Blackmail scam
Abuser: [email protected]
Claimed to have hacked computer, requests bitcoin as payment before releasing private information.
Claimed to have hacked computer, requests bitcoin as payment before releasing private information.
Claims to have hacked my personal information and asks for a ransom in bitcoins.
Bitcoin Sex Blackmail > I am a spyware software developer. Your account has been hacked by me in the summer of 2018. > I understand that it is hard to believe, but here is my evidence (I sent you this email from your account). > The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296). Don't have Cisco hardware, neither a Webcam...
blackmail "hacker" scam
individual is blackmailing me that he has hacked my person al info and will expose all my personal info if I do not pay him in bitcoins
Says he has compromising info he will send to my contacts if I don't pay a ransom of $976
OrigIP:14.227.11.232 Received: from Smith442.edu (14.227.11.232) Received: from [30.165.44.118] by mxs.perenter.com with ASMTP; Tue, 04 Dec 2018 Received: from unknown (125.25.84.9) Received: from group21.345mail.com ([Tue, 04 Dec 2018 00:24:53 -0500]) Received: from unknown (HELO relay-x.misswldrs.com) (Tue, 04 Dec 2018 00:21:23 -0500) Ransomware
Blackmail Scam, no personal information is provided except for the mail adress the scam was sent to.
Hello, I am a spyware software developer. Your account has been hacked by me in the summer of 2018. I understand that it is hard to believe, but here is my evidence (I sent you this email from your account). The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296). I went around the security system in the router, installed an exploit there. When you went online, my exploit downloaded my malicious code (rootkit) to your device. This is driver software, I constantly updated it, so your antivirus is silent all time.
Email received: Hello, I am a spyware software developer. Your account has been hacked by me in the summer of 2018. I understand that it is hard to believe, but here is my evidence (I sent you this email from your account). The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296). I went around the security system in the router, installed an exploit there. When you went online, my exploit downloaded my malicious code (rootkit) to your device. This is driver software, I constantly updated it, so your antivirus is silent all time. Since then I have been following you (I can connect to your device via the VNC protocol). That is, I can see absolutely everything that you do, view and download your files and any data to yourself. I also have access to the camera on your device, and I periodically take photos and videos with you. ... and so on
Cisco router, vulnerability CVE-2018-0296 Sextortion Email
(Cisco router, vulnerability CVE-2018-0296)
Cisco router, vulnerability CVE-2018-0296
Hello, I am a spyware software developer. Your account has been hacked by me in the summer of 2018. I understand that it is hard to believe, but here is my evidence (I sent you this email from your account). The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296). I went around the security system in the router, installed an exploit there. When you went online, my exploit downloaded my malicious code (rootkit) to your device. This is driver software, I constantly updated it, so your antivirus is silent all time.
Hello, I am a spyware software developer. Your account has been hacked by me in the summer of 2018. I understand that it is hard to believe, but here is my evidence (I sent you this email from your account). The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296). I went around the security system in the router, installed an exploit there. When you went online, my exploit downloaded my malicious code (rootkit) to your device. This is driver software, I constantly updated it, so your antivirus is silent all time. Since then I have been following you (I can connect to your device via the VNC protocol). That is, I can see absolutely everything that you do, view and download your files and any data to yourself. I also have access to the camera on your device, and I periodically take photos and videos with you. [etc.]