Ransomware
Abuser: unknown
The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296).
I went around the security system in the router, installed an exploit there. When you went online, my exploit downloaded my malicious code (rootkit) to your device. Since then I have been following you (I can connect to your device via the VNC protocol). That is, I can see absolutely everything that you do, view and download your files and any data to yourself. I also have access to the camera on your device, and I periodically take photos and videos with you. I know what you like hard funs (adult sites).know your secret life, which you are hiding from everyone. Oh my God, what are your like I saw THIS Oh, you dirty naughty person :) I took photos and videos of your most passionate funs with adult content, and synchronized them in real time with the image of your camera.Transfer $901 to my Bitcoin 14XMwrqXdhz6YnShUuW37dTrKmpMFbJDHL
Canada, 2018-12-12 19:44:04