Abuse to Bitcoin address
13WVfQkbqdsSUNBDPDWTLqSXeaYX1tZ6UD

Ransomware

Abuser: towin@towin-gra.com

Yet another scammer who claims to have non-existent video of me watching porn, and trying to extort money from me, or else they'll release the videos. Obviously obtained from the allrecipes.com data breach, based upon the email address that it was sent to.

United States flag United States, 2020-05-04 01:29:30

Blackmail scam

Abuser: info@campingthurium.com

Same as all the others. Wants $920

United States flag United States, 2020-05-04 01:37:05

Ransomware

Abuser: unknown

I have received the following e-mail asking to pay $920: Hello! Î am a hacker who haș acceșș to your operatîng șyștem. Î alșo have full acceșș to your account. Thîș meanș that î have full acceșș to your devîce: At the tîme of hackîng your account () had thîș pașșword: ontact You can șay: thîș îș my, but old pașșword! Or: î can change my pașșword at any tîme! Of courșe! You wîll be rîght, but the fact îș that when you change the pașșword, my malîcîouș code every tîme șaved a new one! Î've been watchîng you for a few monthș now. The fact îș that you were înfected wîth malware through an adult șîte that you vîșîted. îf you are not famîlîar wîth thîș, î wîll explaîn. Trojan Vîruș gîveș me full acceșș and control over a computer or other devîce. Thîș meanș that î can șee everythîng on your șcreen, turn on the camera and mîcrophone, but you do not know about ît. Î alșo have acceșș to all your contactș and all your correșpondence. Why your antîvîruș dîd not detect malware? Anșwer: My malware ușeș the drîver, î update îtș șîgnatureș every 4 hourș șo that your antîvîruș îș șîlent. Î made a vîdeo șhowîng how you mașturbate on the left half of the șcreen, and în the rîght half you șee the vîdeo that you watched. Wîth one clîck of the moușe, Î can șend thîș vîdeo to all your emaîlș and contactș on șocîal networkș. î can alșo poșt acceșș to all your e-maîl correșpondence and meșșengerș that you ușe. Îf you want to prevent thîș, tranșfer the amount of $920 to my bîtcoîn addreșș (îf you do not know how to do thîș, wrîte to Google: 'Buy BTC'). My bîtcoîn addreșș (BTC Wallet) îș: 13WVfQkbqdsSUNBDPDWTLqSXeaYX1tZ6UD Îf î fînd that you have șhared thîș meșșage wîth șomeone elșe, the vîdeo wîll be îmmedîately dîștrîbuted. Beșt regardș!

Morocco flag Morocco, 2020-05-04 02:10:37

Blackmail scam

Abuser: chicken1consumerist@nedr.com

Received: from [120.11.100.22] (port=16789) Content-Type: multipart/alternative; boundary="------------010001040400010702030202" X-From-Rewrite: unmodified, no actual sender determined from check mail permissions

United States flag United States, 2020-05-04 03:10:55

Ransomware

Abuser: 177.249.162.166-clientes-zap-izzi.mx

Same as the last one asking $920 Received-SPF: None (mailfrom) identity=mailfrom; client-ip=177.249.162.166; helo=177.249.162.166-clientes-zap-izzi.mx; envelope-from=unequjof@gmailasdfas.com;

Morocco flag Morocco, 2020-05-04 03:57:13

Ransomware

Abuser: bzq-79-180-215-47.red.bezeqint.net

Same as others received from a spam server. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=79.180.215.47; helo=bzq-79-180-215-47.red.bezeqint.net; envelope-from=becki@nufrespect.co.uk;

Morocco flag Morocco, 2020-05-04 04:04:33

Ransomware

Abuser: 80.224.217.166.dyn.user.ono.com

Same as all the others. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=80.224.217.166; helo=80.224.217.166.dyn.user.ono.com; envelope-from=emichalopou.imba2007@alumno.ie.edu;

Morocco flag Morocco, 2020-05-04 04:09:09

Ransomware

Abuser: 37.30.55.9.nat.umts.dynamic.t-mobile.pl

Always the same one asking $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=37.30.55.9; helo=37.30.55.9.nat.umts.dynamic.t-mobile.pl; envelope-from=fiona.drane@swessexpct.nhs.uk;

Morocco flag Morocco, 2020-05-04 04:17:40

Ransomware

Abuser: 116-145-231-201.fibertel.com.ar

Same as other ones wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=201.231.145.116; helo=116-145-231-201.fibertel.com.ar; envelope-from=zeniapz@excite.it;

Morocco flag Morocco, 2020-05-04 04:22:18

Ransomware

Abuser: 201.231.145.116

Received-SPF: None (mailfrom) identity=mailfrom; client-ip=201.231.145.116; helo=116-145-231-201.fibertel.com.ar; envelope-from=pjgezjun@freelymail.com;

Morocco flag Morocco, 2020-05-04 04:26:46

Ransomware

Abuser: 217-133-250-66.static.clienti.tiscali.it

Received-SPF: None (mailfrom) identity=mailfrom; client-ip=217.133.250.66; helo=217-133-250-66.static.clienti.tiscali.it; envelope-from=comunicati@gomarche.it;

Morocco flag Morocco, 2020-05-04 04:29:04

Ransomware

Abuser: 91.215.59.103

Poor hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=91.215.59.103; helo=ip-59-103.dynamic.pool.ncn.od.ua; envelope-from=adrianaxy16@deltakilo.ezbunko.top;

Morocco flag Morocco, 2020-05-04 04:33:50

Ransomware

Abuser: 177.13.219.224

beginner hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=177.13.219.224; helo=224-219-13-177.skybandalarga.com.br; envelope-from=freddy@maddys.se;

Morocco flag Morocco, 2020-05-04 04:36:47

Ransomware

Abuser: fm-dyn-139-0-87-11.fast.net.id

Same crazy hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=139.0.87.11; helo=fm-dyn-139-0-87-11.fast.net.id; envelope-from=agraykk@excite.it;

Morocco flag Morocco, 2020-05-04 04:39:37

Ransomware

Abuser: 138-59-122-40.cliente.sumicity.net.br

Always the same hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=138.59.122.40; helo=138-59-122-40.cliente.sumicity.net.br; envelope-from=antoniord18@webx.stars-and-glory.top;

Morocco flag Morocco, 2020-05-04 04:42:50