قالب وردپرس درنا توس
Home / Mac / "I greet you, I have bad news for you" Email Scam Reviewed – Blog

"I greet you, I have bad news for you" Email Scam Reviewed – Blog



We have great news for you. First of all, you are not alone. Thousands of people have received the same email. Secondly, neither your operating system nor your email have been hacked (although it seems quite the opposite).

We first heard of this fraud from our users, who started contacting our support and asking for help. A few hours later that day, we synchronized with experts from Anti-Malware Lab and reviewed the case.

Important is that if you have this email, you are safe and there is no acute threat to the system or likely even your email. Probably you need to do some security cleaning, but you are not in real risk. We will dive into the details later, but here are what these scam artists were up to.

Long story short, fraudsters try to trick people into believing that their operating system has been hacked, their browser history and contact list have been stolen and, most importantly, they have been recorded in adult content.

These cybercriminals threaten people to share embarrassing records with the victim's entire contact list unless their requirements are met. The requirements are quite standard: a $ 81

3 payment in Bitcoins should be made within 50 hours.

 I greet you I have bad news for you

Below is our explanation of what happened and a detailed guide What should I do if your email has been "hijacked" and you Received an email saying that I hacked your operating system and got full access.

Sextortion Scam "I greet you, I have bad news for you" Is manipulation [19659009] Email fraud is nothing new. Nor is it sexually fraudulent.

The scheme used for this new email has been around for years. Despite being hilarious, it is quite trustworthy (and we all know that credibility is a key component of a successful fraud).

First, hackers have made this email so that it was sent from their own user account. When victims see an email sent from their own email address, they quickly jump to their email has been hacked for real. However, there is nothing but email spoofing – a hacker trick that makes emails appear to have been sent from a legitimate source (in our case, from a victim's own email). It gives the notion of being legitimate, even if it is absolutely not.

Secondly, hackers say they have a record of you. But they certainly do not. It is quite typical for cybercriminals to claim that they have pictures or records of a victim who does something inappropriate. In most cases, they provide no evidence other than words. Spammers send the same email to thousands of people, hoping that at least someone will fall for fraud and pay them money. This non-real-conscious threat is designed for those who act faster than they think. If hackers had a recording of you, they would not miss a chance to use them as evidence.

Third, they claim that they have gained control of the operating system and the email by installing a trojan through a vulnerability found in your router. In reality, your operating system or account has not been violated. At least not recently. Probably hackers have used email addresses and passwords that have been leaked into one of the major leaks such as a clearly remembered Linkedin Breach or similar (you can find out if your email has been compromised in an outbreak through Har I have been Pwned service).

What should you do if you got "I Hacked Your Ecosystem and Got Full Access" Email?

First, do not pay.

Spammers send such emails to thousands of people and hope that at least someone will fall for this fraud and pay them money. Do not be one of those who do. It's quite normal to be worried when reading such an email, but do not let your panic cloud think. There is panic that helped hackers to make more than $ 4 million in their email scam activities.

Secondly, change password for email and all important accounts.

Having a unique password for each account is one of the basic rules for electronic safety hygiene. To better protect your email and other accounts from unauthorized entries, enable two-factor authentication whenever possible.

Third, check your computer for viruses, malicious software, and spyware.

To ensure there is no virus, malware or spyware on your device, perform a comprehensive scan and clear up any suspicious files found. In fact, scanning your Mac is something you should do regularly, not just when you feel under threat of fraud. Not only will this minimize your chances of being attacked by fraudsters, but it will also help your computer to perform its full capacity in the long run.

The final word of the last section's e-mail fraud

Email scams have become increasingly common these days, especially sixteen.

In light of this, there is one thing to keep in mind. No matter how unpleasant and credible they can see, such emails are quite innocent unless you fall for them. As long as you ignore them, they can not do any harm.

So if you received an email like this, all you have to do is follow 3 steps described above: Do not pay, change password, scan your computer.


Source link