{"id":7043,"date":"2024-09-29T14:42:25","date_gmt":"2024-09-29T14:42:25","guid":{"rendered":"https:\/\/www.smarthost.au\/blog\/?p=7043"},"modified":"2024-09-29T14:43:43","modified_gmt":"2024-09-29T14:43:43","slug":"fake-e-mails-from-hackers-and-other-dangerous-messages","status":"publish","type":"post","link":"https:\/\/www.smarthost.au\/blog\/fake-e-mails-from-hackers-and-other-dangerous-messages","title":{"rendered":"Fake e-mails from hackers and other dangerous messages."},"content":{"rendered":"\n<p>For a long time, despite the use of various spam filters, suspicious messages from blackmailers can occasionally be observed in email inboxes. They claim to have allegedly hacked the email account&#8217;s passwords or taken control of the computer, which allows them to publish photos or other data. According to the sender, the only way to prevent this is by transferring money in the form of cryptocurrencies (usually Bitcoin) to the wallet address provided in the message.<\/p>\n\n\n\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<pre class=\"wp-block-preformatted\"><em>Hi there!<br><br>I am a professional hacker and have successfully managed to hack your operating system. Currently, I have gained full access to your account.<br><br>In addition, I was secretly monitoring all your activities and watching you for several months. The thing is, your computer was infected with harmful spyware because you visited a website with adult content previously.<br><br>Let me explain what that entails. Thanks to Trojan viruses, I can gain complete access to your computer or any other device that you own. This means I can see absolutely everything on your screen and switch on the camera and microphone at any point in time without your permission.<br><br>In addition, I can access and view your confidential information, including your emails and chat messages.<br><br>You might wonder why your antivirus hasn't detected my malware. I\u2019m using harmful software that is driver-based, which refreshes its signatures every 4 hours, so your antivirus can\u2019t detect its presence.<br><br>I have made a video compilation. On the left side, it shows scenes of you masturbating, and on the right side, the video you were watching at that moment.<br><br>All I need to do is share this video with all your email contacts and messenger contacts. I can also make your emails and chat history public.<br><br>I believe you want to avoid this from happening. Here\u2019s what you need to do: transfer the Bitcoin equivalent of $790 to my Bitcoin account (it\u2019s a simple process you can look up online if you\u2019re unsure how to do it).<br><br>Here is my Bitcoin wallet: 14MRXnsQhQ7LQSfKPMsESdJsEPFDyMCmMg<br><br>Once the payment is made, I will delete the videos and disappear from your life forever. Please ensure the transfer is completed within 50 hours (2 days). I will receive a notification as soon as you open this email, and the countdown will start.<br><br>Trust me, I am careful, calculated, and I never make mistakes. If I find out you shared this message with anyone, I will immediately make your private videos public.<br><br>Good luck!<\/em><\/pre>\n\n\n\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>There are many variations of such messages, and similarities can often be observed. Frequently, you can spot spelling errors, an attempt at blackmail, and encouragement to transfer Bitcoins to the provided cryptocurrency wallet.<\/p>\n\n\n\n<p>The received messages, despite the sender&#8217;s claims, who provides detailed information about how they allegedly took control of the inbox or computer, are fake and should not cause concern. It is an old, yet cunning, attempt to extort money through blackmail.<\/p>\n\n\n\n<p>By sending the aforementioned messages, the senders are looking for naive individuals, and by using blackmail, they attempt to extort money from them.<\/p>\n\n\n\n<p>It\u2019s possible that there are still naive people who decide to pay, as spammers keep trying to send these emails. Therefore, one can assume that this business of fake emails is indeed profitable.<\/p>\n\n\n\n<p>However, it\u2019s important not to be among those naive individuals. It\u2019s worth considering whether the received messages are truly genuine or fake. In most cases, they are false. It\u2019s important to remember that anyone can write such an email. There are ways to spoof another email address. In this <a href=\"https:\/\/www.smarthost.au\/blog\/how-to-detect-email-sender-spoofing\" data-type=\"link\" data-id=\"https:\/\/www.smarthost.au\/blog\/how-to-detect-email-sender-spoofing\">article<\/a>, we presented methods that show how to easily analyze and distinguish legitimate messages from spoofed emails.<\/p>\n\n\n\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How to Stay Safe Online?<\/h2>\n\n\n\n<p>To ensure online safety, it&#8217;s important to follow a few key guidelines:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use strong passwords and change them regularly.<\/li>\n\n\n\n<li>Avoid visiting suspicious and potentially dangerous websites.<\/li>\n\n\n\n<li>Do not click on links sent by strangers (or even friends) in emails or through popular social media platforms such as Messenger or WhatsApp.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>For a long time, despite the use of various spam filters, suspicious messages from blackmailers can occasionally be observed in email inboxes. They claim to have allegedly hacked the email account&#8217;s passwords or taken control<a class=\"read-more\" href=\"https:\/\/www.smarthost.au\/blog\/fake-e-mails-from-hackers-and-other-dangerous-messages\">Continue reading<\/a><\/p>\n","protected":false},"author":27,"featured_media":7102,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[253,177,8,435,1],"tags":[1284,1285,1286,1287,1288,1289,1254,1290,1291,1292,728,1293,1294,1295],"class_list":["post-7043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-mail-hr","category-important","category-security","category-spam-pl","category-uncategorized","tag-avoiding-scams","tag-cryptocurrency-scams","tag-cyber-safety","tag-cybersecurity-tips","tag-email-protection","tag-email-scams","tag-hacking","tag-internet-safety","tag-malware","tag-online-security","tag-phishing","tag-social-media-threats","tag-spam-emails","tag-strong-passwords"],"_links":{"self":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts\/7043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/comments?post=7043"}],"version-history":[{"count":2,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts\/7043\/revisions"}],"predecessor-version":[{"id":7104,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/posts\/7043\/revisions\/7104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/media\/7102"}],"wp:attachment":[{"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/media?parent=7043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/categories?post=7043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smarthost.au\/blog\/wp-json\/wp\/v2\/tags?post=7043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}