Sextortion Email 2020 Scams: Beware

Sextortion Email 2020 Scams  Beware

This is the time of the year when cybercriminals start sending out Sextortion emails. Therefore, recipients of sextortion emails like the one below, which claims they have viewed child porn and threatens to expose them if they do not send money or Bitcoins, are asked to delete them and should not send any money or Bitcoin. This is because the email is being sent by cyber criminals who are attempting to frighten and trick their potential victims into sending them money, or in other words, extort money from them. So, let us not be a victim in 2020.

A Sextortion Email Scam

I do know [Password] is one of your pass words. Lets get right to point. No person has compensated me to check about you. You don't know me and you're probably wondering why you're getting this email?

in fact, i actually setup a malware on the X videos (adult porn) site and do you know what, you visited this site to have fun (you know what i mean). While you were viewing video clips, your browser started operating as a Remote Desktop that has a keylogger which provided me with accessibility to your screen and also web camera. after that, my software obtained your entire contacts from your Messenger, FB, and emailaccount. after that i created a double-screen video. 1st part displays the video you were watching (you've got a nice taste lol), and second part shows the recording of your cam, and its you.

You have got only 2 choices. We should understand each one of these possibilities in aspects:

First choice is to dismiss this email. Consequently, i most certainly will send out your videotape to every one of your contacts and then just imagine concerning the awkwardness that you receive. Not to mention should you be in an important relationship, exactly how it will eventually affect?

in the second place choice will be to give me $977. We will call it a donation. Consequently, i most certainly will instantly delete your videotape. You can go forward everyday life like this never happened and you never will hear back again from me.

You'll make the payment through Bi‌tco‌in (if you don't know this, search 'how to buy b‌itcoi‌n' in Google search engine).

B‌T‌C‌ ad‌dre‌ss: 1Cqbes67SULCSPsTxwbxfZJUygD7pfyKAT

[CaSe sensitive so copy and paste it]

if you have been thinking about going to the cops, good, this e-mail cannot be traced back to me. I have dealt with my moves. i am not looking to demand very much, i would like to be paid for. right now if i don't get the ‌bi‌tco‌in‌, i will definitely send your video to all of your contacts including relatives, co-workers, and so on.

Nevertheless, if i receive the payment, i will destroy the video right away. If you really want evidence, reply with Yes! then i will certainly send your video to your 14 friends. it's a nonnegotiable offer, and so please don't waste my time and yours by responding to this email message.

The cybercriminals may have your old password, but it doesn't mean that they have anything on you. It appears they may have gotten your password from the Yahoo or other internet hacks or data breaches that took place a few months or years ago. Yahoo and the companies who suffered the data breach have forced their users to change their passwords, so they should have nothing to worry about.

Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search Search engine.

Note: Some of the information in samples on this website may have been impersonated or spoofed.

Bookmark articleSave

Was this article helpful?

Comments, Questions, Answers, or Reviews

To protect your privacy, please remove sensitive or identifiable information from your comments, questions, or reviews. We will use your IP address to display your approximate location to other users when you make a post. That location is not enough to find you.

Your post will be set as anonymous because you are not signed in. An anonymous post cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.

January 9, 2021 at 8:55 AM by
Sextortion Email 2020 Scams: Beware
info

"Hello!

Have you recently noticed that I have e-mailed you from your account?

Yes, this simply means that I have total access to your device.

For the last couple of months, I have been watching you.

Still wondering how is that possible? Well, you have been infected with malware originating from an adult website that you visited. You may not be familiar with this, but I will try explaining it to you.

With help of the Trojan Virus, I have complete access to a PC or any other device.

This simply means I can see you at any time I wish to on your screen by simply turning on your camera and microphone, without you even noticing it. In addition, I have also got access to your contacts list and all your correspondence.

You may be asking yourself, "But my PC has an active antivirus, how is this even possible? Why didn't I receive any notification?" Well, the answer is simple: my malware uses drivers, where I update the signatures every four hours, making it undetectable, and hence keeping your antivirus silent.

I have a video of you w*****g on the left screen, and on the right screen - the video you were watching while m**********g.

Wondering how bad could this get? With just a single click of my mouse, this video can be sent to all your social networks, and e-mail contacts.

I can also share access to all your e-mail correspondence and messengers that you use.

All you have to do to prevent this from happening is - transfer bitcoins worth $1450 (USD) to my Bitcoin address (if you have no idea how to do this, you can open your browser and simply search: "Buy Bitcoin").

My bitcoin address (BTC Wallet) is: 1A2BsswHPrE2RvUusSQY4w53P1WjuUdpbN

After receiving a confirmation of your payment, I will delete the video right away, and that's it, you will never hear from me again.

You have 2 days (48 hours) to complete this transaction.

Once you open this e-mail, I will receive a notification, and my timer will start ticking.

Any attempt to file a complaint will not result in anything, since this e-mail cannot be traced back, same as my bitcoin id.

I have been working on this for a very long time by now; I do not give any chance for a mistake.

If, by any chance I find out that you have shared this message with anybody else, I will broadcast your video as mentioned above."

Here is another scam.

Delete

July 30, 2020 at 4:54 AM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Los Angeles, California, United States

I received a similar message from online acquaintance stating they had video of me and would expose it . But knowing I did nothing wrong I eventually blocked the numbers and deactivated my FB account .

Delete

July 30, 2020 at 4:46 AM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Los Angeles, California, United States

I had a friend request from a stranger and being polite she suggests her undressing and me watching her, she had already made it known her age was over 21, so I told her to do what she wanted . Then she proceeded to undress and get very intimate with herself . Then I picture of me flashes on screen and someone is threatening me to pay $4500 or they will post my picture all over the world and ruin my life a family . I don’t have family and if they want to post my picture online isn’t that illegal? The girl who sent friend request went off screen and some death threats and demand for money took over so I blocked the number. Then I received another call same area code threatening my life with threats of a mafia organization taking over if I don’t comply . I blocked them again and deactivated my online account they located me at and sent friend requests too. People are getting desperate and I saw what they were doing and mentioned it numerous times during initial conversation .

