Wednesday, 10 April 2019

Be sure to read this message! Your personal data is threatened!

Hello!

I hacked your device, because I sent you this message from your account.
If you have already changed your password, my malware will be intercepts it every time.

You may not know me, and you are most likely wondering why you are receiving this email, right?
In fact, I posted a malicious program on adults (pornography) of some websites, and you know that you visited these websites to enjoy
(you know what I mean).

While you were watching video clips,
my trojan started working as a RDP (remote desktop) with a keylogger that gave me access to your screen as well as a webcam.

Immediately after this, my program gathered all your contacts from messenger, social networks, and also by e-mail.

What I've done?
I made a double screen video.
The first part shows the video you watched (you have good taste, yes ... but strange for me and other normal people),
and the second part shows the recording of your webcam.

What should you do?

Well, I think $769 (USD dollars) is a fair price for our little secret.
You will make a bitcoin payment (if you don't know, look for "how to buy bitcoins" on Google).

BTC Address: 14DvFghvkzQujf5Kd5AL2VKjxaYm5KidxR
(This is CASE sensitive, please copy and paste it)

Remarks:
You have 2 days (48 hours) to pay. (I have a special code, and at the moment I know that you have read this email).

If I don't get bitcoins, I will send your video to all your contacts, including family members, colleagues, etc.
However, if I am paid, I will immediately destroy the video, and my trojan will be destruct someself.

If you want to get proof, answer "Yes!" and resend this letter to youself.
And I will definitely send your video to your any 16 contacts.

This is a non-negotiable offer, so please do not waste my personal and other people's time by replying to this email.

Bye!

Monday, 8 April 2019

Your account was under attack! Change your access data!

Hello!

As you may have noticed, I sent you an email from your account.
This means that I have full access to your device.

I've been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.

If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.

I also have access to all your contacts and all your correspondence.

Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.

I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.

If you want to prevent this,
transfer the amount of $709 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin").

My bitcoin address (BTC Wallet) is: 14tfS3yWL2cABhXVJZ97XRhuDXC69aWH6Y

After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.

Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.

If I find that you have shared this message with someone else, the video will be immediately distributed.

Best regards!

Wednesday, 3 April 2019

Comprehensive B2B contact database

Hi,

 

I am writing to you with regards to B2b contact list, we provide decision makers contacts from companies using the below applications.

 

Installed Bases: Cloud Users, Servers Users (Rack Servers, Blade Servers & Tower Servers), Business Applications (ERP, CRM, HCM, SCM, BI etc.) Users, Networking Applications Users, Operating System Users, Security Applications Users and more.

 

Technology Installed Bases: AWS Users, Microsoft Azure Users, Microsoft Office/Dynamics 365 Users, SAP Users, Salesforce Users, IBM Users, Oracle Users, Citrix Users, Cisco Users, HPE Users, Dell EMC Users, Veeam Users, Workday Users, Infor Users,  Sage Users, Inuit Users, Symantec Users, Akamai Users, Avaya Users, Mitel Users and Many more.

 

Key Decision Makers: CIO, CTO, CISO, EVP/SVP/VP/Director/Manager of IT, IS, IT Security, Application development executives/managers and many others.

 

We can also get you contact information of MSP's, MSSP's, ISV's, VAR's, Resellers, Technology Partners, OEMs, System Integrators, Cloud Service Providers and  Cloud Resellers for your Channel/Partner Program.

 

Customize your list by below assets:

 

Company size, Geographic location, Industry, Job titles/Functions, Technology Tracking, Assets size.

 

All contacts are opted into receive third party information. I look forward to hear from you.

 

Regards,

Shirley Peterson| Marketing specialist

 

To Opt Out please response "Unsubscribe" in subject line.