• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

I am a Russian hacker who has access to your operating system EMAIL SCAM

Myantispyware team June 8, 2022    

What is I am a Russian hacker who has access to your operating system EMAIL?

I am a Russian hacker who has access to your operating system is a ‘sextortion’ scam that spreads through spam email campaigns. Like most sextortion scams, it relies on “social engineering”, a process through which scammers induce shame, panic or guilt. The scammers claim that they obtained material compromising the user (as a result of a computer hack, email account hack, router hack, etc) and threaten to publish it if the ransom is not paid. All these claims are not based on anything, they are just deception. Therefore, you can safely ignore this email, just delete it or move it to spam.
 

I am a Russian hacker who has access

“I am a Russian hacker who has access to your operating system” email message is a sextortion SCAM


 

QUICK LINKS

  • What is I am a Russian hacker who has access to your operating system EMAIL?
  • Should you pay?
  • What to do when you receive the email scam?

In this particular case, the email states that the sender infected the recipient’s computer with malware through an adult site. The email goes on to say that the installed malware completely controls the infected computer and devices connected to it, which allows the attacker to see the contents of the victim’s screen, turn the camera and microphone on and off, and also have access to contacts and correspondence. After which it is stated that the sender recorded a video that could compromise the victim, this video will be sent to the victim’s contacts if the ransom is not paid. The email contains a bitcoin address to which the ransom should be transferred.

As stated above, the “I am a Russian hacker who has access to your operating system” email message is just a sextortion scam. All claims and threats made in this message are false. Therefore, recipients are not in danger, the message and similar messages can be safely ignored.

Text presented in the scam:

Hello!
I am a Russian hacker who has access to your operating system.
I also have full access to your account.

I’ve been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.

If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.

I also have access to all your contacts and all your correspondence.

Why did your antivirus not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.

I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.

If you want to prevent this,
transfer the amount of $1000 to my bitcoin address (if you do not know how to do this, write to Google: “Buy Bitcoin”).

My bitcoin address (BTC Wallet) is: bc1q0tj9nn8vjz996vw5ywd0mwc240n8zefuejax52

After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.

Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.

If I find that you have shared this message with someone else, the video will be immediately distributed.

Best regards!

Typically, sextortion scams are sent via email, thousands at a time, and are part of larger spam campaigns. As with many other types of scams, scammers are evolving their methods to deliver their messages to potential victims. Such attacks can be personalized and sent out in smaller numbers to avoid detection. Scammers can use reputable services, change and personalize the content of each message, and avoid including links or attachments – all in an attempt to bypass security.

Should you pay?

Dont pay the ransom

The best advice is: Don’t pay the ransom! If you receive the sextortion email scam, just ignore the scammers’ empty threats. The best way to deal with the scam email is simply to move it to trash!

Threat Summary

Name I am a Russian hacker who has access to your operating system SCAM
Type Sextortion, Phishing, Bitcoin Email Scam, Fraud, Scam
Subject line: info Waiting for your payment.
Ransom amount $1000
Bitcoin Address bc1q0tj9nn8vjz996vw5ywd0mwc240n8zefuejax52
Distribution method spam email campaigns
Removal If you gets an email like I am a Russian hacker who has access to your operating system, our computer security experts recommend follow some easy steps below

 

I have to share bad news with you, Unfortunately, there are some bad news for you, Your computer was infected with my malware, You have an outstanding payment are other examples of Sextortion scam emails. Such emails are also often used to distribute ransomware, trojans, worms and other malware. Regardless of what is in the scam emails, scammers and the criminals behind them use these emails to generate profit by tricking the users, the recipients of these emails.

What to do when you receive the I am a Russian hacker who has access to your operating system SCAM

We advice to someone who gets this fraudulence message:

  • Do not panic.
  • Do not pay a ransom.
  • If there’s a link in the scam email, do not click it, otherwise you could unwittingly install malware or ransomware on your computer.
  • Report the email spam to the FTC at https://www.ftc.gov/
  • Scan your computer for malware.
  • Install an anti-phishing software.

How to scan your computer for malware

If you suspect that your computer is infected with malware, you accidentally clicked on a link in the scam email, or just want to scan your computer, then use one of the best free malware removal tools. One of these utilities is MalwareBytes Anti Malware. It is a lightweight utility which designed to use alongside your antivirus software, detecting and removing malicious software, adware and PUPs that other security tools miss. MalwareBytes Anti Malware is easy to use, fast, does not use many resources and have great detection and removal rates.




Visit the page linked below to download the latest version of MalwareBytes Anti-Malware for Windows.