Delete

May 12, 2020 at 8:48 PM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Atlanta, Georgia, United States

I just got 1 of these today and the person want me to send them $2000 in bitcoin currency. The person told me I have 24 hrs. to come up with it or they'll expose me.

Delete

April 30, 2020 at 10:26 AM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Manlius, New York, United States

And this one...

"𝙸 πšŠπš– πš—πš˜πš πšπš˜πš’πš—πš 𝚝𝚘 πš—πšŽπšπš•πšŽπšŒπš πš’πš˜πšžπš› πšžπš—πšŠπšŒπšŒπšŽπš™πšπšŠπš‹πš•πšŽ πš‹πšŽπš‘πšŠπšŸπš’πš˜πš›.

π™Όπš’ 𝚎𝚒𝚎𝚜 πšŠπš›πšŽ πš•πš˜πšŒπš”πšŽπš 𝚊𝚝 𝚒𝚘𝚞.

πš‚πšƒπ™Ύπ™Ώ πšœπš’πšπšπš’πš—πš πš’πš— πš’πš˜πšžπš› πš‘πš˜πšžπšœπšŽ πšŠπš•πš• 𝚍𝚊𝚒 πšŠπš—πš πšœπšŒπš›πšŽπš πš’πš—πš πšŠπš›πš˜πšžπš—πš, πš’πš˜πšžπš› πš™πš•πšŠπš’πšπš’πš–πšŽ πšŒπš˜πš–πšŽπšœ 𝚝𝚘 πšŠπš— πšŽπš—πš πš—πš˜πš , πšπšžπšŒπš”πšπšŠπšŒπšŽ.

π™Έπš 𝚒𝚘𝚞 πšπšŽπšŽπš• 𝚒𝚘𝚞 πšŒπšŠπš— πšœπš’πš–πš™πš•πš’ πš’πšπš—πš˜πš›πšŽ πšπš‘πšŽ 𝚎-πš–πšŠπš’πš• πšŠπš—πš πš–πš˜πšŸπšŽ πš˜πš— πš πš’πšπš‘ πš’πš˜πšžπš› πšŽπšŸπšŽπš›πš’πšπšŠπš’ πš•πš’πšŸπš’πš—πš, 𝚒𝚘𝚞 πšŠπš›πšŽ πšžπš—πšπš˜πšžπš‹πšπšŽπšπš•πš’ πšπšžπšŒπš”πš’πš—πš πšπšŠπš•πšœπšŽ, πš‹πšžπšπšπš’πšŽ. 𝙸 πšŠπš– πšžπš™πš•πš˜πšŠπšπš’πš—πš πšπš‘πšŽ πšŸπš’πšπšŽπš˜ πšŒπš•πš’πš™πšœ πš›πš’πšπš‘πš πšπš‘πš’πšœ πš–πš˜πš–πšŽπš—πš πš˜πš— 𝟺 πš™πš˜πš›πš—πš˜ πš πšŽπš‹ πšœπš’πšπšŽπšœ. 𝙸 πšŠπš– πšŒπšŽπš›πšπšŠπš’πš— πšŽπšŸπšŽπš›πš’πš˜πš—πšŽ πš πš˜πšžπš•πš πšŒπšŽπš›πšπšŠπš’πš—πš•πš’ πš‘πšŠπšŸπšŽ πšπšžπš— πš πš’πšπš‘ πš’πš˜πšžπš› πšŸπš’πšπšŽπš˜ 𝚏𝚘𝚘𝚝𝚊𝚐𝚎.

𝚈𝚘𝚞 πš‘πšŠπšŸπšŽ πš–πšŠπšπšŽ πš–πšŽ πšπšžπš›πš’πš˜πšžπšœ, πšŠπš—πš πšπš‘πš’πšœ 𝚠𝚊𝚜 πšŠπš— πš–πšŽπšŠπšœπšžπš›πšŽπšœ 𝙸 πš—πšŽπšŽπšπšŽπš 𝚝𝚘 πšπšŠπš”πšŽ πš˜πš—. π™Έπš 𝚒𝚘𝚞 πšπš˜πš—'𝚝 πšœπšŽπš—πš πšπš‘πšŽ πš–πš˜πš—πšŽπš’ (𝚒𝚎𝚜, πš™πš›πš’πšŒπšŽ πš‘πšŠπšœ πšŽπšœπšŒπšŠπš•πšŠπšπšŽπš πš—πš˜πš !) 𝚝𝚘 πšπš‘πšŽ πšžπš—πšπšŽπš›πš—πšŽπšŠπšπš‘ πš‹πš’πšπšŒπš˜πš’πš— πšŠπšπšπš›πšŽπšœπšœ, 𝙸 πš πš’πš•πš• 𝚎-πš–πšŠπš’πš• πš’πš˜πšžπš› πšŸπš’πšπšŽπš˜ 𝚏𝚘𝚘𝚝𝚊𝚐𝚎 𝚝𝚘 πšŠπš•πš• 𝚘𝚏 πš’πš˜πšžπš› πšπš›πš’πšŽπš—πšπšœ, πšπšŠπš–πš’πš•πš’, πšŽπšŸπšŽπš›πš’ πšœπš’πš—πšπš•πšŽ πšπšžπšŒπš”πš’πš—πš πš™πšŽπš›πšœπš˜πš— 𝚒𝚘𝚞 πš’πšπšŽπš—πšπš’πšπš’.

