Torna la richiesta di estorsione questa volta in inglese dal titolo “You have outstanding debt”, oggetto della email che vi arriva da un fantomatico hacker. Se non pagate la cifra richiesta in BITCOIN il finto virus che dicono di aver inserito nel vostro computer permetterà a questi finti hacker di pubblicare un vostro video inesistente che dicono di avere mentre vi masturbate.
Fate attenzione a non cadere nella truffa. La mail è da cestinare.
Intermezzo promozionale ... continua la lettura dopo il box:
Usufruisci di uno sconto per fare un CONTROLLO DELLA REPUTAZIONE PERSONALE o AZIENDALE [ click qui ]
Questo il contenuto del finto messaggio :
Hi there!
I regret to inform you about some sad news for you.
Approximately a month or two ago I have succeeded to gain a total access to all your devices utilized for browsing internet.
Moving forward, I have started observing your internet activities on continuous basis.
Go ahead and take a look at the sequence of events provided below for your reference:
Initially I bought an exclusive access from hackers to a long list of email accounts (in today’s world, that is really a common thing, which can arranged via internet).
Intermezzo promozionale ... continua la lettura dopo il box:
Evidently, it wasn’t hard for me to proceed with logging in your email account (qui mettono la vostra email).
Within the same week, I moved on with installing a Trojan virus in Operating Systems for all devices that you use to login to email.
Frankly speaking, it wasn’t a challenging task for me at all (since you were kind enough to click some of the links in your inbox emails before).
Yeah, geniuses are among us.
Because of this Trojan I am able to gain access to entire set of controllers in devices (e.g., your video camera, keyboard, microphone and others).
As result, I effortlessly downloaded all data, as well as photos, web browsing history and other types of data to my servers.
Moreover, I have access to all social networks accounts that you regularly use, including emails, including chat history, messengers, contacts list etc.
My unique virus is incessantly refreshing its signatures (due to control by a driver), and hence remains undetected by any type of antiviruses.
Hence, I guess by now you can already see the reason why I always remained undetected until this very letter…
During the process of compilation of all the materials associated with you, I also noticed that you are a huge supporter and regular user of websites hosting nasty adult content.
Turns out to be, you really love visiting porn websites, as well as watching exciting videos and enduring unforgettable pleasures.
As a matter of fact, I was not able to withstand the temptation, but to record certain nasty solo action with you in main role, and later produced a few videos exposing your masturbation and cumming scenes.
If until now you don’t believe me, all I need is one-two mouse clicks to make all those videos with everyone you know, including your friends, colleagues, relatives and others.
Moreover, I am able to upload all that video content online for everyone to see.
I sincerely think, you certainly would not wish such incidents to take place, in view of the lustful things demonstrated in your commonly watched videos, (you absolutely know what I mean by that) it will cause a huge adversity for you.
There is still a solution to this matter, and here is what you need to do:
You make a transaction of $1490 USD to my account (an equivalent in bitcoins, which recorded depending on the exchange rate at the date of funds transfer), hence upon receiving the transfer, I will immediately get rid of all those lustful videos without delay.
After that we can make it look like there was nothing happening beforehand.
Additionally, I can confirm that all the Trojan software is going to be disabled and erased from all devices that you use. You have nothing to worry about, because I keep my word at all times.
That is indeed a beneficial bargain that comes with a relatively reduced price, taking into consideration that your profile and traffic were under close monitoring during a long time frame.
If you are still unclear regarding how to buy and perform transactions with bitcoins – everything is available online.
Below is my bitcoin wallet for your further reference: xxxxxxx
All you have is 48 hours and the countdown begins once this email is opened (in other words 2 days).
The following list includes things you should remember and avoid doing:
> There’s no point to try replying my email (since this email and return address were created inside your inbox).
> There’s no point in calling police or any other types of security services either. Furthermore, don’t you dare sharing this info with any of your friends.
If I discover that (taking into consideration my skills, it will be really simple, because I control all your systems and continuously monitor them) – your nasty clip will be shared with public straight away.
> There’s no point in looking for me too – it won’t result in any success. Transactions with cryptocurrency are completely anonymous and untraceable.
> There’s no point in reinstalling your OS on devices or trying to throw
> them away. That won’t solve the issue,
since all clips with you as main character are already uploaded on remote servers.
Things that may be concerning you:
> That funds transfer won’t be delivered to me.
Breathe out, I can track down everything right away, so once funds transfer is finished, I will know for sure, since I interminably track down all activities done by you (my Trojan virus controls all processes remotely, just as TeamViewer).
> That your videos will be distributed, even though you have completed money transfer to my wallet.
Trust me, it is worthless for me to still bother you after money transfer is successful. Moreover, if that was ever part of my plan, I would do make it happen way earlier!
We are going to approach and deal with it in a clear manner!
In conclusion, I’d like to recommend one more thing… after this you need to make certain you don’t get involved in similar kind of unpleasant events anymore!
My recommendation – ensure all your passwords are replaced with new ones on a regular basis.
Ecco cosa possiamo fare per tutelarci comunque :
1) Mantenete la calma: il fatto che la email provenga dalla stessa vostra casella di posta non significa che sia stata compromessa ma è stata utilizzata una tecnica informatica chiamata “spoofing” che permette di simulare il mittente con un indirizzo a piacere. Il criminale non dispone inoltre di alcun filmato che vi ritrae in atteggiamenti intimi, ne è la prova che molte delle persone che ricevono questo messaggio non hanno neppure una webcam.
2) Non pagate ovviamente alcun riscatto : pagarlo significherebbe ricevere altre minacce e altre richieste di denaro;
3) Cambiate la password della vostra email se ne avete una troppo semplice, sceglietene una particolarmente complessa e fate in modo che sia differente rispetto a quella che utilizzate per accedere ad altri vostri profili;
4) Abilitate meccanismi di autenticazione “forte” o autenticazione a due fattori : fate in modo che all’inserimento della password venga associata l’immissione di un codice di sicurezza ricevuto sul vostro telefono cellulare;
5) In generale, non lasciate mai i vostri dispositivi incustoditi e non cliccate su link o allegati di posta elettronica sospetti.
6) Leggere l’articolo La tua webcam ti spia ? Scopri se la webcam o fotocamera ti spia veramente
7) Visitate questa pagina ALTO LIVELLO DI SICUREZZA : tutti i test gratuiti che è possibile fare online per controllare la propria sicurezza informatica
8) Per la vostra istruzione consigliamo il MANUALE di AUTODIFESA INFORMATICA : la “krav maga” della difesa digitale
Se invece avete fatto una video chat con una ragazza sconosciuta e siete vittime di un ricatto sessuale allora visitate il nostro centro di assistenza anti estorsione sessuale [ click qui ]
PER RIMANERE INFORMATO SUI PERICOLI DELLA RETE SCARICA LA NOSTRA APP “Allerta Pericoli Informatici” | |||||
|
TUTTI GLI ARGOMENTI PRINCIPALI DEL NOSTRO BLOG SULLA SICUREZZA INFORMATICA
Potete leggere i più importanti post del nostro blog, divisi per categorie, nel manuale di autodifesa informatica per proteggersi dai pericoli della rete, utilizzare in sicurezza i dispositivi e tutelare la propria privacy e reputazione online [ ACCEDI ]