Malwarebytes Anti-malware
Malwarebytes Anti-malware
327294 downloads
Author: Malwarebytes
Category: Security tools
Update: April 15, 2020

After the downloading process is complete, close all programs and windows on your computer. Double-click the install file named MBSetup. If the “User Account Control” dialog box pops up as displayed in the figure below, click the “Yes” button.

MalwareBytes for Microsoft Windows uac prompt

It will open the Setup wizard which will help you setup MalwareBytes on your personal computer. Follow the prompts and don’t make any changes to default settings.
MalwareBytes AntiMalware for Microsoft Windows install wizard

After successful installation, press “Get Started” button. MalwareBytes AntiMalware will automatically start and you can see its main screen as shown on the image below.

MalwareBytes AntiMalware for MS Windows

Now press the “Scan” button to scan your computer for malicious software, worms and trojans. During the scan, MalwareBytes will detect security threats exist on your PC.

MalwareBytes scan for malware and trojans

Once the scan is done, the results are displayed in the scan report. Review the scan results and then press “Quarantine” button. MalwareBytes will remove malware related folders, files and registry keys and move the selected threats to the program’s quarantine. When finished, you may be prompted to restart your computer.

We suggest you look at the following video, which completely explains the process of using the MalwareBytes Anti Malware to remove malicious software.

If you have problems removing malware, then use the programs from this list, which contains the best free malware removers. Each of these programs is capable of detecting and removing trojans, spyware, browser hijackers, adware, potentially unwanted software and toolbars with all their components such as files, folders and registry entries.

How to protect yourself from phishing, malicious and misleading websites

If you want to protect yourself from phishing websites, then install an ad blocker program such as AdGuard. It can block malicious and misleading web sites, stop unwanted advertisements and popups when using the Internet Explorer, Google Chrome, Firefox and Edge. So, if you like surf the Internet, and want to protect your computer from malicious web pages, then the AdGuard is your best choice.

Installing the AdGuard is simple. First you’ll need to download AdGuard by clicking on the link below.

Adguard
Adguard download
26904 downloads
Version: 6.4
Author: © Adguard
Category: Security tools
Update: November 15, 2018

After downloading it, double-click the downloaded file to start it. The “Setup Wizard” window will show up on the computer screen as displayed below.

adguard adblocker installer

Follow the prompts. AdGuard will then be installed and an icon will be placed on your desktop. A window will show up asking you to confirm that you want to see a quick guide as displayed on the screen below.

adguard installation is competed

Click “Skip” button to close the window and use the default settings, or press “Get Started” to see an quick guidance which will assist you get to know AdGuard better.

Each time, when you start your system, AdGuard will start automatically and stop unwanted advertisements, block phishing, as well as other harmful or misleading websites. For an overview of all the features of the application, or to change its settings you can simply double-click on the AdGuard icon, which can be found on your desktop.

Finish words

We hope that this article helped you understand what the “I am a Russian hacker who has access to your operating system” SCAM is and not succumb to the threats of scammers. If you receive an email that is similar but not the same as the example above, make sure you remove any personal info in this message, then post it as comment on this article. It will help our team monitor the latest scams.

 

Phishing

 Previous Post

Securedevicesolutions.com pop-up scam (Virus removal guide)

Next Post 

How to remove News-ricixe.cc pop-ups (Virus removal guide)

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply

New Guides

Anchomoross.com Virus Removal Guide
scam alert
Fake or Real? You Visited Some Hacked Websites With Exploit Email Scam Explained
scam alert
Spotify Can’t Process Your Payment Scam Alert: A Phishing Email to Avoid
IFMAGIC GLP-1 Pro Weight Loss Oral Solution Review, Scam or Legit? What You Need to Know
LilCooler Portable AC Review, Scam or Legit? What You Need to Know

Follow Us

Search

Useful Guides

Files encrypted by ransomware become useless
How To Recover Encrypted Files (Ransomware file recovery)
Managed by your organization chrome virus
Chrome Managed by your organization malware removal guide
adwcleaner
AdwCleaner – Review, How to use, Comments
Iphone Calendar virus spam
Iphone Calendar Virus/Spam 2022 (Removal guide)
How to reset Internet Explorer settings to default

Recent Guides

Securedevicesolutions.com scam
Securedevicesolutions.com pop-up scam (Virus removal guide)
Shield-fordesktop.com
How to remove Shield-fordesktop.com pop-ups (Virus removal guide)
unwanted ads
Secure Color Search extension (Virus removal guide)
News-yisejo.cc
How to remove News-yisejo.cc pop-ups (Virus removal guide)
Win-scan.com scam
Win-scan.com pop-up scam (Virus removal guide)

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.