malicious software until now?
– Well, my spyware uses a special driver, which has a signature that is updated on a frequent basis, hereby your antivirus simply cannot catch it.
I have created a videoclip exposing the way you are playing with yourself on the left screen section, while the right section shows the porn video that you were watching at that point of time.
Few clicks of my mouse would be sufficient to forward this video to all your contacts list and social media friends.
You will be surprised to discover that I can even upload it to online platforms for public access.
The good news is that you can still prevent this from happening:
All you need to do is transfer $1350 (USD) of bitcoin equivalent to my BTC wallet (if you don’t know how to get it done,
do some search online – there are plenty of articles describing the step-by-step process).
My bitcoin wallet is (BTC Wallet): 1NToziZKcJfyxHpwkcxbafwghGasme4NUf
Once I receive your payment, I will delete your kinky video right away, and can promise that is the last time you hear from.
You have 48 hours (2 days exactly) to complete the payment.
The read notification will be automatically sent to me, once you open this email, so the timer will start automatically from that moment.
Don’t bother trying to reply my email, because it won’t change anything (the sender’s email address has been generated automatically and taken from internet).
Don’t try to complain or report me either, because all my personal information and my bitcoin address are encrypted as part of blockchain system.
I have done my homework.
If I discover that you have tried forwarding this email to anyone, I will right away share your kinky video to public.
Let’s be reasonable and don’t make any stupid mistakes anymore. I have provided a clear step-by-step guide for you.
All you need to do is simply follow the steps and get rid of this uncomfortable situation once and for all.
Best regards and good luck.
Should you pay?
The best advice is: Don’t pay the ransom! If you receive the sextortion email scam, just ignore the scammers’ empty threats. The best way to deal with the scam email is simply to move it to trash!
|Name||Hackers have access to your device SCAM|
|Type||Sextortion, Phishing, Bitcoin Blackmail Scam|
|Email subject line||Hackers have access to your device. Check details ASAP!, “Hackere har fått tilgang til enheten din. Sjekk detaljene ASAP!”|
|Ransom amount||$1250, $1350|
|Bitcoin Address||196pG8KgNtG3QqhyN6uv2V88cyGSa36Dho, 1JrQhKQndJvLWonXcNXJVhbaE6u993w6h4, 1CjiFbx2b8VsxYQAYjsy4zY9MUgYrC8WA3, 1GufcqD5AWADhXsjRjwQxB95Yex4Dc34b1, 1Ef22Z8MKmZUVePpESGgeNv2bZFNbMpRsr, 1MZ6avTVhzxsyZvyNxFVWMutZwjQUhLpYo, 1NToziZKcJfyxHpwkcxbafwghGasme4NUf|
|Distribution method||spam email campaigns|
|Removal||If you gets an email like Hackers have access to your device, our computer security experts recommend follow some easy steps below|
The “Hackers have access to your device” email is not the only one belonging to the Sextortion category, we have already reported about such emails many times. As you can see, this is not a formal email, I have got two not really pleasant news for you and I have to share bad news with you are other examples of similar emails. Such emails are also often used to distribute ransomware, trojans, worms and other malware. Regardless of what is in the scam emails, scammers and the criminals behind them use these emails to generate profit by tricking the users, the recipients of these emails.
What to do when you receive the Hackers have access to your device SCAM
We advice to someone who gets this fraudulence message:
- Do not panic.
- Do not pay a ransom.
- If there’s a link in the scam email, do not click it, otherwise you could unwittingly install malware or ransomware on your computer.
- Report the email spam to the FTC at https://www.ftc.gov/
- Scan your computer for malware.
- Install an anti-phishing software.
How to scan your PC for malware
Zemana Anti Malware is a utility specially developed for malicious software removal. It can detect and remove ransomware, adware, browser hijacker, PUPs, trojans, worms and other malicious software for free.
Please go to the following link to download the latest version of Zemana for Windows. Save it on your desktop.
Author: Zemana Ltd
Category: Security tools
Update: July 16, 2019
When downloading is complete, close all programs and windows on your PC. Double-click the set up file called Zemana.AntiMalware.Setup. If the “User Account Control” dialog box pops up as displayed in the following example, click the “Yes” button.
It will open the “Setup wizard” that will help you install Zemana on your PC. Follow the prompts and do not make any changes to default settings.
Once installation is complete successfully, Zemana Anti Malware will automatically start and you can see its main screen as shown on the image below.
Now click the “Scan” button to perform a system scan for malware. While the Zemana AntiMalware is checking, you may see how many objects it has identified either as being malware.
After Zemana completes the scan, It will display a screen which contains a list of malware that has been detected. Next, you need to click “Next” button. Zemana will start to remove malicious software. When finished, you may be prompted to restart the system.
If you are having issues with malware removal, then check out MalwareBytes. We recommend this free malware removal utility because it may easily delete trojans, spyware, browser hijackers, adware, potentially unwanted software and toolbars with all their components such as files, folders and registry entries. Visit the page linked below to download the latest version of MalwareBytes Anti-Malware for Windows.
Category: Security tools
Update: April 15, 2020
We suggest you look at the following video, which completely explains the process of using the MalwareBytes Anti Malware to remove malicious software.
How to protect yourself from phishing, malicious and misleading websites
If you want to protect yourself from phishing websites, then install an ad blocker program such as AdGuard. It can block malicious and misleading web sites, stop unwanted advertisements and popups when using the Internet Explorer, Google Chrome, Firefox and Edge. So, if you like surf the Internet, and want to protect your computer from malicious web pages, then the AdGuard is your best choice.
Installing the AdGuard is simple. First you’ll need to download AdGuard by clicking on the link below.
Author: © Adguard
Category: Security tools
Update: November 15, 2018
After downloading it, double-click the downloaded file to start it. The “Setup Wizard” window will show up on the computer screen as displayed below.
Follow the prompts. AdGuard will then be installed and an icon will be placed on your desktop. A window will show up asking you to confirm that you want to see a quick guide as displayed on the screen below.
Click “Skip” button to close the window and use the default settings, or press “Get Started” to see an quick guidance which will assist you get to know AdGuard better.
Each time, when you start your system, AdGuard will start automatically and stop unwanted advertisements, block phishing, as well as other harmful or misleading websites. For an overview of all the features of the application, or to change its settings you can simply double-click on the AdGuard icon, which can be found on your desktop.