π™±πšƒπ™² π™°πšπšπš›πšŽπšœπšœ:

12hnJUn6Nb4PvSz1fqg8Em7**Z6hytxMLh5u

π™²πš˜πš™πš’ & πš™πšŠπšœπšπšŽ πš’πš πšŠπš—πš πš›πšŽπš–πš˜πšŸπšŽ ** πšπš›πš˜πš– πš’πš

πš€πšžπšŠπš—πšπš’πšπš’: 𝟢.𝟺 π™±πšƒπ™²

πšƒπš’πšŒπš” πšπš’πšŒπš”. πšƒπš’πš–πšŽ πš›πšŽπšŠπš•πš•πš’ πšƒπ™Έπ™²π™Ίπ™Έπ™½π™Ά. πš†πš’πšπš‘ πšŽπšŠπšŒπš‘ πšŠπš—πš πšŽπšŸπšŽπš›πš’ πš™πšŠπšœπšœπš’πš—πš πš–πš’πš—πšžπšπšŽ, 𝚒𝚘𝚞 πšŠπš›πšŽ 𝚊 πšπš’πš—πš’ 𝚝𝚊𝚍 πšŒπš•πš˜πšœπšŽπš› 𝚝𝚘 πšŽπš–πš‹πš›πšŠπšœπšœπšŽπš–πšŽπš—πš πš™πš•πšžπšœ πšπš’πšœπšπš›πšŠπšŒπšŽ πšπš˜πš› πš•πš’πšπšŽπš•πš˜πš—πš. 𝙸 πšŽπš‘πš™πšŽπšŒπš 𝚒𝚘𝚞 πš πš’πš•πš• πš–πšŠπš”πšŽ πšπš‘πšŽ πšœπš–πšŠπš›πš πšπšŽπšŒπš’πšœπš’πš˜πš— πšŠπš—πš πšπš›πšŠπš—πšœπšπšŽπš› πš–πšŽ πšπš‘πšŽ πš™πšŠπš’πš–πšŽπš—πš. π™Ύπš› πšŽπš•πšœπšŽ 𝚒𝚘𝚞 πšŒπšŠπš— πšœπšπšŠπš›πš πšπšŽπšπšπš’πš—πš πš’πš˜πšžπš›πšœπšŽπš•πš πš›πšŽπšŠπšπš’ 𝚝𝚘 πšŽπš—πšπšžπš›πšŽ πšπš›πš˜πš– πšπš‘πšŽ πšŒπš˜πš—πšŒπšŽπššπšžπšŽπš—πšŒπšŽπšœ.

πšˆπ™Ύπš„ π™·π™°πš…π™΄ 𝟷𝟾 π™·π™Ύπš„πšπš‚ 𝙰𝙽𝙳 𝟺𝟽 π™Όπ™Έπ™½πš„πšƒπ™΄πš‚

𝙿.πš‚:

π™Έπš 𝚒𝚘𝚞 πšπšŽπš•πš• πš˜πšπš‘πšŽπš› πš™πšŽπš˜πš™πš•πšŽ πšŠπš‹πš˜πšžπš πšπš‘πš’πšœ 𝚎 πš–πšŠπš’πš•...

π™Έπš 𝚒𝚘𝚞 πš™πš˜πšœπš πš’πš πš˜πš— πšπš‘πšŽ πš’πš—πšπšŽπš›πš—πšŽπš...

π™Έπš 𝚒𝚘𝚞 πšπšŠπš’πš• 𝚝𝚘 πšœπšŽπš—πš πšπš‘πšŽ πšœπšŽπšπšπš•πšŽπš–πšŽπš—πš (πšπš˜πš› πšŠπš—πš’ πšπšžπšŒπš”πš’πš—πš πš›πšŽπšŠπšœπš˜πš—)

𝙸 πš πš’πš•πš• πšŒπšŽπš›πšπšŠπš’πš—πš•πš’ π™½πš˜πš πšŠπš•πš•πš˜πš  πš’πš!"

Delete

April 30, 2020 at 6:21 PM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Severn, Maryland, United States

Yup, I have received several of these scams recently. Old LinkedIn password used, hacked years ago and probably bought on the dark web. Ignore, delete.

Delete

April 27, 2020 at 2:41 PM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Freudenberg, Baden-WΓΌrttemberg, Germany

Got this on 27.04 in Germany:

"𝙸'πš– πšŠπš πšŠπš›πšŽ, x*x, πš’πšœ πš’πš˜πšžπš› πš™πšŠπšœπšœ πš πš˜πš›πš.

𝙸 πš—πšŽπšŽπš πš’πš˜πšžπš› 𝟷𝟢𝟢% πšŠπšπšπšŽπš—πšπš’πš˜πš— πšπš˜πš› πšπš‘πšŽ πšžπš™ πšŒπš˜πš–πš’πš—πš πšƒπš πšŽπš—πšπš’-πšπš˜πšžπš› πš‘πš˜πšžπš›πšœ, πš˜πš› 𝙸 πš πš’πš•πš• πšŒπšŽπš›πšπšŠπš’πš—πš•πš’ πš–πšŠπš”πšŽ πšœπšžπš›πšŽ 𝚒𝚘𝚞 πšπš‘πšŠπš 𝚒𝚘𝚞 πš•πš’πšŸπšŽ 𝚘𝚞𝚝 𝚘𝚏 πšœπš‘πšŠπš–πšŽ πšπš˜πš› πšπš‘πšŽ πš›πšŽπšœπš 𝚘𝚏 πš’πš˜πšžπš› πš•πš’πšπšŽπšπš’πš–πšŽ.

π™·πšŽπš•πš•πš˜, 𝚒𝚘𝚞 πšπš˜πš—'𝚝 πš”πš—πš˜πš  πš–πšŽ. 𝚈𝚎𝚝 𝙸 πš”πš—πš˜πš  πšŠπš•πš• πšπš‘πšŽ πšπš‘πš’πš—πšπšœ πš›πšŽπšπšŠπš›πšπš’πš—πš 𝚒𝚘𝚞. πšˆπš˜πšžπš› πšπšŠπšŒπšŽπš‹πš˜πš˜πš” πšŒπš˜πš—πšπšŠπšŒπš πš•πš’πšœπš, πšœπš–πšŠπš›πšπš™πš‘πš˜πš—πšŽ πšŒπš˜πš—πšπšŠπšŒπšπšœ πšŠπš•πš˜πš—πš πš πš’πšπš‘ πšŠπš•πš• πšπš‘πšŽ πšŸπš’πš›πšπšžπšŠπš• πšŠπšŒπšπš’πšŸπš’πšπš’ πš˜πš— πš’πš˜πšžπš› πšŒπš˜πš–πš™πšžπšπšŽπš› πšπš›πš˜πš– πš™πš›πšŽπšŸπš’πš˜πšžπšœ 𝟷𝟽𝟾 𝚍𝚊𝚒𝚜.

