Did a hacker record you while you watched porn?

Email message claims a hacker recorded victims through their own camera during intimate moments.

A message from a self-proclaimed hacker claiming to have hacked its victims and recorded them through their own camera is circulating around the internet and making its way to inboxes globally.

The email scam is initially frightening for many unsuspecting recipients due to the fact that the sender with malicious intent will often spoof their victim’s email addresses, meaning they will make it appear as if they sent their intended sender a message from their own email account. Fortunately, the scammers did not actually access the account send their targets an email message from the inside. This is an email scam known as a sextortion scam that has been popular since 2018.

Sextortion email scams prey on the fear of their victims in order to typically extort cryptocurrency from them. The way they do this is by sending bulk email messages to multiple targets in hopes of eventually scaring one into believing the words typed in the fraudulent email message.

Here’s an example of an email message:

You have an outstanding payment.

Hello there!

Unfortunately, there are some bad news for you.
Around several months ago I have obtained access to your devices that you were using to browse internet.
Subsequently, I have proceeded with tracking down internet activities of yours.

Below, is the sequence of past events:
In the past, I have bought access from hackers to numerous email accounts (today, that is a very straightforward task that can be done online).
Clearly, I have effortlessly logged in to email account of yours ().

A week after that, I have managed to install Trojan virus to Operating Systems of all your devices that are used for email access.
Actually, that was quite simple (because you were clicking the links in inbox emails).
All smart things are quite straightforward. (>_<)

The software of mine allows me to access to all controllers in your devices, such as video camera, microphone and keyboard.
I have managed to download all your personal data, as well as web browsing history and photos to my servers.
I can access all messengers of yours, as well as emails, social networks, contacts list and even chat history.
My virus unceasingly refreshes its signatures (since it is driver-based), and hereby stays invisible for your antivirus.

So, by now you should already understand the reason why I remained unnoticed until this very moment…

While collecting your information, I have found out that you are also a huge fan of websites for adults.
You truly enjoy checking out porn websites and watching dirty videos, while having a lot of kinky fun.
I have recorded several kinky scenes of yours and montaged some videos, where you reach orgasms while passionately masturbating.

If you still doubt my serious intentions, it only takes couple mouse clicks to share your videos with your friends, relatives and even colleagues.
It is also not a problem for me to allow those vids for access of public as well.
I truly believe, you would not want this to occur, understanding how special are the videos you love watching, (you are clearly aware of that) all that stuff can result in a real disaster for you.

Let’s resolve it like this:
All you need is $1450 USD transfer to my account (bitcoin equivalent based on exchange rate during your transfer), and after the transaction is successful, I will proceed to delete all that kinky stuff without delay.
Afterwards, we can pretend that we have never met before. In addition, I assure you that all the harmful software will be deleted from all your devices. Be sure, I keep my promises.

That is quite a fair deal with a low price, bearing in mind that I have spent a lot of effort to go through your profile and traffic for a long period.
If you are unaware how to buy and send bitcoins – it can be easily fixed by searching all related information online.

Below is bitcoin wallet of mine: 15KquhG7RGkyXvEVT1aXLgPt4qgBEVe8rN

You are given not more than 48 hours after you have opened this email (2 days to be precise).

Below is the list of actions that you should not attempt doing:
Do not attempt to reply my email (the email in your inbox was created by me together with return address).
Do not attempt to call police or any other security services. Moreover, don’t even think to share this with friends of yours. Once I find that out (make no doubt about it, I can do that effortlessly, bearing in mind that I have full control over all your systems) – the video of yours will become available to public immediately.
Do not attempt to search for me – there is completely no point in that. All cryptocurrency transactions remain anonymous at all times.
Do not attempt reinstalling the OS on devices of yours or get rid of them. It is meaningless too, because all your videos are already available at remote servers.

Below is the list of things you don’t need to be concerned about:
That I will not receive the money you transferred.
– Don’t you worry, I can still track it, after the transaction is successfully completed, because I still monitor all your activities (trojan virus of mine includes a remote-control option, just like TeamViewer).
That I still will make your videos available to public after your money transfer is complete.
– Believe me, it is meaningless for me to keep on making your life complicated. If I indeed wanted to make it happen, it would happen long time ago!

Everything will be carried out based on fairness!

Before I forget…moving forward try not to get involved in this kind of situations anymore!
An advice from me – regularly change all the passwords to your accounts.

Unfortunately, your data was leaked online

Although this scam is normally regarded as harmless there is a potential issue that should be manually attended to by the receiver and that is that receiving this type of email message could indicate that the recipient’s email address and possibly other information was publicly leaked online. To find out if your email is in a data breach visit Have I Been Pwned and use the free tool to see which breaches and when your email address was exposed to the public.

In addition, it is strongly advised by security professionals to change the password to your email account as well as the passwords to all the accounts you have online to ensure your accounts are secure and data is protected.

  • Don’t use complete words.
  • Include uppercase letters, lowercase letters, numbers, and punctuation marks.
  • Do not reuse the same password for multiple accounts.

Scan your devices for malware!

Fortunately, sextortion scams are not customarily linked to malware. Their purpose is to cause fear through special engineering to trick their targets into giving them money. However, that does not mean that your mobile device or computer is not infected with malware or unwanted applications and we recommend using the free or paid versions of Malwarebytes to perform a full scan and remove any threats from Windows, Mac, Android, and iOS.

John Boyle

John is a tech author and engineer with over 20 years of experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and other topics. Sean's content has been featured in numerous publications.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.