Cybercriminals use a false phishing campaign called "Hi Prey, This is My Last Warning" to trick unsuspecting victims. This bogus email purports to have a video of you or a password that might be used to demand money. What you need to know to recognise and thwart this fraud is provided here.
Synopsis of the Fraud/ Sextortion Emails:
Hi, my prey. This is my last warning.
I write you since I attached a trojan on the web site with porno which you have viewed. My trojan captured all your private data and switched on your camera which recorded the act of your solitary sex. Just after that the trojan saved your contact list.
I will erase the compromising video records and info if you transfer 710 United States Dollars in bitcoin.
This is address for payment: 1DvEgCFc6MHsbajRvkctjUPAPtn51b6DcN
I give you 24 hours after you open my message for making the payment. As soon as you read the message I’ll see it right away. It is not necessary to tell me that you have sent money to me. This address is connected to you, my system will erased automatically after transfer confirmation.
*If you need 40h just Open the calculator and type +,+. *
If you don’t pay, I’ll send dirt to all your contacts. Let me remind you – I see what you’re doing. If you try to deceive me, I’ll know it immediately. I don’t live in your country. Bye. Don’t forget about the shame and to ignore, your life can be ruined.
The "My Prey" phishing scam appears like this. This is how the scammers conduct their dishonest extortion scheme.
The hackers using this scam email extract money from victims by using cunning social engineering techniques. This is the sequential procedure:
1. Getting Email Addresses
Scammers use a variety of dishonest methods to get massive lists of email addresses belonging to potential victims, such as:
- Purchasing purloined email lists via the dark web black market
- breaking accessing databases and websites to steal account information
- Using tools for email harvesting to collect addresses from the internet
- taking advantage of sites' security flaws to obtain user data
- obtaining email lists that have been compromised
They are able to start widespread scam campaigns with a compilation of thousands of email addresses.
2. Write a Menacing Email of Demand
3. Alter the Email Address of the Sender\
4. Give directions for paying with bitcoin.
5. Await Payment from Victims
How to Recognise This Email Scam / Email Phishing
When examining any dubious email, exercise caution and common sense. Before taking any further action, confirm the legitimacy of an email with the company.
What to Do If Email Scam Has Targeted You
If you come across an email posing as "My Prey, This is My Last Warning" and demanding Bitcoin, follow these crucial steps:
Avoid paying the ransom.
Do not, under any circumstances, pay the ransom, no matter how scary the email appears. The con artists don't actually own any videos of you or have access to your system. Paying them will just serve to finance new frauds.
Report this email as fraudulent.
Send the bogus email to the abuse department of your email provider so they can stop the phoney account. Their infrastructure is disrupted when phishing scams are reported.
Launch an antivirus programme
It’s unlikely any malware is on your device as claimed, but running an anti-virus scan removes any potential threats present. Make sure your security software is up-to-date.
Switch Passwords and Turn on 2 factor authentication
Make sure your passwords are strong and lengthy by changing them for your email account and any other important internet accounts. For an additional degree of protection, enable two-factor authentication.
Be Aware of Suspicious Activities
Keep a watchful eye on your financial statements for any odd charges or transactions. Keep a look out for strange activities, such as unexpected login attempts, that might point to a real compromise.
Disregard Further Demanding Emails
The hacker may send other threats requesting Bitcoin if the first scam email is not paid. Disregard them; conversing with hacking invites more abuse.