Ransomware
Abuser: spyware software developer.
The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296).
I went around the security system in the router, installed an exploit there.
When you went online, my exploit downloaded my malicious code (rootkit) to your device. This is driver software, I constantly updated it, so your antivirus is silent all time. Since then I have been following you (I can connect to your device via the VNC protocol).That is, I can see absolutely everything that you do, view and download your files and any data to yourself.
I also have access to the camera on your device, and I periodically take photos and videos with you.
Believe it turned out very high quality!So, to the business!I'm sure you don't want to show these files and visiting history to all your contacts.Transfer $835 to my Bitcoin cryptocurrency wallet:
France, 2018-11-15 20:48:29