The hello pervert email scam is one of several that pose as frightening emails demanding ransom. In one example, cybercriminals try to fool email recipients into thinking they have access to compromising films and would spread them if their demands are not fulfilled.
All claims stated by the “Hello Perv” scam are untrue, thus there’s no need for concern. Ignoring the assertions and deleting this email is the wisest course of action.
How To Spot “Hello Pervert” Emails
It’s simple to identify these emails if you understand what’s happening. Keep in mind that while not all of the above traits must be present in these emails, they are still warning signs in and of themselves.
- The con artist claims to have video evidence of your alleged improper behavior.
- They frequently appear to have originated from one of your personal email addresses.
- The fraudster states in the email that they spied on you via your computer using Pegasus or another Trojan.
- The actual message is frequently delivered as a picture or a pdf file. Scammers do this to get around phishing filters.
- The con artist claims to be aware of “your password.”
- Urgent payment is required to prevent the alleged film from being shared with contacts. Often, you just have one day to pay.
What Will the Hacker Ask You?
Here comes the greatest part: the ransom!
Yes, the hacker will want a ransom of $500 or more to keep your data and video hidden. The hacker will carefully persuade you so that if you pay him the ransom promptly for your manufactured film, you can escape a sex scandal.
Of course, there is no such video. It’s a fraud, yet many innocent individuals will fall for it.
You will be given a cryptocurrency wallet, generally a Bitcoin address, and the scammer will request that you provide money within 24 or 48 hours, otherwise your video will be made public.
Obviously, utilizing a bitcoin wallet will assist to protect the scammer’s identity. This email is clearly a hello pervert email scam.
This email scam is designed to defraud people by exploiting their deepest anxieties.
Cybercriminals intend to abuse the individual’s sense of urgency and perplexity by playing on their fears of losing their reputation and loved ones as a result of a disgusting sexual film posted online.
How To Respond To The “Hello Pervert” Emails
First and foremost, never respond to emails like these. It may alert the sender that someone is reading the emails sent to that address, and they will continue to attempt new and different tactics to swindle you.
- If the email has a password, ensure it is no longer in use and change it immediately.
- Do not hurry into actions or conclusions. Scammers rely on the fact that you will not take the time to consider things through and hence make mistakes.
- Consider using a password manager to help organize your passwords.
- Do not open any unsolicited attachments. Especially if the sender address is questionable, or even yours.
- Ensure your webcam is turned off or covered when not in use.
How Are Computers Infected By Spam Campaigns?
When malicious attachments, which are often sent via emails, are opened, PCs get infected. It is impossible to infect a computer without first opening the attachment.
For example, when a Microsoft Office document attached to the email is opened, it will request that macro instructions be enabled. If you enable them, a malicious software can be downloaded and installed from an infected document.
In the event that the attachment is an archive file, it will include an executable (or other file) that, when opened, will also cause a computer infection to download and install. Therefore, regardless of the file type, you must first open the attachment.
Final Word
Malwarebytes cybersecurity experts highly advise not responding to hello pervert email scam since doing so may give criminals the impression that the address is active, which might result in further fraud attempts.
In order to prevent malware infestations, users are also advised to reset any compromised passwords right away and refrain from opening any dubious attachments.
The following is something I highly advise against:
- Please don’t respond to this email.
- Don’t call the cops. I sent it from your iCloud mail.
- I have access to all of your devices, and I will release the footage as soon as I learn that you rushed to the police.
- Avoid attempting to reset or damage your gadgets. As previously said, I’m keeping an eye on everything you do, so you either accept my terms or the videos are released.
Additionally, keep in mind that since cryptocurrencies are anonymous, the address you supplied cannot be used to identify me.
Following the receipt of these communications, victims have expressed feeling scared, and many have shared their stories on social media.
Experts stress that these frauds are hoaxes intended to take advantage of anxiety rather than real dangers, despite the fact that they are disturbing.