“I actually installed a Malware on porn website” email falls into the sextortion scam email category. It’s a generic sextortion scam email that falsely claims the recipient’s computer has been hacked and an explicit video of them watching pornography has been created. Scammers threaten to send the video to all of the recipient’s contacts unless they agree to pay $950 in Bitcoin. The email is a scam so there is no need to pay anything.

 

This email is part of one of many sextortion scam campaigns that are currently going around. Different malicious actors usually operate these campaigns, and while the contents of the emails may be written differently, they all follow the same pattern. Sextortion scammers first claim to have hacked the recipient’s computer via malware that was downloaded when the recipient visited an adult website. Scammers then explain that the malware gave them complete access to the user’s computer, including the ability to turn on/off the camera and microphone. They then try to alarm the recipient further by claiming they have made an explicit video of them watching pornography. Lastly, they threaten to release the video publicly and send it to all of the user’s contacts unless they agree to pay.

This “I actually installed a Malware on porn website” email scam follows much the same pattern. The sender uses complicated-sounding but nonsensical language to explain that the recipient’s computer has been hacked, a video has been made, and it will be released unless a payment of $950 is made.

Sextortion emails use threatening and mocking language to scare users. They mock users’ supposed pornography-watching habits and often emphasize how disappointed family members will be when they receive explicit videos associated with them. It’s not uncommon for these mocking claims to cause such alarm that even users who have never visited pornography websites would consider paying.

No matter how convincing these sextortion emails may seem, they are always scams. Users’ computers are not infected with malware, nor is there an explicit video of them watching pornography. There is no reason to pay anything.

Below is the full “I actually installed a Malware on porn website” email scam:

I know, – is too personal to contact you.

I won’t beat around the bush. You do not know anything about me but I know you and you must be thinking why you’re receiving this mail, correct?

I actually installed a Malware on porn website & do you know what, you accessed same porn web site to have fun (you know what I mean). And while you were busy enjoying those videos, your internet browser started out operating as RDP (Remote Protocol) with a keylogger which provided me access to your display and your camera access. After that, the malware gathered all of your data and every one of your contacts from device including every one of your photos.

What have I done?

It is just your misfortune that I discovered your blunder. Later I invested in more time than I probably should have investigating into your life and created a split-screen video. First part shows the video you were watching and 2nd half displays the video of your web cam (it is someone doing naughty things). As a family man, I am ready to delete everything about you and allow you to continue with your regular life. And I am going to provide you two options that may accomplish your freedom. These two options are either to turn a blind eye to this message (not recommended), or pay me a small amount.

What exactly should you do?
Let’s explore above two options in more detail. First Choice is to turn a deaf ear my mail. Let us see what will happen if you choose this option. I will send your sextape to all of your contacts including family members, colleagues, etc. It will not help you avoid the humiliation your self will have to feel when relatives and buddies uncover your dirty videotape. Second Option is to pay me, and be confidential about it. We’ll call this “keep the secret tip”. Lets discuss what will happen when you go with this option. Your naughty secret Will remain private. I’ll keep my mouth closed. Once you make the payment, I will let you move on with your life and family that nothing ever occurred. You’ll make the transfer through Bitcoins.

Amount to be sent: $950
BTC ADDERSS IS 1HT4jMEmjVNga3411xVgFhB2xmdrG1j2En

Notice: You now have 12 hours to transfer the amount. (I have a unique pixel within this email and right now I know that you have read through this e mail). The method to acquire bitcoin usually takes some effort so do not delay. If I don’t get the Bitcoin, I will, no doubt, send your video recording to all of your contacts including close relatives, co-workers, and many others. nevertheless, if I do get paid, I’ll destroy the videotape immediately. If you want to have proof, reply

Sextortion scam emails target users whose email addresses have leaked

Users who receive sextortion scam emails may wonder why they were targeted. The answer to that is quite simple, they were targeted because their email addresses were leaked and later bought on hacker forums. Data like email addresses is stolen all the time from platforms and services that do not have adequate security. Stolen data ends up on hacker forums, where it’s sold to other cybercriminals. Users can check whether their email addresses have been leaked on haveibeenpwend.

It’s also worth mentioning that some sextortion emails also reveal users’ passwords and other personal information like phone numbers. Adding this information makes the emails seem more credible because how else would the sender know the information if not because they hacked users’ computers? In reality, passwords, phone numbers, and other personal information are obtained the same way as email addresses. This data is leaked and then sold on hacker forums.

Site Disclaimer

2-remove-virus.com is not sponsored, owned, affiliated, or linked to malware developers or distributors that are referenced in this article. The article does not promote or endorse any type of malware. We aim at providing useful information that will help computer users to detect and eliminate the unwanted malicious programs from their computers. This can be done manually by following the instructions presented in the article or automatically by implementing the suggested anti-malware tools.

The article is only meant to be used for educational purposes. If you follow the instructions given in the article, you agree to be contracted by the disclaimer. We do not guarantee that the artcile will present you with a solution that removes the malign threats completely. Malware changes constantly, which is why, in some cases, it may be difficult to clean the computer fully by using only the manual removal instructions.

Leave a Reply