Never Fear Scam Emails That Say, Hi Prey, "This is My Last Warning, My Prey." - A Guide to Understand Sextortion Emails

Cybercriminals use a false phishing campaign called "Hi Prey, This is My Last Warning" to trick unsuspecting victims. This bogus email purports to have a video of you or a password that might be used to demand money. What you need to know to recognise and thwart this fraud is provided here.


Cyber Criminals

Synopsis of the Fraud/ Sextortion Emails:

The phishing email that begins, "My Prey, This is My Last Warning," addresses the receiver as "my prey" and makes the claim that it has private films and information about them. According to the notification, hackers gained access to your webcam and made offensive videos of you using malware that was installed on your device.

The email continues by threatening to send your personal info and the alleged embarrassing video footage to all of your contacts if you don't pay a $500 Bitcoin ransom within the next 24 hours. It offers a Bitcoin wallet address where payments can be made.


Naturally, the hackers never had actual access to your system or footage of you. The email is a hoax that was sent to a large number of recipients in an attempt to scare them into paying up. As an illustration, consider this:

Hi, my prey. This is my last warning.

I write you since I attached a trojan on the web site with porno which you have viewed. My trojan captured all your private data and switched on your camera which recorded the act of your solitary sex. Just after that the trojan saved your contact list.

I will erase the compromising video records and info if you transfer 710 United States Dollars in bitcoin.

This is address for payment: 1DvEgCFc6MHsbajRvkctjUPAPtn51b6DcN

I give you 24 hours after you open my message for making the payment. As soon as you read the message I’ll see it right away. It is not necessary to tell me that you have sent money to me. This address is connected to you, my system will erased automatically after transfer confirmation.

*If you need 40h just Open the calculator and type +,+. *

If you don’t pay, I’ll send dirt to all your contacts. Let me remind you – I see what you’re doing. If you try to deceive me, I’ll know it immediately. I don’t live in your country. Bye. Don’t forget about the shame and to ignore, your life can be ruined.


The "My Prey" phishing scam appears like this. This is how the scammers conduct their dishonest extortion scheme.


The hackers using this scam email extract money from victims by using cunning social engineering techniques. This is the sequential procedure:


1. Getting Email Addresses

 Scammers use a variety of dishonest methods to get massive lists of email addresses belonging to potential victims, such as:

  1. Purchasing purloined email lists via the dark web black market
  2. breaking accessing databases and websites to steal account information
  3. Using tools for email harvesting to collect addresses from the internet
  4. taking advantage of sites' security flaws to obtain user data
  5. obtaining email lists that have been compromised

They are able to start widespread scam campaigns with a compilation of thousands of email addresses.


2. Write a Menacing Email of Demand


The phishing email is expertly written by the thieves to maximise fear and create panic. The letter uses the recipient's name as "my prey" in an attempt to elicit sympathy.

According to the email, the con artists obtained access to your contacts list and webcam by infecting your smartphone with spyware from an explicit website. They threaten to send embarrassing video footage supposedly captured of you masturbating to all your contacts unless you pay within 24 hours.

3. Alter the Email Address of the Sender\

Technical ploys are employed by the con artists to conceal the true origin of the email. They pretend to be the sender of the email, making it look as though it originated from your account instead than the scammer's.

When your email address appears in the "From" section, it validates the message and supports the idea that someone hacked your system.

4. Give directions for paying with bitcoin.

Since Bitcoin provides greater privacy than traditional financial accounts and transactions, payment through it is required. A Bitcoin wallet address and payment amount are included in the email.

By using Bitcoin, victims can pay the ransom without difficulty and avoid using bank transactions, which have more security precautions and paper trails. The thieves are able to obtain payments in secret thanks to this.

5. Await Payment from Victims

Since Bitcoin provides greater privacy than traditional financial accounts and transactions, payment through it is required. A Bitcoin wallet address and payment amount are included in the email.

By using Bitcoin, victims can pay the ransom without difficulty and avoid using bank transactions, which have more security precautions and paper trails. The thieves are able to obtain payments in secret thanks to this.


How to Recognise This Email Scam / Email Phishing

Even if these emails of extortion may appear genuine, there are ways to spot the scam:

Sender Address: Scammers frequently use email spoofing to make their messages appear to be from you. To find out the actual originating address, however, you can examine the entire header.

Poor Spelling and Grammar: Phoney emails frequently have strange wording and grammatical problems. Reputable businesses will use formal lettering.

Threatening Words: If money isn't received, no legitimate company would use threats to distribute fictitious recordings purporting to be of you.

Feeling of Urgency: Fraudsters put brevities on payment terms, such as 24 or 48 hours. Reasonable time frames for action are provided by valid notices.

Demands for Bitcoin Ransom: Reputable businesses won't make you pay untraceable Bitcoin in order to get out of trouble. This is dubious.

No Proof Presented: There will be no proof in this email.

Absurd Claims: No reputable organisation would feign shock at claims like using malware to record you without permission.

Promises to "Erase" Information: After receiving a Bitcoin payment, a reputable business would not be able to suddenly remove malware infections or films.

Dangers of Being Found Out: If requests aren't met, no legitimate business would risk damaging its brand by disclosing confidential information.

When examining any dubious email, exercise caution and common sense. Before taking any further action, confirm the legitimacy of an email with the company.


What to Do If Email Scam Has Targeted You

If you come across an email posing as "My Prey, This is My Last Warning" and demanding Bitcoin, follow these crucial steps:

Avoid paying the ransom.

Do not, under any circumstances, pay the ransom, no matter how scary the email appears. The con artists don't actually own any videos of you or have access to your system. Paying them will just serve to finance new frauds.

Report this email as fraudulent.

Send the bogus email to the abuse department of your email provider so they can stop the phoney account. Their infrastructure is disrupted when phishing scams are reported.

Launch an antivirus programme

It’s unlikely any malware is on your device as claimed, but running an anti-virus scan removes any potential threats present. Make sure your security software is up-to-date.

Switch Passwords and Turn on 2 factor authentication

Make sure your passwords are strong and lengthy by changing them for your email account and any other important internet accounts. For an additional degree of protection, enable two-factor authentication.

Be Aware of Suspicious Activities

Keep a watchful eye on your financial statements for any odd charges or transactions. Keep a look out for strange activities, such as unexpected login attempts, that might point to a real compromise.

Disregard Further Demanding Emails

The hacker may send other threats requesting Bitcoin if the first scam email is not paid. Disregard them; conversing with hacking invites more abuse.




Next Post Previous Post Home