Home » Blog » Cybersecurity » Scams » 1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba BTC Wallet Used in Scams
1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba BTC Wallet

1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba BTC Wallet Used in Scams

1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba BTC Wallet


Some of the latest sextortion email scams are using 1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba as a Bitcoin wallet to receive unlawful payments from scam victims. The 1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba BTC wallet, or crypto wallet, is linked to many internet scams that attempt to blackmail victims for money. The scams typically state that someone has hacked your device and recorded you through your camera during an intimate moment. In order for the video to be deleted, the scammers ask you to pay them a large amount of money in Bitcoin.

The purpose of using the 1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba Bitcoin wallet is to maintain anonymous exchanges between the scammer and their targets. Scammers use private crypto wallets like Coinbase as a place to store and move cryptocurrency including Bitcoin without getting caught. In some instances, cryptocurrency wallets may be examined by government agencies and security researchers, but for the most part, the owner of the wallet remains unidentified.

Also see: Fake Cybersecurity Blogs are Trying to Scam Sextortion Email Victims

Unfortunately, scammers associated with this BTC wallet target people who have had their data leaked online after a data breach that occurred on third-party sites such as Adobe, Experian, or Brave. In most cases, full names, usernames, passwords, telephone numbers, and more area leaked online and sold or exchanged on the dark web.

  • A good way to check if your email address has been compromised in a data breach is to scan your email address for free using https://haveibeenpwned.com/.

If you received a suspicious email message requesting you to send a Bitcoin payment to 1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba, ignore it, the message is fraudulent. However, since your information may have been leaked online it is advised to secure your accounts to avoid being exploited by another party.

Follow these best practices to secure your online accounts:

  • Create a unique password for all the accounts you access online. Avoid reusing the same password for more than one account.
  • Use a password manager such as 1PasswordLastPass, or Roboform if you have trouble remembering passwords.
  • Use special characters such as !@#$& to make your passwords harder for people to crack.
  • Use multi-factor authentication (MFA) such as two-factor authentication (2FA) whenever possible to add an extra layer of security.
  • Use a secure email service that provides end-to-end encryption such as Tutanota or ProtonMail.
  • Use Antivirus software such as Microsoft’s built-in Windows Defender Antivirus that is free and better than a lot of Antivirus programs on the market, especially when combined with Malwarebytes.

Example of scam email message linked to 1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba:

Security Alert. You account has been hacked. Password must be need changed.
From entelaalerbepif@uugmail.com


I’m a programmer who cracked your email account and device about half year ago.
You entered a password on one of the insecure site you visited, and I catched it.
Your password from on moment of crack was: tyg

Of course you can will change your password, or already made it.
But it doesn’t matter, my rat software update it every time.

Please don’t try to contact me or find me, it is impossible, since sender’s address was automatically generated.

Through your e-mail, I uploaded malicious code to your Operation System.
I saved all of your contacts with friends, colleagues, relatives and a complete history of visits to the Internet resources.
Also I installed a rat software on your device and long tome spying for you.

You are not my only victim, I usually lock devices and ask for a ransom.
But I was struck by the sites of intimate content that you very often visit.

I am in shock of your reach fantasies! Wow! I’ve never seen anything like this!
I did not even know that SUCH content could be so exciting!

So, when you had fun on intime sites (you know what I mean!)
I made screenshot with using my program from your camera of yours device.
After that, I jointed them to the content of the currently viewed site.

Will be funny when I send these photos to your contacts! And if your relatives see it?
BUT I’m sure you don’t want it. I definitely would not want to …

I will not do this if you pay me a little amount.
I think $721 is a nice price for it!

I accept only Bitcoins.
My BTC wallet: 1CTgHPz6JEGSLEbBqDzZwTXZQwfkdsuhba

If you have difficulty with this – Ask Google “how to make a payment on a bitcoin wallet”. It’s easy.
After receiving the above amount, all your data will be immediately removed automatically.
My virus will also will be destroy itself from your operating system.

My Trojan have auto alert, after this email is looked, I will be know it!

You have 2 days (48 hours) for make a payment.
If this does not happen – all your contacts will get crazy shots with your dirty life!
And so that you do not obstruct me, your device will be locked (also after 48 hours)

Do not take this frivolously! This is the last warning!
Various security services or antiviruses won’t help you for sure (I have already collected all your data).

Here are the recommendations of a professional:
Antiviruses do not help against modern malicious code. Just do not enter your passwords on unsafe sites!

I hope you will be prudent.

Sean Doyle

Sean is a tech author and engineer with over 20 years of experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and other topics. He is featured in several publications.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scam Using 1EnVwSYoCQ5hA6fqCxh56Dzqh17BydBnCy Bitcoin Wallet

Scams Using 14poC1Jg97vuvsyoKSZYz7h276LoAZcrtn Bitcoin Wallet

Fake Cybersecurity Blogs are Trying to Scam Sextortion Email Victims