πš†πš‘πš’πšŒπš‘ πš’πš—πšŒπš•πšžπšπšŽπšœ, πš’πš˜πšžπš› πš–πšŠπšœπšπšžπš›πš‹πšŠπšπš’πš˜πš— πšŸπš’πšπšŽπš˜ 𝚏𝚘𝚘𝚝𝚊𝚐𝚎, πš πš‘πš’πšŒπš‘ πš‹πš›πš’πš—πšπšœ πš–πšŽ 𝚝𝚘 πšπš‘πšŽ πš–πšŠπš’πš— πš›πšŽπšŠπšœπš˜πš— πš πš‘πš’ 𝙸 πšŠπš– πšŒπš›πšŠπšπšπš’πš—πš πšπš‘πš’πšœ πšœπš™πšŽπšŒπš’πšπš’πšŒ πš–πšŠπš’πš• 𝚝𝚘 𝚒𝚘𝚞.

πš†πšŽπš•πš• πšπš‘πšŽ πš•πšŠπšœπš πšπš’πš–πšŽ 𝚒𝚘𝚞 πš πšŽπš—πš 𝚝𝚘 πšπš‘πšŽ πšŠπšπšžπš•πš πš™πš˜πš›πš— πš πšŽπš‹πš™πšŠπšπšŽπšœ, πš–πš’ πš–πšŠπš•πš πšŠπš›πšŽ πšŽπš—πšπšŽπš πšžπš™ πš‹πšŽπš’πš—πš πšπš›πš’πšπšπšŽπš›πšŽπš πš’πš—πšœπš’πšπšŽ πš’πš˜πšžπš› πš™πšŒ πš πš‘πš’πšŒπš‘ πšŽπš—πšπšŽπš πšžπš™ πšœπšŠπšŸπš’πš—πš 𝚊 πš•πš˜πšŸπšŽπš•πš’ 𝚏𝚘𝚘𝚝𝚊𝚐𝚎 𝚘𝚏 πš’πš˜πšžπš› πšœπšŽπš•πš πš™πš•πšŽπšŠπšœπšžπš›πšŽ πš™πš•πšŠπš’ πšœπš’πš–πš™πš•πš’ πš‹πš’ πšŠπšŒπšπš’πšŸπšŠπšπš’πš—πš πš’πš˜πšžπš› πšŒπšŠπš–.

(𝚒𝚘𝚞 𝚐𝚘𝚝 𝚊 πšŽπš‘πšŒπšŽπš™πšπš’πš˜πš—πšŠπš•πš•πš’ πšžπš—πšžπšœπšžπšŠπš• 𝚝𝚊𝚜𝚝𝚎 πš‹πš’ πšπš‘πšŽ 𝚠𝚊𝚒 πš•πš–πšπšŠπš˜)

𝙸 πš‘πšŠπšŸπšŽ 𝚐𝚘𝚝 πšπš‘πšŽ πšŒπš˜πš–πš™πš•πšŽπšπšŽ πš›πšŽπšŒπš˜πš›πšπš’πš—πš. π™Έπš πš™πšŽπš›πš‘πšŠπš™πšœ 𝚒𝚘𝚞 πšπšŽπšŽπš• 𝙸 'πš– πšπš˜πš˜πš•πš’πš—πš πšŠπš›πš˜πšžπš—πš, πšœπš’πš–πš™πš•πš’ πš›πšŽπš™πš•πš’ πš™πš›πš˜πš˜πš πšŠπš—πš 𝙸 πš πš’πš•πš• πš‹πšŽ πšπš˜πš›πš πšŠπš›πšπš’πš—πš πšπš‘πšŽ πš›πšŽπšŒπš˜πš›πšπš’πš—πš πš›πšŠπš—πšπš˜πš–πš•πš’ 𝚝𝚘 𝟿 πš™πšŽπš˜πš™πš•πšŽ 𝚒𝚘𝚞 πš”πš—πš˜πš .

π™Έπš πš–πšŠπš’ πšŽπš—πš πšžπš™ πš‹πšŽπš’πš—πš πš’πš˜πšžπš› πšπš›πš’πšŽπš—πš, 𝚌𝚘 πš πš˜πš›πš”πšŽπš›πšœ, πš‹πš˜πšœπšœ, πš™πšŠπš›πšŽπš—πšπšœ (𝙸 πšπš˜πš—'𝚝 πš”πš—πš˜πš ! π™Όπš’ πšœπš˜πšπšπš πšŠπš›πšŽ πš™πš›πš˜πšπš›πšŠπš– πš πš’πš•πš• πš›πšŠπš—πšπš˜πš–πš•πš’ πšœπšŽπš•πšŽπšŒπš πšπš‘πšŽ πšŒπš˜πš—πšπšŠπšŒπš πšπšŽπšπšŠπš’πš•πšœ).

πš†πš’πš•πš• 𝚒𝚘𝚞 πš‹πšŽ πšŠπš‹πš•πšŽ 𝚝𝚘 𝚐𝚊𝚣𝚎 πš’πš—πšπš˜ πšŠπš—πš’πš˜πš—πšŽ'𝚜 𝚎𝚒𝚎𝚜 πšŠπšπšŠπš’πš— πšŠπšπšπšŽπš› πš’πš? 𝙸 πššπšžπšŽπšœπšπš’πš˜πš— πšπš‘πšŠπš...

π™½πš˜πš—πšŽπšπš‘πšŽπš•πšŽπšœπšœ, πš’πš 𝚍𝚘𝚎𝚜 πš—πš˜πš πš—πšŽπšŽπš 𝚝𝚘 πš‹πšŽ πšπš‘πšŠπš πš›πš˜πšžπšπšŽ.

𝙸 πš πšŠπš—πš 𝚝𝚘 πš–πšŠπš”πšŽ 𝚒𝚘𝚞 𝚊 𝟷 πšπš’πš–πšŽ, πš—πš˜ πš—πšŽπšπš˜πšπš’πšŠπš‹πš•πšŽ πš˜πšπšπšŽπš›.

