Shocked man
Shocked man

Have you ever received this email and panicked?

“Hello!

I am a hacker who has access to your operating system.
I also have full access to your account.

I’ve been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.

If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.

‘I caught this b*tch lying!’ Akothee calls out daughter, Rue Baby

I also have access to all your contacts and all your correspondence.

Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.

I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.

If you want to prevent this,
transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: “Buy Bitcoin”).

My bitcoin address (BTC Wallet) is:  38KvabyXDioLKCLWyPcAVSxqcZREnhjZ8p

After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.

Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.

If I find that you have shared this message with someone else, the video will be immediately distributed.

Best regards!”

Leaked love notes between Zari Hassan and King Bae (screenshots)

Well, you have not been hacked. Those are just sextortionists looking to get your details and money.

Scammers behind this email scam use the so-called “spoofing” method to falsify the sender’s email address.

The spam email campaigns cannot do any damage without manual intervention by users who are encouraged to perform certain tasks.

Unfortunately, due to the lack of knowledge of these threats and careless behaviour, many users inadvertently help scammers to achieve their goals.

Emails of this type contain malicious attachments that infect computers only if opened. For example, if the attached file is an executable (.exe) file, it first needs to be executed (run) for it to install malicious programs.

If the attachment is an MS Office document, when opened, it will request permission to enable macro commands. Enabling these commands gives permission for a malicious document to download and install a high-risk virus. Similar rules apply to files of other types.

Do not open attachments (or links) that are included in emails received from unknown, suspicious or untrustworthy addresses, without carefully studying them first.

Read more

MPASHO TV