Payment from Your Account’ Email Scam Targets Users with Sextortion Threats

What is the Payment from Your Account Sextortion Email?

The “Payment from Your Account” email is part of a well-known sextortion scam designed to scare victims into paying a ransom in Bitcoin. The email claims the sender has gained access to the recipient’s devices through a Trojan virus and recorded explicit videos. The scammer threatens to send these fake videos to the victim’s friends, family, and colleagues unless a payment of $1,350 in Bitcoin is made within 48 hours.

This particular sextortion email is unique because of its detailed narrative and the attempt to establish credibility by referencing hacking techniques, remote access, and specific threats. It also includes phrases like “Trojan virus” and “driver-based malware,” which are meant to sound technical and intimidate recipients. While these claims might sound convincing, they are entirely false and part of a mass-emailing scam targeting a large number of users.

How Does This Sextortion Scam Work?

Sextortion scams like this one rely on fear and urgency to coerce victims into paying. The scammer sends out thousands of identical emails, hoping that at least a few recipients will be frightened enough to believe the claims and pay the ransom.

Here’s how the scam typically works:

  • Mass email distribution: The scammer sends the same email to many recipients, claiming to have hacked their device and recorded compromising videos.
  • Use of stolen or guessed email addresses: The scammer often includes the recipient’s real email address to appear more convincing. Sometimes, the email may reference an old password obtained from a data breach.
  • Technical jargon: The email includes technical-sounding language to make it seem credible, such as mentioning remote control tools, Trojan viruses, and hidden malware that can bypass antivirus software.
  • Ransom demand in Bitcoin: The scammer asks for a specific amount of Bitcoin to ensure anonymity. They set a short deadline to create a sense of urgency.
  • Fear and embarrassment: The core strategy is to create panic by suggesting that explicit content will be shared with friends and family.

Despite the alarming nature of these emails, they are usually just empty threats. The scammer has not actually hacked the recipient’s device or recorded anything. However, the fear caused by these messages can lead some recipients to pay the ransom out of panic.

Example of the Payment from Your Account Email

info

Below is an example of the “Payment from Your Account” sextortion email. While the wording may change in different versions, the overall structure and intent remain the same.

Subject: Payment from your account
Message:
Greetings!

I have to share bad news with you.
Approximately few months ago I have gained access to your devices, which you use for internet browsing.
After that, I have started tracking your internet activities.

Here is the sequence of events:
Some time ago I have purchased access to email accounts from hackers. Obviously, I have easily managed to log in to your email account.

One week later, I installed a Trojan virus on all your devices. This software gives me full access to your microphone, video camera, and keyboard. I have downloaded all your information, data, photos, and web browsing history.
I have also recorded videos of you during “private moments” and will release them to your contacts unless you pay $1350 USD in Bitcoin.

Here is my Bitcoin wallet: 1P2T34QxRF9Ck7M65dgjiscAeV1ZQnp3Gt
You have 48 hours to pay.

Trust me, I will delete everything once the payment is received.

Payment from Your Account email scam

Steps to Take If You Receive This Sextortion Email

If you receive a sextortion email like this, it’s crucial to remain calm and take the following steps to protect yourself and your information:

  1. Do not respond to the email: Engaging with the scammer will only confirm that your email account is active and may lead to further targeting.
  2. Do not pay the ransom: These emails are sent in bulk, and the claims are false. Paying will not stop future scams.
  3. Change your passwords: As a precaution, change the password for your email account and any associated services.
  4. Check for malware: Run a full system scan using a trusted anti-malware tool to ensure your device is not infected.
  5. Enable two-factor authentication: Add an extra layer of security to your accounts to prevent unauthorized access.
  6. Report the email: Forward the email to your email provider’s abuse team and report it to relevant authorities if necessary.

How to Check Your Device for Malware and Protect It

Alert Icon

We recommend running a full scan with Malwarebytes to detect and remove any malware associated with this scam.

How to Use Malwarebytes:

  1. Download and install Malwarebytes.
  2. Open Malwarebytes and click on the Scan option.
  3. Wait for the scan to complete. Malwarebytes will display a list of detected threats.
  4. Click Quarantine to remove the threats.
  5. Restart your device and run a second scan to ensure complete removal.

malwarebytes

For ongoing protection, consider using Malwarebytes Premium, which offers real-time protection and advanced threat detection to keep your devices safe.

Sean Doyle

Sean is a distinguished tech author and entrepreneur with over 20 years of extensive experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. His expertise and contributions to the industry have been recognized in numerous esteemed publications. Sean is widely acclaimed for his sharp intellect and innovative insights, solidifying his reputation as a leading figure in the tech community. His work not only advances the field but also helps businesses and individuals navigate the complexities of the digital world.

More Reading

Post navigation

Leave a Comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.