• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

‘Hacker who has access to your operating system’ Email, Scam or Real, Should you be worried?

Myantispyware team June 23, 2024    

Have you received an email claiming a hacker has access to your operating system? The email might say they got into your device through adult sites you visited and that they have control over your screen, microphone, and camera. It may also claim to have made a video of you watching adult content and demand $727 in Bitcoin to delete the video and remove the virus.

Hacker who has access to your operating system Email Scam

Question: Is it true that my system has been hacked, and do I need to pay them?

Investigation Findings: This type of email is known as a “sextortion scam“. Usually, scammers have no access to your device. They send these emails to scare you into paying them.

Answer: The ‘I am a hacker who has access to your operating system’ email is a fraudulent scam. 💡 To protect yourself from scams like this, never respond to such emails or send money. Additionally, ensure your antivirus software is up to date. If you are concerned, run a virus scan on your device and change your email passwords for safety.

Table of Contents

  • 🚨 Is the ‘Hacker who has access to your operating system’ Email a Scam?
  • 🕵️‍♀️ How the scam works
  • ❌ Should you pay
  • 😱 What to Do if You Receive the Email

🚨 Is the ‘Hacker who has access to your operating system’ Email a Scam?

Yes, the email claiming that your operating system has been hacked, your personal data copied, and threatening to expose compromising information unless you pay $727 in Bitcoin is definitely a scam. 🚫 If you’ve received such an email, exercise extreme caution. The claims are fabricated and designed to instill urgency, misleading you into paying money to the scammer.

A typical “Hacker who has access to your operating system” scam email reads as follows:

Hello!

I am a hacker who has access to your operating system.
I also have full access to your account.

I’ve been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.

If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.

I also have access to all your contacts and all your correspondence.

Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.

I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.

If you want to prevent this,
transfer the amount of $1300 to my bitcoin address (if you do not know how to do this, write to Google: “Buy Bitcoin”).

My bitcoin address (BTC Wallet) is: 1NiDJxCEzhvtBSREmXmQzQ27qtbpk7eZLF

After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.

Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.

If I find that you have shared this message with someone else, the video will be immediately distributed.

Best regards!

Background on the ‘Hacker who has access to your operating system’ Email Scam:

This scam involves fraudsters sending emails that claim they have hacked your computer and recorded compromising footage of you. The scammers demand a ransom in Bitcoin to prevent the release of this alleged footage.

However, legitimate cybersecurity experts and organizations confirm that these claims are baseless. No real hacking has occurred; the email is designed to scare you into paying the ransom. Scammers often send these emails in bulk, hoping to catch unsuspecting victims.

The alarming spread of these scams has prompted various government and consumer protection agencies, including the FBI and the Better Business Bureau, to issue warnings. These agencies have reported that these scams have been widespread, using similar tactics to exploit individuals’ fears of privacy invasion and public embarrassment.

The fraudulent emails often claim they have installed malware on your device and threaten to share embarrassing footage unless you pay. They provide a Bitcoin wallet address for the payment and set a deadline to increase the urgency and pressure.

🚩 Red Flags to Watch Out For:

To protect yourself, be aware of these warning signs of the scam: 🔍🛡️

  • 📧 Unsolicited Threats: Unexpected emails that claim your device has been hacked and demand payment to prevent the release of compromising information.
  • 💸 Ransom Demands: The scam includes demands for payment in Bitcoin, claiming it is the only way to prevent the release of the alleged footage.
  • ⏳ Urgency and Imposed Deadlines: These emails impose a tight deadline to pressure you into acting hastily, using fear of embarrassment or reputational damage to coerce you into paying immediately.
  • 🔄 No Evidence of Hacking: The email provides no real evidence that your device has been hacked or that any compromising footage exists.
  • 👤 Anonymity of the Sender: Scammers use anonymous email addresses and provide untraceable Bitcoin wallet addresses, making it difficult to verify the source.
  • 🔗 Suspicious Claims: Be skeptical of any email that makes extraordinary claims about hacking and demands for money.

