E-mail Fraud (Phishing) Alert: Your programs are under my control!/I was able to hack you, and stole the information!

Report Phishing Email to ITSC
Guide to Handle Phishing Email

Here is how the phishing email looks.


From: xxx
Sent: 9 Dec 2019 (Mon) 2:46AM
Subject: Your programs are under my control!/I was able to hack you, and stole the information!



I am a spyware software developer.
Your account has been hack͏ed by me in the summer of 2019.

You can check it – I sent this message from your account.

The hacking was carried out using a hardware vulnerability through which you went online.

I went around the security system in the router, installed an exploit there.
When you went online, my exploit downloaded my malicious code (rootkit) to your device.
This is driver software, I constantly updated it, so your antivirus is silent all time.

Since then I have been following you (I can connect to your device via the VNC protocol).
That is, I can see absolutely everything that you do, view and download your files and any data to yourself.
I also have access to the camera on your device, and I perio͏dically take photos and videos with you.

At the moment, I have harvested a solid dirt… on you…
I saved all your email and chats from your messangers. I also saved the entire history of the sites you visit.

I note that it is useless to change the passwords. My malware update passw͏ords from your accounts every times.

I know what you like hard funs (adult sites).
Oh, yes .. I’m know your secret life, which you are hiding from everyone.
Oh my God, what are your like… I saw THIS … Oh, you dirty naughty person … 🙂

I took photos and videos of your most passionate funs with adult content, and synchronized them in real time with the image of your camera.
Believe it turned out very high quality!

So, to the business!
I’m sure you don’t want to show these files and visiting history to all your contacts.

Transfer $804/$808 to my Bi͏tcoin cryptocurrency wallet: 1AirieZr8Ax9gUjZhyVeZqJzGaAkvUEBqq
Just copy and paste the wallet number when transf͏erring.
If you do not know how to do this – ask Google.

My system automatically recognizes the translation.
As soon as the specified amount is received, all your data will be destroyed from my ser͏ver, and the rootkit will be automatically removed from your system.
Do not worry, I really will del͏ete everything, since I am ‘working’ with many people who have fallen into your position.
You will only have to inform your provider about the vulnerabilities in the router so that other hackers will not use it.

Since opening this letter you have 48 hours.
If funds not will be received, after the specified time has elapsed, the disk of your device will be formatted, and from my server will automatically send email and sms to all your contacts with compromising material.

I advise you to remain prudent and not engage in nonsense (all files on my server).

Good luck!