What is Don’t forget to pay the tax within 2 days EMAIL?
Don’t forget to pay the tax within 2 days is a ‘sextortion’ scam that relies on psychological manipulation tactics. The scammers claim that they obtained material compromising victims’ reputations. It should be emphasized that any statements, claims and threats contained in the ‘sextortion’ scams are false and should be ignored. Criminals usually contact potential victims through email, but in some cases, criminals can use online web forms, whatsapp and sms messages.
- What is Don’t forget to pay the tax within 2 days SCAM?
- Should you pay?
- What to do when you receive the scam message?
The “Don’t forget to pay the tax within 2 days” email says that someone has been watching the recipient for the past couple of months. The sender claims that he was able to install a Trojan on the victim’s computer, which allowed him to take complete control of the computer and record a video in which the victim masturbates while browsing adult websites. The attacker threatens to send this video to the victim’s social networks and contacts unless the victim pays the ransom to the bitcoin address provided in the message. As stated above, the email message is just a sextortion scam. All claims and threats made in this message are false. Therefore, recipients are not in danger, the message and similar messages can be safely ignored.
Typically, sextortion scams are sent via email, thousands at a time, and are part of larger spam campaigns. As with many other types of scams, scammers are evolving their methods to deliver their messages to potential victims. Such attacks can be personalized and sent out in smaller numbers to avoid detection. Scammers can use reputable services, change and personalize the content of each message, and avoid including links or attachments – all in an attempt to bypass security.
Text presented in the “Don’t forget to pay the tax within 2 days” message:
Hi. How are you?
I know, it’s unpleasant to start the conversation with bad news, but I have no choice.
Few months ago, I have gained access to your devices that used by you for internet browsing.
Afterwards, I could track down all your internet activities.
Here is the history of how it could become possible:
At first, I purchased from hackers the access to multiple email accounts (nowadays, it is a really simple thing to do online).
As result, I could easily log in to your email account (xxxxxxx@xxxxxxxx).
One week later, I installed Trojan virus in Operating Systems of all devices of yours, which you use to open email.
Frankly speaking, it was rather straightforward (since you were opening the links from your inbox emails).
Everything ingenious is quite simple. (o_0)!
My software enables me with access to all controllers inside devices of yours, like microphone, keyboard and video camera.
I could easily download to my servers all your private info, including the history of web browsing and photos.
I can effortlessly gain access to all your messengers, social networks accounts, emails, contact list as well as chat history.
Virus of mine constantly keeps refreshing its signatures (because it is driver-based), and as result remains unnoticed by your antivirus.
Hence, you can already guess why I stayed undetected all this while.
As I was gathering information about you, I couldn’t help but notice that you are also a true fan of adult-content websites.
You actually love visiting porn sites and browsing through kinky videos, while pleasuring yourself.
I could make a few dirty records with you in the main focus and montaged several videos showing the way you reach orgasm while masturbating with joy.
If you are still uncertain regarding the seriousness of my intentions,
it only requires several mouse clicks for me to forward your videos to all your relatives, as well as friends and colleagues.
I can also make those vids become accessible by public.
I honestly think that you do not really want that to happen, considering the peculiarity of videos you like to watch,
(you obviously know what I mean) all that kinky content can become a reason of serious troubles for you.
However, we can still resolve this situation in the following manner:
Everything you are required to do is a single transfer of $1780 USD to my account (or amount equivalent to bitcoin depending on exchange rate at the moment of transfer),
and once the transaction is complete, I will straight away remove all the dirty content exposing you.
After that, you can even forget that you have come across me. Moreover, I swear that all the harmful software will be removed from all devices of yours as well.
Make no doubt that I will fulfill my part.
This is really a great deal that comes at a reasonable price, given that I have used quite a lot of energy to check your profile as well as traffic over an extended period of time.
If you have no idea about bitcoin purchase process – it can be straightforwardly done by getting all the necessary information online.
Here is my bitcoin wallet provided below: 1LF99WG4P3Tp3pgyXMnYPHjeSCCAqLBhna
You should complete the abovementioned transfer within 48 hours (2 days) after opening this email.
The following list contains actions you should avoid attempting:
#Do not try replying my email (email in your inbox was generated by me alongside with return email address).
#Do not try calling police as well as other security forces. In addition, abstain from sharing this story with your friends.
After I find out (be sure, I can easily do that, given that I keep complete control of all your devices) – your kinky video will end up being available to public right away.
#Do not try searching for me – there is absolutely no reason to do that. Moreover, all transactions in cryptocurrency are always anonymous.
#Do not try reinstalling the OS on your devices or throwing them away. It is pointless as well, since all your videos have already been uploaded to remote servers.
The following list contains things you should not be worried about:
#That your money won’t reach my account.
– Rest assured, the transactions can be tracked, hence once the transaction is complete,
I will know about it, because I continuously observe all your activities (my trojan virus allows me to control remotely your devices, same as TeamViewer).
#That I still will share your kinky videos to public after you complete money transfer.