💡 To protect yourself from scams like this, never respond to such emails or send money. Additionally, ensure your antivirus software is up to date. If you are concerned, run a virus scan on your device and change your email passwords for safety.

Understanding the ‘Hacker who has access to your operating system’ Email Scam

If you receive an email that says “Hacker who has access to your operating system“, it’s normal to be alarmed 🚨. These emails typically start with frightening statements to grab your attention immediately. You might think, How could they access my devices? In reality, the sender doesn’t have any access to your personal information; their goal is to intimidate you into acting hastily.

These emails include baseless threats, claiming they have videos or other compromising information that could humiliate you 🎥. The wording is intentionally vague and menacing, crafted to make you feel uneasy: Could any of this actually be true?

The scammer may claim they’ve installed sophisticated malware, like a Trojan Virus, on your device, purporting to have the ability to monitor all your online activities 💻. A clear sign this is a scam is the lack of any concrete evidence 🚩. They use the threat of high-tech surveillance to frighten you, not genuine hacking abilities.

The email typically concludes with a request for a payment 💰, with the scammer demanding a ransom in Bitcoin because it’s difficult to track. The scam is orchestrated to coerce you into paying swiftly. However, making a payment doesn’t guarantee your safety and may even mark you for further scams.

Upon reading the email, you might question, Am I truly in danger? or Can this individual actually do what they claim? Generally, these threats are fictitious; they are merely exploiting your fears.

What should you do? It’s advisable not to respond to the scammer or send any money. Concentrate on securing your online presence: update your passwords, ensure your devices are protected, and consider reporting to the police if the scam involves threats or extortion 🔐. Such incidents underscore the importance of vigilance and proactive online security measures.


Essentially, this scam relies on instilling fear and urgency to deceive you. If you receive an email like this, do not engage with the scammer or transfer any money. Simply delete the email. Also, keep your computer safeguarded with up-to-date anti-virus software, and use strong, unique passwords for all your accounts to help prevent falling victim to such scams.

Examples of such scams

Scammers have developed a variety of tactics to intimidate and exploit unsuspecting individuals. Here are a few common examples:

🔒 Your Private Information has been Stolen Email Scam

Here, the scammer will claim they’ve stolen sensitive information from you and threaten to release it unless you pay a ransom. They rely on the scare factor, hoping you’ll pay to protect your reputation, even though they likely have no data at all.

Your private information has been stolen Email Scam

📹 I RECORDED YOU Email Scam

In this scam, the sender claims to have control over your camera and alleges they have recorded you during private moments. They typically demand payment to keep the footage private. Beware: this is a bluff to get you to pay up out of fear.

I RECORDED YOU Email Scam

💼 I am a professional hacker EMAIL SCAM

Posing as a hacker, the sender of this email might say they’ve infiltrated your system. They may even claim they have proof of embarrassing activity and will publish it unless you send them money. Remember, a real hacker wouldn’t announce their presence—it’s a tactic to pressure you into paying.

I am a professional hacker EMAIL SCAM

Each of these scams plays on fear and urgency to trick you into acting against your best interest. Always approach such emails with skepticism, verify your security, and do not engage with the scammers.

Should you send the money?

No, don’t give the scammer any money. It’s a scam, and giving them money will only encourage them to continue their criminal activities. Plus, if you pay once, they might target you again. To keep your personal information safe, always use strong and unique passwords for each of your accounts, enable two-factor authentication for an extra layer of security, and keep your computer’s antivirus software up to date. If you receive an email like this, it’s important to report it to the authorities and your email provider.

Dont pay the ransom

What to Do if You Get This Scam Email

Getting an email that says someone hacked your devices and has compromising information can be scary, but there are easy and safe ways to handle it.

scam alert

Here’s what to do:

First, stay calm. The email is meant to scare you and make you act without thinking. Remember, it’s just a scam to make you feel afraid.

Don’t pay them. Paying won’t make the problem go away. It only shows the scammer that you are an easy target for future scams.