π™Ώπšžπš›πšŒπš‘πšŠπšœπšŽ $ 𝟸𝟢𝟢𝟢 πš’πš— πš‹πš’πšπšŒπš˜πš’πš— πšŠπš—πš πšœπšŽπš—πš πš’πš πš˜πš— πšπš‘πšŽ πš‹πšŽπš•πš˜πš  πšŠπšπšπš›πšŽπšœπšœ:

1LQ399Naz8XBbVxoZhjg*XN5zDrzkGdyFQq

[𝚌𝚊𝚜𝚎 πš‚π™΄π™½πš‚π™Έπšƒπ™Έπš…π™΄ 𝚜𝚘 πšŒπš˜πš™πš’ & πš™πšŠπšœπšπšŽ πš’πš, πšŠπš—πš πš›πšŽπš–πš˜πšŸπšŽ * πšπš›πš˜πš– πš’πš]

(π™Έπš 𝚒𝚘𝚞 πšπš˜πš—'𝚝 πšžπš—πšπšŽπš›πšœπšπšŠπš—πš πš‘πš˜πš , πšπš˜πš˜πšπš•πšŽ πš‘πš˜πš  𝚝𝚘 πšŠπšŒπššπšžπš’πš›πšŽ πš‹πš’πšπšŒπš˜πš’πš—. π™³πš˜ πš—πš˜πš 𝚠𝚊𝚜𝚝𝚎 πš–πš’ πš™πš›πšŽπšŒπš’πš˜πšžπšœ πšπš’πš–πšŽ)

π™Έπš 𝚒𝚘𝚞 πšœπšŽπš—πš 𝚘𝚞𝚝 πšπš‘πš’πšœ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› 'πšπš˜πš—πšŠπšπš’πš˜πš—' (πš πš‘πš’ πšπš˜πš—'𝚝 𝚠𝚎 πšŒπšŠπš•πš• πš’πš πšπš‘πšŠπš?). π™Έπš–πš–πšŽπšπš’πšŠπšπšŽπš•πš’ πšŠπšπšπšŽπš› πšπš‘πšŠπš, 𝙸 πš πš’πš•πš• 𝚐𝚘 𝚊𝚠𝚊𝚒 πšπš˜πš› 𝚐𝚘𝚘𝚍 πšŠπš—πš πš—πšŽπšŸπšŽπš› πšŽπšŸπšŽπš› πšŒπš˜πš—πšπšŠπšŒπš 𝚒𝚘𝚞 πšŠπšπšŠπš’πš—. 𝙸 πš πš’πš•πš• πšπšŽπš•πšŽπšπšŽ πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš 𝙸 πš‘πšŠπšŸπšŽ πšŒπš˜πš—πšŒπšŽπš›πš—πš’πš—πš 𝚒𝚘𝚞. 𝚈𝚘𝚞 πš–πšŠπš’ πšŸπšŽπš›πš’ πš πšŽπš•πš• πšŒπš˜πš—πšπš’πš—πšžπšŽ πš•πš’πšŸπš’πš—πš πš’πš˜πšžπš› πš›πšŽπšπšžπš•πšŠπš› 𝚍𝚊𝚒 𝚝𝚘 𝚍𝚊𝚒 πš•πš’πšπšŽ πš πš’πšπš‘ πš£πšŽπš›πš˜ πšŒπš˜πš—πšŒπšŽπš›πš—.

𝚈𝚘𝚞 πš‘πšŠπšŸπšŽ 𝟷 𝚍𝚊𝚒 𝚝𝚘 𝚍𝚘 𝚜𝚘. πšˆπš˜πšžπš› πšπš’πš–πšŽ πš‹πšŽπšπš’πš—πšœ 𝚊𝚜 πšœπš˜πš˜πš— 𝚒𝚘𝚞 πš›πšŽπšŠπš πšπš‘πš’πšœ 𝚎 πš–πšŠπš’πš•. 𝙸 πš‘πšŠπšŸπšŽ 𝚐𝚘𝚝 πšŠπš— πš˜πš—πšŽ 𝚘𝚏 𝚊 πš”πš’πš—πš πš™πš›πš˜πšπš›πšŠπš– 𝚌𝚘𝚍𝚎 πšπš‘πšŠπš πš πš’πš•πš• πšŠπš•πšŽπš›πš πš–πšŽ 𝚊𝚜 πšœπš˜πš˜πš— 𝚊𝚜 𝚒𝚘𝚞 𝚐𝚘 πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πš’πšœ πšŽπš–πšŠπš’πš• πšπš‘πšŽπš›πšŽπšπš˜πš›πšŽ 𝚍𝚘 πš—πš˜πš πšŠπšπšπšŽπš–πš™πš 𝚝𝚘 πš™πš•πšŠπš’ πšœπš–πšŠπš›πš."

Delete

April 28, 2020 at 4:21 PM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Steubenville, Ohio, United States

I got the same e-mail also

Delete

April 27, 2020 at 1:44 PM by
Sextortion Email 2020 Scams: Beware
an anonymous user from: Crewe, England, United Kingdom

I have received an email like the one above from Adored Niedewski, at 14.40 today, 27 April.

Delete

April 23, 2020 at 3:02 PM by
Sextortion Email 2020 Scams: Beware
info

"From: Humfried Martelli <kccissybtr@hotmail.com>

Sent: Wednesday, April 22, 2020 10:05 AM

Subject:

𝙸'πš– πšŠπš πšŠπš›πšŽ,, πš’πšœ πš’πš˜πšžπš› πš™πšŠπšœπšœπš πš˜πš›πš.

𝙸 πš—πšŽπšŽπš πš’πš˜πšžπš› πšπš˜πšπšŠπš• πšŠπšπšπšŽπš—πšπš’πš˜πš— πšπš˜πš› πšπš‘πšŽ πšŒπš˜πš–πš’πš—πš πšƒπš πšŽπš—πšπš’-πšπš˜πšžπš› πš‘πš›πšœ, πš˜πš› 𝙸 πš–πšŠπš’ πš–πšŠπš”πšŽ πšœπšžπš›πšŽ 𝚒𝚘𝚞 πšπš‘πšŠπš 𝚒𝚘𝚞 πš•πš’πšŸπšŽ 𝚘𝚞𝚝 𝚘𝚏 πšŽπš–πš‹πšŠπš›πš›πšŠπšœπšœπš–πšŽπš—πš πšπš˜πš› πšπš‘πšŽ πš›πšŽπšœπš 𝚘𝚏 πš’πš˜πšžπš› πšŽπš‘πš’πšœπšπšŽπš—πšŒπšŽ.

