The recipient received an email containing threatening content from an unknown sender. The email outlined a series of actions taken by the sender, including gaining unauthorized access to the victim's devices, monitoring their internet activities, and installing a Trojan virus on their devices.
Key Points:
Unauthorized Access: The sender claimed to have successfully gained unauthorized access to all of the victim's devices used for internet browsing.
Email Compromise: The sender admitted to logging into the victim's email account after obtaining a list of email accounts from hackers.
Trojan Virus: The perpetrator installed a Trojan virus on the victim's devices, mentioning that this was facilitated by the victim clicking on links in their inbox emails.
Extensive Control: The Trojan virus allegedly granted the sender control over the victim's devices, including video cameras, keyboards, microphones, and more. This control allowed them to access data, photos, web browsing history, social media accounts, chat history, and contacts lists.
Explicit Content: The sender claimed to have recorded explicit material involving the victim, specifically mentioning "nasty solo action," and threatened to share these videos with the victim's friends, colleagues, and relatives, as well as upload them online.
Extortion: The sender demanded a payment in bitcoins, with a specified deadline. They promised to delete the explicit material and disable the Trojan software upon receipt of the payment.
Anonymity and Threats: The sender warned against responding to the email, contacting the police, or sharing the information with others, as they claimed to have full control over the victim's systems and the ability to track all activities.