Sextortion
Abuser: smtp.helo=[154.160.23.77]
Usual sextortion, correctly tagged as spam.
United States, 2022-05-10 17:25:02Usual sextortion, correctly tagged as spam.
United States, 2022-05-10 17:25:02"You have an outstanding payment" garbage.
United States, 2022-05-10 17:29:45The usual sextortion scam.
United States, 2022-05-10 18:33:44"Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet." etc. Asks for $1490 USD
Netherlands, 2022-05-10 18:37:14This is the third identical "I hacked your computer and made a video" scam I've received in the past two days. The text is the same, but the wallets are different.
United States, 2022-05-10 18:47:47Received: from r179-27-214-242.ir.static.adinet.com.uy (179.27.214.242) Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 18:56:01Received: from 201-88-50-10.user3p.brasiltelecom.net.br (201.88.50.10) Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 18:57:10Received: from [187.111.165.116] Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 18:58:09Received: from [45.188.182.105] Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 19:31:47Received an email telling me that a hacker has installed a Trojan virus in my Operating Systems. While I know this to be false since they used an email that is actually an alias and cannot be used to gain access to "all my devices" as the email claimed.
United Kingdom, 2022-05-10 20:23:39Received a message today that a hacker has planted a Trojan virus in my Operating Systems. These messages are always the same, and not at all specific about the "operating system". This is false. They also mention that they have "complete access to all devices that you use to browse internet".
United Kingdom, 2022-05-10 20:29:44Received: from [196.188.245.250] Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 21:21:13Received: from bfb1aca1.virtua.com.br (191.177.172.161) Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 21:22:46Received: from [43.225.251.66] Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 21:23:24Received: from [112.163.157.42] Subject: You have an outstanding payment. Debt settlement required. Hello! Unfortunately, I have some unpleasant news for you. Roughly several months ago I have managed to get a complete access to all devices that you use to browse internet. Afterwards, I have proceeded with monitoring all internet activities of yours. You can check out the sequence of events summarize below: Previously I have bought from hackers a special access to various email accounts (currently, it is rather a straightforward thing that can be done online). Clearly, I could effortlessly log in to your email account as well One week after that, I proceeded with installing a Trojan virus in Operating Systems of all your devices, which are used by you to login to your email. Actually, that was rather a simple thing to do (because you have opened a few links from your inbox emails previously). Genius is in simplicity. ( ^_~) Thanks to that software I can get access to all controllers inside your devices (such as your video camera, microphone, keyboard etc.). I could easily download all your data, photos, web browsing history and other information to my servers. I can access all your social networks accounts, messengers, emails, including chat history as well as contacts list. This virus of mine unceasingly keeps refreshing its signatures (since it is controlled by a driver), and as result stays unnoticed by antivirus software.
Canada, 2022-05-10 21:23:58