π™·πš’, 𝚒𝚘𝚞 πšπš˜πš—'𝚝 πš”πš—πš˜πš  πš–πšŽ πš™πšŽπš›πšœπš˜πš—πšŠπš•πš•πš’. 𝚈𝚎𝚝 𝙸 πš”πš—πš˜πš  πšŠπš•πš• πšπš‘πšŽ πšπš‘πš’πš—πšπšœ πšŒπš˜πš—πšŒπšŽπš›πš—πš’πš—πš 𝚒𝚘𝚞. πšˆπš˜πšžπš› πšŽπš—πšπš’πš›πšŽ πšπš‹ πšŒπš˜πš—πšπšŠπšŒπš πš•πš’πšœπš, πš™πš‘πš˜πš—πšŽ πšŒπš˜πš—πšπšŠπšŒπšπšœ 𝚊𝚜 πš πšŽπš•πš• 𝚊𝚜 πšŠπš•πš• πšπš‘πšŽ πš˜πš—πš•πš’πš—πšŽ πšŠπšŒπšπš’πšŸπš’πšπš’ πš˜πš— πš’πš˜πšžπš› πšŒπš˜πš–πš™πšžπšπšŽπš› πšπš›πš˜πš– πš™πš›πšŽπšŸπš’πš˜πšžπšœ 𝟷𝟹𝟺 𝚍𝚊𝚒𝚜.

πš†πš‘πš’πšŒπš‘ πš’πš—πšŒπš•πšžπšπšŽπšœ, πš’πš˜πšžπš› πš–πšŠπšœπšπšžπš›πš‹πšŠπšπš’πš˜πš— πšŸπš’πšπšŽπš˜, πš πš‘πš’πšŒπš‘ πš‹πš›πš’πš—πšπšœ πš–πšŽ 𝚝𝚘 πšπš‘πšŽ πš™πš›πš’πš–πšŠπš›πš’ πš›πšŽπšŠπšœπš˜πš— πš πš‘πš’ 𝙸 'πš– πš πš›πš’πšπš’πš—πš πšπš‘πš’πšœ 𝚎-πš–πšŠπš’πš• 𝚝𝚘 𝚒𝚘𝚞.

πš†πšŽπš•πš• πšπš‘πšŽ πš™πš›πšŽπšŸπš’πš˜πšžπšœ πšπš’πš–πšŽ 𝚒𝚘𝚞 πšŸπš’πšœπš’πšπšŽπš πšπš‘πšŽ πšŠπšπšžπš•πš πš–πšŠπšπšŽπš›πš’πšŠπš• πš˜πš—πš•πš’πš—πšŽ πšœπš’πšπšŽπšœ, πš–πš’ πš–πšŠπš•πš πšŠπš›πšŽ 𝚠𝚊𝚜 πšŠπšŒπšπš’πšŸπšŠπšπšŽπš πš’πš— πš’πš˜πšžπš› πš™πšŽπš›πšœπš˜πš—πšŠπš• πšŒπš˜πš–πš™πšžπšπšŽπš› πš πš‘πš’πšŒπš‘ πšŽπš—πšπšŽπš πšžπš™ πšœπšŠπšŸπš’πš—πš 𝚊 πš•πš˜πšŸπšŽπš•πš’ πšŸπš’πšπšŽπš˜ πšŒπš•πš’πš™ 𝚘𝚏 πš’πš˜πšžπš› πšœπšŽπš•πš πš™πš•πšŽπšŠπšœπšžπš›πšŽ πš™πš•πšŠπš’ πš‹πš’ πšŠπšŒπšπš’πšŸπšŠπšπš’πš—πš πš’πš˜πšžπš› πš πšŽπš‹ πšŒπšŠπš–.

(𝚒𝚘𝚞 𝚐𝚘𝚝 𝚊 πšžπš—πššπšžπšŽπšœπšπš’πš˜πš—πšŠπš‹πš•πš’ πšžπš—πšžπšœπšžπšŠπš• πš™πš›πšŽπšπšŽπš›πšŽπš—πšŒπšŽ πš‹πšπš  πš‘πšŠπš‘πšŠ)

𝙸 πš‘πšŠπšŸπšŽ πšπš‘πšŽ πšŒπš˜πš–πš™πš•πšŽπšπšŽ πš›πšŽπšŒπš˜πš›πšπš’πš—πš. π™Ήπšžπšœπš πš’πš— 𝚌𝚊𝚜𝚎 𝚒𝚘𝚞 πšπšŽπšŽπš• 𝙸 πšŠπš– πš™πš•πšŠπš’πš’πš—πš πšŠπš›πš˜πšžπš—πš, πš“πšžπšœπš πš›πšŽπš™πš•πš’ πš™πš›πš˜πš˜πš πšŠπš—πš 𝙸 πš πš’πš•πš• πš‹πšŽ πšπš˜πš›πš πšŠπš›πšπš’πš—πš πšπš‘πšŽ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› πš›πšŽπšŒπš˜πš›πšπš’πš—πš πš›πšŠπš—πšπš˜πš–πš•πš’ 𝚝𝚘 𝟷𝟢 πš™πšŽπš˜πš™πš•πšŽ 𝚒𝚘𝚞'πš›πšŽ πšπš›πš’πšŽπš—πšπšœ πš πš’πšπš‘.

π™Έπš πš–πš’πšπš‘πš πš‹πšŽ πš’πš˜πšžπš› πšπš›πš’πšŽπš—πšπšœ, 𝚌𝚘 πš πš˜πš›πš”πšŽπš›πšœ, πš‹πš˜πšœπšœ, πš–πš˜πšπš‘πšŽπš› πšŠπš—πš πšπšŠπšπš‘πšŽπš› (𝙸'πš– πš—πš˜πš πšœπšžπš›πšŽ! π™Όπš’ πšœπš˜πšπšπš πšŠπš›πšŽ πš πš’πš•πš• πš›πšŠπš—πšπš˜πš–πš•πš’ πšŒπš‘πš˜πš˜πšœπšŽ πšπš‘πšŽ πšŒπš˜πš—πšπšŠπšŒπšπšœ).

