Such emails are often automatically generated and sent in bulk. A photographic evidence (e.g. the aforementioned webcam image or a video) is never sent along. The majority of emails may end up in the spam folder unnoticed. Other people will find this in their normal inbox. Checks on the flow of money (Bitcoins) also show that people actually believe these claims and pay the requested amount to be on the safe side.
However, it is important to remain calm. If a password is mentioned in the email, it should be changed if it has not already been done.
The subject: Final warning! I have full access to your device. Your data has been copied.
The email as verbatim(sic!)
Hello,
your system has been hacked with a Trojan horse virus. It entered your device through adult portals you visit. Some spicy videos contain the malicious code activated immediately after switching on. All data has already been copied to my server. I have complete control over the device you use to browse the Internet. I can see your screen and use the microphone and camera without you even noticing.
I have already taken a screen recording. We have created a video with a porn reel that you were watching and masturbating at the time. Your face is perfectly visible and I don't think this type of content will have a positive impact on your reputation. I have full access to your contact list and social media profile. I can send this video from your email or messengers to the whole world. If you want to avoid this, you just need to do one simple step. Simply transfer 10000 EUR (EURO) = 0.000052 BTC to the Bitcoin wallet: 1NqcrXj7 ……… (copy and paste address – case sensitive) (in Bitcoin corresponds to the exchange rate at the time of transfer) You can find detailed instructions on Google. After payment, I will remove the video and virus from your device and no one will bother you again. If I do not receive payment after this period, all your data and videos will be publicly available. I give you 2 business days. I will receive a notification that you have read this letter. The timer starts immediately. Complaints of any kind, including to the police, would be pointless. My Bitcoin wallet and email cannot be tracked.If I find out that you shared this message with someone else, the video will be posted immediately.I will destroy your reputation forever and all your data will become public.Everyone becomes something Find out about your passion for porn sites and more. Changing passwords would also be helpless since all the data is already on my servers. If you try not to follow my instructions, I will send this ugly video to everyone you know, including your family members. Don't forget the potential shame - your life can be a disaster! Contact me at this email address darcole001@gmail.com and copy it to rapidjoe001@outlook.com with the following subject: Decrypt-0000977226HP
After these steps you will receive the key and a decryption tutorial by email. I'm waiting for your Bitcoin payment.
The perpetrators use some tricks for the emails to make the statement appear credible.
PASSWORD
In many current versions, an actually existing password for the person being addressed is given. These passwords come from hacks of websites/databases in the past, some of which have now become known or are currently unrecognized. What is striking about the passwords is how easy they are to put together. Well-known words/names and numbers are used here. In addition, the passwords only have a few digits. Complicated passwords have not yet been reported to us as sample emails from those affected . Incidentally, such passwords can now be found out very easily by experienced hackers.
SENDER
Next, the emails appear to have been sent from your own email account, as claimed. This is also a trick used by the perpetrators. Through so-called mail spoofing, the perpetrators of an email can miss any sender (comparable to an envelope, on which any sender can be written). The recipient sees this and is therefore confused and believes the content of the email. At no time is there access to the email account of the person being addressed.
WEB PAGES
The perpetrators claim to be visiting erotic websites. In fact, various evaluations by different statistics providers repeatedly show that websites with pornographic content are among the most frequently visited websites on the Internet. The probability of meeting an email recipient who has visited exactly such pages or visits them frequently is therefore very high.
WEBCAM
There are now only a few computers without a webcam, in addition to the home office time caused by the corona pandemic. A typical notebook has a webcam installed. Tablets and smartphones are also equipped with it. There have also been actual incidents involving malware that can also control a webcam undetected.
These emails are actually generated automatically and sent in bulk. A proof image (e.g. the webcam image mentioned) is never sent along. The majority of emails may end up in the spam folder unnoticed. Other people will find this in their normal inbox. Checks on the flow of money (Bitcoins) also show that people actually believe these claims and pay the requested amount to be on the safe side.
However, it is important to remain calm. If a password is mentioned in the email, it should be changed if it has not already been done. Use our tip for secure passwords .
Avoid using one password for multiple services at the same time. Be careful of long passwords that consist of letters, numbers and special characters. Do not use well-known words/names/numbers (e.g. dates of birth) that could also be guessed via social media accounts, for example. Do not transfer money to the perpetrators. Through previous tricks and mass mailings, they hope to meet enough people to comply with the blackmail. Even just a few people paying are a profit for the perpetrators with minimal effort.
Don't reply to the emails.
This would give the perpetrators feedback that they could use against you if necessary. For example, use the following services to find out about known security gaps: https://sec.hpi.uni-potsdam.de/ilc/search and https://haveibeenpwned.com/
Set up 2-factor authentication if offered. This means you can add an additional hurdle to your accounts.
Should I file a report?
Since this is extortion, you can do this at any police station or via the relevant online watchdogs (if available).
If you would like, you can inform us about current versions of this scam via this service here
Danger! There are also blackmail cases claiming similar things. However, there was prior contact there (e.g. via an erotic/dating platform) and a later video chat in which the perpetrators were able to persuade you to take corresponding actions. It is not uncommon for such video chats to be recorded using software and the victim is then blackmailed with this sensitive material. However, this is another scam that should definitely be shown.
Also read:
Ukraine war: email with blackmail attempts
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

