“Greetings! Would Like to Introduce Myself” Sextortion Email Scam

The “Greetings! Would like to introduce myself – I am a specialized hacker” email is a sextortion scam designed to trick you it into thinking your devices have been hacked and you have been spied on. The scammer claims to have full access to your operating system, including control over your webcam, and microphone which they used to record you. And, access to all of your personal files. They threaten to release alleged “compromising videos” they recorded of you during private moments unless a ransom of $950 in Bitcoin is sent to the Bitcoin wallet address 1GTVwiR2Y9FdbduBwVjnRB1yEmBM34BKMk (or other) within 50 hours.

This scam is completely fake and this message was not sent to you because you were hacked. The attacker used a method called email spoofing to make it appear as if they sent the email from your own account to you, creating a sense of fear that they accessed and used your account. Despite their claims and methods, they do not have access to your device, email account, and did not record anything. This is a mass-email scam designed to pressure victims into paying through fear and urgency.

The only issue with receiving an email like this is that there is a chance that your email address was obtained in a mega list by a scammer either being sold or leaked in a data breach. But, this does not mean that your email account was accessed, although we do recommend to change your password and follow other instructions on this page to ensure your security.

Table of Contents

What is the “Greetings! Would Like to Introduce Myself” Sextortion Email?

The “Greetings! Would like to introduce myself – I am a specialized hacker” email is part of an ongoing sextortion campaign where scammers claim they have hacked your computer and recorded you during private moments. They currently demand a Bitcoin payment of $950 to the Bitcoin wallet address 1GTVwiR2Y9FdbduBwVjnRB1yEmBM34BKMk, threatening to release supposed webcam recordings if the ransom isn’t paid within 50 hours.

Greetings! Would Like to Introduce Myself

These scams rely on fear, urgency, and social engineering to pressure victims into paying quickly. Many people unfamiliar with email spoofing may believe the scam is real because the sender appears to be their own email address. In reality, the scammer has not compromised your device or email account—they are simply forging the sender address using easily available tools.

How Do Sextortion Email Scams Work?

Sextortion email scams follow a predictable pattern and use psychological manipulation to trick victims. Here’s how they work:

  • Email Spoofing: The scammer forges the sender’s email address, making it look like the email came from your own account.
  • Mass Distribution: Thousands of identical emails are sent out, hoping that at least a few recipients will panic and pay.
  • False Claims: The scammer states they have installed “driver-based malware” that gives them access to your screen, webcam, and files.
  • Bitcoin Ransom Demand: The scammer instructs victims to send $950 in Bitcoin to wallet address 1GTVwiR2Y9FdbduBwVjnRB1yEmBM34BKMk within 50 hours.
  • Fear Tactics: The scam threatens to send embarrassing content to your contacts, employers, or family members.

In reality, the sender has no access to your device, and the threats are empty.

Example of the Sextortion Email

Subject: Your private information has been stolen because of suspicious events.
From: (Your Email Address)
Message:

Greetings!

Would like to introduce myself – I am a specialized hacker, and have succeeded in hacking your operating system.
[…]
There is a solution for you in this case – perform $950 USD transfer in Bitcoin to my wallet.

Bitcoin Wallet: 1GTVwiR2Y9FdbduBwVjnRB1yEmBM34BKMk
Deadline: 50 hours

Best of luck!

Steps to Take If You Receive This Sextortion Email

  1. Do not respond: Engaging with the scammer confirms your email is active.
  2. Do not send Bitcoin: The scammer is lying. Paying will not stop future threats.
  3. Change your email password: While the email was spoofed, updating security is still a good precaution.
  4. Enable two-factor authentication: Adds an extra layer of security.
  5. Report the email: Mark it as spam and report it to your email provider.

What to Do If You Paid the Scammer

  1. Do not send additional payments: Scammers will keep asking for more money.
  2. Check the Bitcoin transaction: You can track your payment using a Bitcoin blockchain explorer.
  3. Report the scam: File a complaint with the FBI’s IC3 and your local authorities.
  4. Contact your exchange: If you used Coinbase, Binance, or another service, report the fraud to them.

How to Check Your Device for Malware and Protect It

How to Use Malwarebytes:

  1. Download and install Malwarebytes.
  2. Open Malwarebytes and click Scan.
  3. Once the scan is complete, click Quarantine to remove any threats.
  4. Restart your device and run another scan to confirm removal.

For ongoing protection, consider Malwarebytes Premium.

Sean Doyle

Sean is a distinguished tech author and entrepreneur with over 20 years of extensive experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. His expertise and contributions to the industry have been recognized in numerous esteemed publications. Sean is widely acclaimed for his sharp intellect and innovative insights, solidifying his reputation as a leading figure in the tech community. His work not only advances the field but also helps businesses and individuals navigate the complexities of the digital world.

More Reading

Post navigation

Leave a Comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.