πš†πš˜πšžπš•πš 𝚒𝚘𝚞 πš‹πšŽ πšŠπš‹πš•πšŽ 𝚝𝚘 πš•πš˜πš˜πš” πš’πš—πšπš˜ πšŠπš—πš’πš˜πš—πšŽ'𝚜 𝚎𝚒𝚎𝚜 πšŠπšπšŠπš’πš— πšŠπšπšπšŽπš› πš’πš? 𝙸 πššπšžπšŽπšœπšπš’πš˜πš— πš’πš...

π™½πš˜πš—πšŽπšπš‘πšŽπš•πšŽπšœπšœ, πšπš˜πšŽπšœπš—'𝚝 πš—πšŽπšŒπšŽπšœπšœπšŠπš›πš’πš•πš’ πš‘πšŠπšŸπšŽ 𝚝𝚘 πš‹πšŽ πšπš‘πšŠπš 𝚠𝚊𝚒.

𝙸 πš πšŠπš—πš 𝚝𝚘 πš–πšŠπš”πšŽ 𝚒𝚘𝚞 𝚊 𝟷 πšπš’πš–πšŽ, πš—πš˜ πš—πšŽπšπš˜πšπš’πšŠπš‹πš•πšŽ πš˜πšπšπšŽπš›.

π™±πšžπš’ πš„πš‚π™³ 𝟸𝟢𝟢𝟢 πš’πš— πš‹πš’πšπšŒπš˜πš’πš— πšŠπš—πš πšœπšŽπš—πš πš’πš 𝚝𝚘 πšπš‘πšŽ πš‹πšŽπš•πš˜πš  πšŠπšπšπš›πšŽπšœπšœ:

19gkhb8U*GQLApQ14RvF9YtuzYjCheNbFB8

[𝚌𝚊𝚜𝚎 πšœπšŽπš—πšœπš’πšπš’πšŸπšŽ 𝚜𝚘 πšŒπš˜πš™πš’ πšŠπš—πš πš™πšŠπšœπšπšŽ πš’πš, πšŠπš—πš πš›πšŽπš–πš˜πšŸπšŽ * πšπš›πš˜πš– πš’πš]

(π™Έπš 𝚒𝚘𝚞 πšπš˜πš—'𝚝 πš”πš—πš˜πš  πš‘πš˜πš , πšπš˜πš˜πšπš•πšŽ πš‘πš˜πš  𝚝𝚘 πšŠπšŒπššπšžπš’πš›πšŽ πš‹πš’πšπšŒπš˜πš’πš—. π™³πš˜ πš—πš˜πš 𝚠𝚊𝚜𝚝𝚎 πš–πš’ πš™πš›πšŽπšŒπš’πš˜πšžπšœ πšπš’πš–πšŽ)

π™Έπš 𝚒𝚘𝚞 πšœπšŽπš—πš πšπš‘πš’πšœ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› 'πšπš˜πš—πšŠπšπš’πš˜πš—' (πš•πšŽπš'𝚜 πšŒπšŠπš•πš• πšπš‘πš’πšœ πšπš‘πšŠπš?). π™Έπš–πš–πšŽπšπš’πšŠπšπšŽπš•πš’ πšŠπšπšπšŽπš› πšπš‘πšŠπš, 𝙸 πš πš’πš•πš• 𝚐𝚘 𝚊𝚠𝚊𝚒 πšŠπš—πš πš—πšŽπšŸπšŽπš› πšŒπš˜πš—πšπšŠπšŒπš 𝚒𝚘𝚞 πšŠπšπšŠπš’πš—. 𝙸 πš πš’πš•πš• πšŽπš•πš’πš–πš’πš—πšŠπšπšŽ πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš 𝙸 πš‘πšŠπšŸπšŽ πšŒπš˜πš—πšŒπšŽπš›πš—πš’πš—πš 𝚒𝚘𝚞. 𝚈𝚘𝚞 πš–πšŠπš’ πš™πš›πš˜πšŒπšŽπšŽπš πš•πš’πšŸπš’πš—πš πš’πš˜πšžπš› πš—πš˜πš›πš–πšŠπš• 𝚍𝚊𝚒 𝚝𝚘 𝚍𝚊𝚒 πš•πš’πšπšŽπšœπšπš’πš•πšŽ πš πš’πšπš‘ πš£πšŽπš›πš˜ πšŒπš˜πš—πšŒπšŽπš›πš—.

𝚈𝚘𝚞'𝚟𝚎 𝟷 𝚍𝚊𝚒 πš’πš— πš˜πš›πšπšŽπš› 𝚝𝚘 𝚍𝚘 𝚜𝚘. πšˆπš˜πšžπš› πšπš’πš–πšŽ πš πš’πš•πš• πš‹πšŽπšπš’πš— 𝚊𝚜 πššπšžπš’πšŒπš”πš•πš’ 𝚒𝚘𝚞 πš›πšŽπšŠπš πšπš‘πš’πšœ 𝚎-πš–πšŠπš’πš•. 𝙸 πš‘πšŠπšŸπšŽ πšŠπš— πšœπš™πšŽπšŒπš’πšŠπš• 𝚌𝚘𝚍𝚎 πšπš‘πšŠπš πš πš’πš•πš• πšπšŽπš•πš• πš–πšŽ πš˜πš—πšŒπšŽ 𝚒𝚘𝚞 𝚜𝚎𝚎 πšπš‘πš’πšœ πš–πšŠπš’πš• πšπš‘πšŽπš›πšŽπšπš˜πš›πšŽ 𝚍𝚘 πš—πš˜πš πšŠπšπšπšŽπš–πš™πš 𝚝𝚘 𝚊𝚌𝚝 πšœπš–πšŠπš›πš."

Received this scam.

Delete

Write Your Comment, Question, Answer, or Review

Online Threat Alerts Security Tips

Pay the safest way

Credit cards are the safest way to pay for online purchases because you can dispute the charges if you never get the goods or services or if the offer was misrepresented. Federal law limits your liability to $50 if someone makes unauthorized charges to your account, and most credit card issuers will remove them completely if you report the problem promptly.

