Home » Blog » Scams » I Recorded You’ Email Scam: Protecting Yourself from Blackmail
I RECORDED YOU

I Recorded You’ Email Scam: Protecting Yourself from Blackmail

If you’ve ever received an email message from your own email account with the subject “I RECORDED YOU” that tries to blackmail you for Bitcoin, rest assured, you are not alone. This unsettling experience is part of a common sextortion scam, a nefarious scheme designed to instill fear and coerce you into transferring a sizable amount of Bitcoin to a specific BTC wallet – 13HAreeSVjLf3aueZXf9zmrS1FmvkF4opS. Interestingly, the BTC wallet’s balance currently stands at 0.00, indicating that, fortunately, it seems unlikely anyone has succumbed to this scam. This type of scam underscores a growing trend of digital extortion, where scammers exploit the anonymity and untraceable nature of cryptocurrencies like Bitcoin to conduct their illicit activities.

The mechanics behind this scam involve email spoofing services, which scammers employ to make it appear as though a hacker has compromised and is sending messages from your own email address. This technique is designed to create the illusion that they have direct access to your account, though in reality, they do not. In essence, anyone could utilize a free email spoofing website to send an email message appearing to come from any specified sender. This misuse of technology highlights the sophisticated tactics cybercriminals adopt to manipulate perceptions and gain unwarranted access to personal information.

Here’s an example:

Hello there!

Unfortunately, there are some bad news for you.

Some time ago your device was infected with my private trojan, R.A.T (Remote Administration Tool), if you want to find out more about it simply use Google.

My trojan allowed me to access your files, accounts and your camera.

Check the sender of this email, I have sent it from your email account.

To make sure you read this email, you will receive it multiple times.

You truly enjoy checking out porn websites and watching dirty videos, while having a lot of kinky fun.

I RECORDED YOU (through your camera) SATISFYING YOURSELF!

After that I removed my malware to not leave any traces.

If you still doubt my serious intentions, it only takes couple mouse clicks to share the video of you with your friends, relatives, all email contacts, on social networks, the darknet and to publish all your files.

All you need is $1800 USD in Bitcoin (BTC) transfer to my account.

After the transaction is successful, I will proceed to delete everything.

Be sure, I keep my promises.

You can easily buy Bitcoin (BTC) here:

https://cex.io/buy-bitcoins https://nexo.com/buy-crypto/bitcoin-btc https://bitpay.com/buy-bitcoin/?crypto=BTC https://paybis.com/ https://invity.io/buy-crypto

Or simply google other exchanger.

After that send the Bitcoin (BTC) directly to my wallet, or install the free software: Atomicwallet, or: Exodus wallet, then receive and send to mine.

My Bitcoin (BTC) address is: 13HAreeSVjLf3aueZXf9zmrS1FmvkF4opS

Yes, that's how the address looks like, copy and paste my address, it's (cAsE-sEnSEtiVE).

You are given not more than 3 days after you have opened this email.

As I got access to this email account, I will know if this email has already been read.

Everything will be carried out based on fairness.

An advice from me, regularly change all your passwords to your accounts and update your device with newest security patches.

In the case of “Critical security alert” emails, scammers capitalize on fear and urgency to deceive recipients into clicking on malicious links or downloading harmful attachments. Once clicked, these links may lead to fake login pages designed to steal your credentials or websites that deliver malware onto your device.

How to Spot an Email Scam:

When it comes to identifying email scams, it’s crucial to remain vigilant and recognize the red flags. Here are some warning signs to watch out for:

  • Suspicious Sender: Phishing emails often come from unfamiliar or suspicious email addresses impersonating legitimate companies like Google.
  • Urgent Language: Phishing emails typically use urgent language to prompt immediate action, such as “Critical security alert” or “Unusual activity detected.”
  • Generic Greetings: Lack of personalization, such as addressing you as “customer” or “user,” is a common trait of phishing emails.
  • Unsolicited Attachments: Emails containing unexpected attachments, especially from unknown sources, may contain malware or viruses.
  • Unverified Links: Links in phishing emails often lead to suspicious websites designed to steal login credentials or install malicious software.

Protecting Yourself Against Email Scams:

To safeguard yourself against phishing attempts and protect your sensitive information, follow these proactive measures:

  1. Verify the Sender: Always verify the legitimacy of the sender’s email address, especially when receiving unexpected or suspicious emails.
  2. Exercise Caution: Be cautious of emails with urgent requests or warnings, and avoid clicking on links or downloading attachments from unknown sources.
  3. Double-Check URLs: Before clicking on any links, hover your mouse over them to inspect the URL. Legitimate emails from Google will typically lead to domains like “google.com.”
  4. Enable Two-Factor Authentication (2FA): Adding an extra layer of security through 2FA can help prevent unauthorized access to your accounts, even if your credentials are compromised.
  5. Report Suspicious Emails: Report phishing attempts to the appropriate authorities or organizations, such as Google’s phishing reporting page.

What to Do If You’ve Fallen Victim to a Scam:

If you suspect that you’ve fallen victim to a phishing scam, take immediate action to mitigate the damage:

  1. Change Your Passwords: Immediately change the passwords for any accounts that may have been compromised.
  2. Run Antivirus Software: Use Antivirus software like Malwarebytes to scan for and remove malware, trojans, and viruses.
  3. Monitor Your Accounts: Regularly monitor your bank accounts, credit cards, and online accounts for any unauthorized activity.
  4. Report the Incident: Report the phishing attempt to the appropriate authorities, such as Google’s phishing reporting page, and consider filing a complaint with the Internet Crime Complaint Center (IC3).

By remaining vigilant and staying informed about the tactics used by cybercriminals, you can better protect yourself against email scams and safeguard your personal information from falling into the wrong hands. Remember, when it comes to your online security, it’s always better to err on the side of caution.

Protect Your Digital Life

Secure your online experience with Malwarebytes. Download now for comprehensive protection against malware, viruses, and other online threats.

Download Malwarebytes

Jared Harrison

Jared Harrison is an accomplished tech author and entrepreneur, bringing forth over 20 years of extensive expertise in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. He has made significant contributions to the industry and has been featured in multiple esteemed publications. Jared is widely recognized for his keen intellect and innovative insights, earning him a reputation as a respected figure in the tech community.

More Reading

Post navigation

Blackmail Email Scams – Stay Safe with This Guide

Scammers Demand $1,500 Worth of Bitcoin in Latest Scam

1JHePxmiJh11EuEZfNpooWLC4bwf8g5T3e BTC Wallet Linked to Scams