Abuse to Bitcoin address
13WVfQkbqdsSUNBDPDWTLqSXeaYX1tZ6UD

Ransomware

Abuser: [email protected]

Yet another scammer who claims to have non-existent video of me watching porn, and trying to extort money from me, or else they'll release the videos. Obviously obtained from the allrecipes.com data breach, based upon the email address that it was sent to.

United States flag United States, 2020-05-04 02:29:30

Blackmail scam

Abuser: [email protected]

Same as all the others. Wants $920

United States flag United States, 2020-05-04 02:37:05

Ransomware

Abuser: unknown

I have received the following e-mail asking to pay $920: Hello! Î am a hacker who haș acceșș to your operatîng șyștem. Î alșo have full acceșș to your account. Thîș meanș that î have full acceșș to your devîce: At the tîme of hackîng your account () had thîș pașșword: ontact You can șay: thîș îș my, but old pașșword! Or: î can change my pașșword at any tîme! Of courșe! You wîll be rîght, but the fact îș that when you change the pașșword, my malîcîouș code every tîme șaved a new one! Î've been watchîng you for a few monthș now. The fact îș that you were înfected wîth malware through an adult șîte that you vîșîted. îf you are not famîlîar wîth thîș, î wîll explaîn. Trojan Vîruș gîveș me full acceșș and control over a computer or other devîce. Thîș meanș that î can șee everythîng on your șcreen, turn on the camera and mîcrophone, but you do not know about ît. Î alșo have acceșș to all your contactș and all your correșpondence. Why your antîvîruș dîd not detect malware? Anșwer: My malware ușeș the drîver, î update îtș șîgnatureș every 4 hourș șo that your antîvîruș îș șîlent. Î made a vîdeo șhowîng how you mașturbate on the left half of the șcreen, and în the rîght half you șee the vîdeo that you watched. Wîth one clîck of the moușe, Î can șend thîș vîdeo to all your emaîlș and contactș on șocîal networkș. î can alșo poșt acceșș to all your e-maîl correșpondence and meșșengerș that you ușe. Îf you want to prevent thîș, tranșfer the amount of $920 to my bîtcoîn addreșș (îf you do not know how to do thîș, wrîte to Google: 'Buy BTC'). My bîtcoîn addreșș (BTC Wallet) îș: 13WVfQkbqdsSUNBDPDWTLqSXeaYX1tZ6UD Îf î fînd that you have șhared thîș meșșage wîth șomeone elșe, the vîdeo wîll be îmmedîately dîștrîbuted. Beșt regardș!

Morocco flag Morocco, 2020-05-04 03:10:37

Blackmail scam

Abuser: [email protected]

Received: from [120.11.100.22] (port=16789) Content-Type: multipart/alternative; boundary="------------010001040400010702030202" X-From-Rewrite: unmodified, no actual sender determined from check mail permissions

United States flag United States, 2020-05-04 04:10:55

Ransomware

Abuser: 177.249.162.166-clientes-zap-izzi.mx

Same as the last one asking $920 Received-SPF: None (mailfrom) identity=mailfrom; client-ip=177.249.162.166; helo=177.249.162.166-clientes-zap-izzi.mx; [email protected];

Morocco flag Morocco, 2020-05-04 04:57:13

Ransomware

Abuser: bzq-79-180-215-47.red.bezeqint.net

Same as others received from a spam server. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=79.180.215.47; helo=bzq-79-180-215-47.red.bezeqint.net; [email protected];

Morocco flag Morocco, 2020-05-04 05:04:33

Ransomware

Abuser: 80.224.217.166.dyn.user.ono.com

Same as all the others. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=80.224.217.166; helo=80.224.217.166.dyn.user.ono.com; [email protected];

Morocco flag Morocco, 2020-05-04 05:09:09

Ransomware

Abuser: 37.30.55.9.nat.umts.dynamic.t-mobile.pl

Always the same one asking $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=37.30.55.9; helo=37.30.55.9.nat.umts.dynamic.t-mobile.pl; [email protected];

Morocco flag Morocco, 2020-05-04 05:17:40

Ransomware

Abuser: 116-145-231-201.fibertel.com.ar

Same as other ones wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=201.231.145.116; helo=116-145-231-201.fibertel.com.ar; [email protected];

Morocco flag Morocco, 2020-05-04 05:22:18

Ransomware

Abuser: 201.231.145.116

Received-SPF: None (mailfrom) identity=mailfrom; client-ip=201.231.145.116; helo=116-145-231-201.fibertel.com.ar; [email protected];

Morocco flag Morocco, 2020-05-04 05:26:46

Ransomware

Abuser: 217-133-250-66.static.clienti.tiscali.it

Received-SPF: None (mailfrom) identity=mailfrom; client-ip=217.133.250.66; helo=217-133-250-66.static.clienti.tiscali.it; [email protected];

Morocco flag Morocco, 2020-05-04 05:29:04

Ransomware

Abuser: 91.215.59.103

Poor hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=91.215.59.103; helo=ip-59-103.dynamic.pool.ncn.od.ua; [email protected];

Morocco flag Morocco, 2020-05-04 05:33:50

Ransomware

Abuser: 177.13.219.224

beginner hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=177.13.219.224; helo=224-219-13-177.skybandalarga.com.br; [email protected];

Morocco flag Morocco, 2020-05-04 05:36:47

Ransomware

Abuser: fm-dyn-139-0-87-11.fast.net.id

Same crazy hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=139.0.87.11; helo=fm-dyn-139-0-87-11.fast.net.id; [email protected];

Morocco flag Morocco, 2020-05-04 05:39:37

Ransomware

Abuser: 138-59-122-40.cliente.sumicity.net.br

Always the same hacker wants $920. Received-SPF: None (mailfrom) identity=mailfrom; client-ip=138.59.122.40; helo=138-59-122-40.cliente.sumicity.net.br; [email protected];

Morocco flag Morocco, 2020-05-04 05:42:50