Guard your personal information

In any transaction you conduct, make sure to check with your state or local consumer protection agency and the Better Business Bureau (BBB) to see if the seller, charity, company, or organization is credible. Be especially wary if the entity is unfamiliar to you. Always call the number found on a website’s contact information to make sure the number legitimately belongs to the entity you are dealing with.

Be careful of the information you share

Never give out your codes, passwords or personal information, unless you are sure of who you're dealing with

Know who you’re dealing with

Crooks pretending to be from companies you do business with may call or send an email, claiming they need to verify your personal information. Don’t provide your credit card or bank account number unless you are actually paying for something and know who you are sending payment to. Your social security number should not be necessary unless you are applying for credit. Be especially suspicious if someone claiming to be from a company with whom you have an account asks for information that the business already has.

Check your accounts

Regularly check your account transactions and report any suspicious or unauthorised transactions.

Don’t believe promises of easy money

If someone claims that you can earn money with little or no work, get a loan or credit card even if you have bad credit, or make money on an investment with little or no risk, it’s probably a scam. Oftentimes, offers that seem too good to be true, actually are too good to be true.

Do not open email from people you don’t know

If you are unsure whether an email you received is legitimate, try contacting the sender directly via other means. Do not click on any links in an email unless you are sure it is safe.

Think before you click

If an email or text message looks suspicious, don’t open any attachments or click on the links.

Verify urgent requests or unsolicited emails, messages or phone calls before you respond

If you receive a message or a phone call asking for immediate action and don't know the sender, it could be a phishing message.

Be careful with links and new website addresses

Malicious website addresses may appear almost identical to legitimate sites. Scammers often use a slight variation in spelling or logo to lure you. Malicious links can also come from friends whose email has unknowingly been compromised, so be careful.

Secure your personal information

Before providing any personal information, such as your date of birth, Social Security number, account numbers, and passwords, be sure the website is secure.

Stay informed on the latest cyber threats

Keep yourself up to date on current scams by visiting this website daily.

Use Strong Passwords

Strong passwords are critical to online security.

Keep your software up to date and maintain preventative software programs

Keep all of your software applications up to date on your computers and mobile devices. Install software that provides antivirus, firewall, and email filter services.

Update the operating systems on your electronic devices

Make sure your operating systems (OSs) and applications are up to date on all of your electronic devices. Older and unpatched versions of OSs and software are the target of many hacks. Read the CISA security tip on Understanding Patches and Software Updates for more information.

What if You Got Scammed?

Stop Contact With The Scammer

Hang up the phone. Do not reply to emails, messages, or letters that the scammer sends. Do not make any more payments to the scammer. Beware of additional scammers who may contact you claiming they can help you get your lost money back.

Secure Your Finances

  • Report potentially compromised bank account, credit or debit card information to your financial institution(s) immediately. They may be able to cancel or reverse fraudulent transactions.
  • Notify the three major credit bureaus. They can add a fraud alert to warn potential credit grantors that you may be a victim of identity theft. You may also want to consider placing a free security freeze on your credit report. Doing so prevents lenders and others from accessing your credit report entirely, which will prevent them from extending credit:

Check Your Computer

If your computer was accessed or otherwise affected by a scam, check to make sure that your anti-virus is up-to-date and running and that your system is free of malware and keylogging software. You may also need to seek the help of a computer repair company. Consider utilizing the Better Business Bureau’s website to find a reputable company.

Change Your Account Passwords

Update your bank, credit card, social media, and email account passwords to try to limit further unauthorized access. Make sure to choose strong passwords when changing account passwords.

Report The Scam

Reporting helps protect others. While agencies can’t always track down perpetrators of crimes against scammers, they can utilize the information gathered to record patterns of abuse which may lead to action being taken against a company or industry.

Report your issue to the following agencies based on the nature of the scam:

  • Local Law Enforcement: Consumers are encouraged to report scams to their local police department or sheriff’s office, especially if you lost money or property or had your identity compromised.
  • Federal Trade Commission: Contact the Federal Trade Commission (FTC) at 1-877-FTC-HELP (1-877-382-4357) or use the Online Complaint Assistant to report various types of fraud, including counterfeit checks, lottery or sweepstakes scams, and more.
  • Identitytheft.gov: If someone is using your personal information, like your Social Security, credit card, or bank account number, to open new accounts, make purchases, or get a tax refund, report it at www.identitytheft.gov. This federal government site will also help you create your Identity Theft Report and a personal recovery plan based on your situation. Questions can be directed to 877-ID THEFT.

How To Recognize a Phishing Scam

Scammers use email or text messages to try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could get access to your email, bank, or other accounts. Or they could sell your information to other scammers. Scammers launch thousands of phishing attacks like these every day — and they’re often successful.

Scammers often update their tactics to keep up with the latest news or trends, but here are some common tactics used in phishing emails or text messages:

Phishing emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. You might get an unexpected email or text message that looks like it’s from a company you know or trust, like a bank or a credit card or utility company. Or maybe it’s from an online payment website or app. The message could be from a scammer, who might

  • say they’ve noticed some suspicious activity or log-in attempts — they haven’t
  • claim there’s a problem with your account or your payment information — there isn’t
  • say you need to confirm some personal or financial information — you don’t
  • include an invoice you don’t recognize — it’s fake
  • want you to click on a link to make a payment — but the link has malware
  • say you’re eligible to register for a government refund — it’s a scam
  • offer a coupon for free stuff — it’s not real

About Online Threat Alerts (OTA)

Online Threat Alerts or OTA is an anti-cybercrime community that started in 2012. OTA alerts the public to cyber crimes and other web threats.

By alerting the public, we have prevented a lot of online users from getting scammed or becoming victims of cybercrimes.

With the ever-increasing number of people going online, it important to have a community like OTA that continuously alerts or protects those same people from cyber-criminals, scammers and hackers, who are every day finding new ways of carrying out their malicious activities.

Online users can help by reporting suspicious or malicious messages or websites to OTA. And, if they want to determine if a message or website is a threat or scam, they can use OTA's search engine to search for the website or parts of the message for information.

Help maintain Online Threat Alerts (OTA).

Sextortion Email 2020 Scams: Beware