Don’t reply to the scammer. Responding can give them more information about you and confirm that your email is active, which could lead to more scams.

If the email mentions a password you recognize, check where it came from. Use sites like haveibeenpwned.com to see if your email or passwords have been part of a data breach.

Then, change your passwords. Use strong, unique passwords and set up two-factor authentication where you can.

For safety, run a full security scan on your device. The email’s claims about malware are usually false, but it’s good to make sure your system is clean.

Report the email to the authorities (like the FTC). Reporting helps with investigations and can stop these scams from happening to others.

Finally, tell others. Let your friends, family, and coworkers know about this scam so they can avoid it too. Sharing this information makes everyone safer.

New Variant of the ‘Hacker who has access to your operating system’ Scam

We discovered a new variant of the ‘Hacker who has access to your operating system’ scam email that includes several notable changes from the original version. The ransom amount demanded has increased from $727 to $1300, reflecting the scammer’s attempt to extort more money from victims. Additionally, the interval for updating the malware signatures has been altered from every 4 hours to every 5 hours. The Bitcoin address for the payment has been updated. There are also slight variations in the text, such as replacing standard letters with similar-looking special characters (e.g., “a” with “а” and “o” with “о”), likely intended to bypass spam filters and appear more legitimate. These changes indicate the scammers’ ongoing efforts to adapt their tactics and avoid detection while increasing their financial demands.

Hello!

I am a hаckеr who has аccess to your operating system.
I also have full аccess to your account.

I’ve been wаtching you for a few months now.
The fact is that you were infected with malwаre through an аdult site that you visited.

If you are not familiar with this, I will explain.
Trojаn Virus gives me full аccess and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.

I also have аccess to all your contacts and all your correspondence.

Why your аntivirus did not detect mаlwаre?

Answеr: My mаlwаre uses the driver, I update its signatures every 5 hours so that your аntivirus is silent.

I made a vidеo showing how you sаtisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this vidеo to all your emаils and contacts on social networks.
I can also post access to all your e-mail corrеspondence and mеssengers that you use.

If you want to prevent this,
trаnsfer the аmount of 1300 USD (US dollаrs) to my bitcоin аddress (if you do not know how to do this, write to Google: “Buy Bitcоin”).
My bitcоin address (ВТС Wallet) is:

bc1qpp9fmzfug5ef55szq42v72rw8s4jyhnvcshde7

After receiving the pаyment, I will delеte the vidеo and you will never hear me again.
I give you 52 hоurs (more than 2 days) to pаy.
I have a notice reading this lеtter, and the timer will work when you see this letter.

Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitсоin аddrеss.
I do not make any mistakes.

If I find that you have shared this message with someone else, the video will be immеdiately distributed.

Best regards!

Changes in the ‘Russian Hacker with Multiple Crypto Wallets’ Scam Variant

This new variant introduces the scammer as a “Russian hacker” and increases the ransom demand to $1000. In addition to the updated ransom amount, the scammer now provides multiple cryptocurrency wallet options for payment, including Bitcoin (BTC), Ethereum (ERC20), and USDT (TRC20), to give victims various payment methods. The text features slight variations, such as the use of different special characters to replace standard letters (e.g., “a” with “а” and “o” with “о”), likely intended to bypass spam filters. The email also maintains the claim of updating malware signatures every 4 hours and includes a countdown timer of 50 hours for the payment. These changes indicate the scammers’ ongoing efforts to adapt their tactics, increase their chances of evading detection, and maximize their financial gains.

Hello!

I am a Russian hacker who has access to your operating system.
I also have full access to your account.
I’ve been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.

If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.

Why did your antivirus not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.

If you want to prevent this,
transfer the amount of $1000 to my Crypto Wallets address (if you do not know how to do this, write to Google: “Buy Bitcoin”).

