This article is from Trend Micro.
One example is the sextortion email scam, where an aspect of sexual content, emphasized by scammers as shameful, persuades you into doing their bidding — e.g., intimidating emails claiming that you have been observed doing something sensitive while watching pornographic videos.
There are also blackmail email scams, in which scammers claim that your corporate, personal or health information has been found leaked in a data breach. The sender threatens to send the pictures, videos or sensitive information to all of your contacts unless you pay them money. These scams are very common and continue to evolve.
The context of scam emails has the same pattern for some time, and usually the only thing that changes is the Bitcoin address where you can pay the amount demanded.
Sources: Security Boulevard
Hello there!
Unfortunately, there are some bad news for you. Around several months ago I have obtained access to your devices that you were using to browse internet. Subsequently, I have proceeded with tracking down internet activities of yours.
Below, is the sequence of past events: In the past, I have bought access from hackers to numerous email accounts (today, that is a very straightforward task that can be done online).
Clearly, I have effortlessly logged in to email account of yours (your@email.com).
A week after that, I have managed to install Trojan virus to Operating Systems of all your devices that are used for email access. Actually, that was quite simple (because you were clicking the links in inbox emails). All smart things are quite straightforward. (>_<)
The software of mine allows me to access to all controllers in your devices, such as video camera, microphone and keyboard. I have managed to download all your personal data, as well as web browsing history and photos to my servers. I can access all messengers of yours, as well as emails, social networks, contacts list and even chat history. My virus unceasingly refreshes its signatures (since it is driver-based), and hereby stays invisible for your antivirus.
So, by now you should already understand the reason why I remained unnoticed until this very moment…
While collecting your information, I have found out that you are also a huge fan of websites for adults. You truly enjoy checking out porn websites and watching dirty videos, while having a lot of kinky fun. I have recorded several kinky scenes of yours and montaged some videos, where you reach orgasms while passionately masturbating.
If you still doubt my serious intentions, it only takes couple mouse clicks to share your videos with your friends, relatives and even colleagues. It is also not a problem for me to allow those vids for access of public as well. I truly believe, you would not want this to occur, understanding how special are the videos you love watching, (you are clearly aware of that) all that stuff can result in a real disaster for you.
Let’s resolve it like this:
All you need is $1350 USD transfer to my account (bitcoin equivalent based on exchange rate during your transfer), and after the transaction is successful, I will proceed to delete all that kinky stuff without delay. ………..
Below is bitcoin wallet of mine: 1B5ic9iQpyafTEfWxHM4Xq6PkzbickrL8g
You are given not more than 48 hours after you have opened this email (2 days to be precise).
It is because of fear. People assume they will never be a victim but in reality, we are prone to phishing attacks. Well-fabricated explanations by a scammer will likely make the scam more credible. The fear will do the rest and with the addition of shame, people can make irrational decision.
It can be scary, but remember that these scam emails are designed to inject fear. If they really have what they are claiming they have, they will provide an accurate sample to you. It is either a screenshot of the video or a sample of personal/corporate information.
These scams are very common and continue to evolve. Tragically, sextortion email scams have led victims to suicide, including a case involving five separate men in the UK and one in the United States. These are just a few of these types of cases. If you’ve found this helpful, please do SHARE with family and friends and help protect them.