Sextortion
Abuser: Faked
Sadly, there are some bad news that you are about to hear. About few months ago I have gained a full access to all devices used by you for internet browsing. Shortly after, I started recording all internet activities done by you. Below is the sequence of events of how that happened: Earlier I purchased from hackers a unique access to diversified email accounts (at the moment, it is really easy to do using internet). As you can see, I managed to log in to your email account without breaking a sweat: ( ). Within one week afterwards, I installed a Trojan virus in your Operating Systems available on all devices that you utilize for logging in your email. To be frank, it was somewhat a very easy task (since you were kind enough to open some of links provided in your inbox emails). I know, you may be thinking now that I'm a genius. ... That is a great bargain with a low price, I assure you, because I have spent a lot of effort while recording and tracking down all your activities and dirty deeds during a long period of time. In case if you have no idea how to buy and transfer bitcoins - feel free to check the related info on the internet. Here is my bitcoin wallet for your reference: 1EKdS2BjXd8BzYtsu8U9nQmpcygCjGCjZx From now on, you have only 48 hours and countdown has started once you opened this very email (in other words, 2 days).
United States, 2022-06-27 11:22:57