My Crypto Wallets address are:
Bitcoin (BTC) : bc1qs29h3vvc6mz73v76r5gm6xf0pcutdyet5q5dqt
Ethereum (ERC20) : 0xd8B91c190a8d530F5dC11187A86Eb09352879345
Send USDT (TRC20) : TXAzUq5uxHCDCSHx8EEY2WvAstQZqmnVjF

After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.

I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
Best regards!

Threat Summary

Name ‘Hacker who has access to your operating system’ Email Scam
Type Phishing/Sextortion
Ransom amount $727, $1300, $1000 USD (in Bitcoin equivalent)
Bitcoin Address 1NiDJxCEzhvtBSREmXmQzQ27qtbpk7eZLF, bc1qpp9fmzfug5ef55szq42v72rw8s4jyhnvcshde7, bc1q8wwnjjn8cu7pyy6fej485a57xkwx9wv70lycg2, bc1q8wfxvha6jvezadx94wkgcsalufduynkhs59r0u, bc1q8vpymu8fu5n3w72y8kckgswst75spfejc8r4j7, bc1qs29h3vvc6mz73v76r5gm6xf0pcutdyet5q5dqt, 0xd8B91c190a8d530F5dC11187A86Eb09352879345, TXAzUq5uxHCDCSHx8EEY2WvAstQZqmnVjF
Fake Claims Access to personal data and browsing history, control over messengers and social networks, possession of embarrassing videos
Damage Psychological distress, potential financial loss if ransom is paid
Distribution Mass emailing, likely from a purchased or hacked email list
Tactics Inducing fear, creating urgency, deceptive claims
Variations Different ransom amounts, varying email content, alternative cryptocurrencies for payment
Prevention Tips Use strong, unique passwords; enable two-factor authentication; be skeptical of unsolicited emails; never pay ransoms
Reporting Info Forward to the Anti-Phishing Working Group at reportphishing@apwg.org; Report the scam to relevant authorities (e.g., FTC); Share information about the scam with friends and family to raise awareness; Monitor online accounts for any suspicious activity

Conclusion

The “Hacker who has access to your operating system” email is a typical sextortion scam that uses fear to try to get money from you. The scammer claims they’ve taken over your devices, copied your personal data, and recorded you during private moments, threatening to share these supposed recordings unless you pay a ransom in Bitcoin. Remember, these threats are fake, designed to scare you into paying.

Bottom Line: Ignore these emails. The best way to protect yourself is to not engage with the sender and to upgrade your device security. 🛡️💻

Stay sharp and think critically; an email that triggers fear or seems overly complex is probably a scam. 🤔

Phishing

 Previous Post

Stay Alert: The Upgex.com Bitcoin Promo Code Scam

Next Post 

Unmasking the Kleptfic.com Scam: How to Spot Fake Sales

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply

New Guides

Hunny7.com: A Task App Scam Exposed
HunnyCash.com Review, Free $100 Signup Bonus Scam Exposed
Totrades.com Bitcoin Promo Codes: A Crypto Scam
Nabadex.com Review: Bitcoin Promo Codes as a Scam
Remove Kwsrc4you.com Redirect: Chrome, Edge, Firefox

Follow Us

Search

Useful Guides

How to remove browser hijacker virus (Chrome, Firefox, IE, Edge)
search.yahoo.com
Remove Search.yahoo.com Redirect Virus ✅ (Quick & Easy) in 2024
ads by adware
How to remove Adware from Windows 10 (Virus removal guide)
How to reset Mozilla Firefox (Updated Apr. 2018)
browser redirect virus
How to remove Browser redirect virus [Chrome, Firefox, IE, Edge]

Recent Guides

UpGex Cryptocurrency trading scam
Stay Alert: The Upgex.com Bitcoin Promo Code Scam
Uncovering the Lafme.com Scam: What You Need to Know About Fake Bitcoin Promos
Savexup.com’s Bitcoin Promo Code Scam: What to Know
Don’t Be Fooled: Merefex.com Bitcoin Promo Code Scam
Prime750.com 750 Amazon Gift Card Scam
Prime750.com “$750 Amazon Gift Card” Scam or Legit? Read This !

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.