– Trust me, it’s pointless for me to continue troubling your life. If I really wanted, I would make it happen already!
Let’s make this deal in a fair manner!
Owh, one more thing…in future it is best that you don’t involve yourself in similar situations any longer!
One last advice from me – recurrently change all your passwords from all accounts.
Should you pay?
The best advice is: Don’t pay the ransom! If you receive the sextortion email scam, just ignore the scammers’ empty threats. The best way to deal with the scam email is simply to move it to trash!
|Name||Don’t forget to pay the tax within 2 days SCAM|
|Type||Phishing, Bitcoin Email Scam, Fraud, Scam|
|Distribution method||spam email campaigns|
|Removal||If you gets an email like Don’t forget to pay the tax within 2 days, our computer security experts recommend follow some easy steps below|
There are many variations of the scam, scammers often change the text of messages in order to deceive victims and bypass security systems. In addition, in some cases, criminals can translate the text of sextortion messages into other languages, thus targeting a specific group of Internet users. Unfortunately, there are some bad news for you, Hello, I’m going to share important information with you, I have to share bad news with you are other examples of sextortion scams. Such messages are also often used to distribute ransomware, trojans, worms and other malware.
What to do when you receive the Don’t forget to pay the tax within 2 days SCAM
We advice to someone who gets this fraudulence message:
- Do not panic.
- Do not pay a ransom.
- If there’s a link in the scam email, do not click it, otherwise you could unwittingly install malware or ransomware on your computer.
- Report the email spam to the FTC at https://www.ftc.gov/
- Scan your computer for malware.
- Install an anti-phishing software.
How to scan your computer for malware
If you suspect that your computer is infected with malware, you accidentally clicked on a link in the scam email, or just want to scan your computer, then use one of the best free malware removal tools. Zemana is extremely fast and ultra light weight malicious software removal tool. It will help you detect and remove adware, spyware, trojans, potentially unwanted programs and other malware. This program gives real-time protection that never slow down your device. Zemana Anti Malware is developed for experienced and beginner computer users. The interface of this tool is very easy to use, simple and minimalist.
- Visit the page linked below to download the latest version of Zemana for MS Windows. Save it on your desktop.
Author: Zemana Ltd
Category: Security tools
Update: July 16, 2019
- At the download page, click on the Download button. Your browser will show the “Save as” prompt. Please save it onto your Windows desktop.
- After the downloading process is complete, please close all apps and open windows on your PC system. Next, launch a file named Zemana.AntiMalware.Setup.
- This will start the “Setup wizard” of Zemana Anti Malware onto your computer. Follow the prompts and don’t make any changes to default settings.
- When the Setup wizard has finished installing, the Zemana AntiMalware will start and display the main window.
- Further, click the “Scan” button . Zemana will begin scanning the whole computer to detect malicious software. Depending on your personal computer, the scan can take anywhere from a few minutes to close to an hour. While the utility is scanning, you can see how many objects and files has already scanned.
- After Zemana Anti-Malware has completed scanning your computer, you will be displayed the list of all found items on your computer.
- Make sure to check mark the threats which are unsafe and then click the “Next” button. When finished, you may be prompted to reboot the computer.
- Close the Zemana Anti-Malware and continue with the next step.
If you are having issues with malware removal, then check out MalwareBytes. We recommend this free malware removal utility because it may easily delete trojans, spyware, browser hijackers, adware, potentially unwanted software and toolbars with all their components such as files, folders and registry entries. Visit the page linked below to download the latest version of MalwareBytes Anti-Malware for Windows.
Category: Security tools
Update: April 15, 2020
We suggest you look at the following video, which completely explains the process of using the MalwareBytes Anti Malware to remove malicious software.
How to protect yourself from phishing, malicious and misleading websites
If you want to protect yourself from phishing websites, then install an ad blocker program such as AdGuard. It can block malicious and misleading web sites, stop unwanted advertisements and popups when using the Internet Explorer, Google Chrome, Firefox and Edge. So, if you like surf the Internet, and want to protect your computer from malicious web pages, then the AdGuard is your best choice.
Installing the AdGuard is simple. First you’ll need to download AdGuard by clicking on the link below.
Author: © Adguard
Category: Security tools
Update: November 15, 2018
After downloading it, double-click the downloaded file to start it. The “Setup Wizard” window will show up on the computer screen as displayed below.
Follow the prompts. AdGuard will then be installed and an icon will be placed on your desktop. A window will show up asking you to confirm that you want to see a quick guide as displayed on the screen below.
Click “Skip” button to close the window and use the default settings, or press “Get Started” to see an quick guidance which will assist you get to know AdGuard better.
Each time, when you start your system, AdGuard will start automatically and stop unwanted advertisements, block phishing, as well as other harmful or misleading websites. For an overview of all the features of the application, or to change its settings you can simply double-click on the AdGuard icon, which can be found on your desktop.
If you receive a scam message that is similar but not the same as the example above, make sure you remove any personal info in this message, then post it as comment on this article. This helps us to warn users about current scams, monitor trends and disrupt scams where possible.