Sextortion “I recorded you” emails reuse passwords found in disposable inboxes
嗯,用户让我帮忙总结这篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我得先仔细读一下文章内容。 文章讲的是一个新的网络钓鱼邮件浪潮,主题是“你这个变态,我录到你了!”这其实是“你好,变态”骗局的变种。邮件声称用户的设备被恶意软件感染,甚至掌握了用户的密码和隐私录像。骗子还威胁要公开这些信息,除非支付800美元的比特币赎金。 然后,作者提到这些骗子可能从FakeMailGenerator这样的临时邮箱服务中获取密码,因为这些邮箱通常是公开的,容易被搜索到。所以用户如果使用这类服务的话,可能会有风险。 最后,作者给出了一些防范建议:不要慌张、不要回复邮件、更改密码、使用密码管理器、不打开可疑附件、不使用临时邮箱处理重要事务等。 现在我要把这些信息浓缩到100字以内。重点包括:新的钓鱼邮件主题、声称设备被感染、获取密码和隐私录像、威胁支付赎金、骗子可能从临时邮箱获取信息、防范建议等。 可能的结构是:描述骗局内容和手段,提到骗子如何获取信息,最后给出防范建议。确保语言简洁明了。 </think> 文章描述了一种新的网络钓鱼邮件骗局,主题为“你这个变态,我录到你了!”,声称受害者设备已被恶意软件感染,并掌握了其隐私数据和摄像头录像。骗子威胁将公开这些信息,并要求支付800美元比特币赎金。该骗局利用恐慌和尴尬情绪迫使受害者快速付款。 2026-3-11 14:56:45 Author: www.malwarebytes.com(查看原文) 阅读量:8 收藏

Our malware removal support team recently flagged a new wave of sextortion emails, with the subject line: “You pervert, I recorded you!”

If the message sounds familiar, that’s because it’s a variation of the long-running “Hello pervert” scam.

The email claims the target’s device has been infected by a “drive-by exploit,” which supposedly gave the extortionist full access to the device. To add credibility, the scammer includes a password that actually belongs to the target.

Here’s one of the emails:

screenshot of sextortion email

Your device was compromised by my private malware. An outdated browser makes you vulnerable; simply visiting a malicious website containing my iframe can result in automatic infection.
For further information search for ‘Drive-by exploit’ on Google.
My malware has granted me full access to your accounts, complete control over your device, and the ability to monitor you via your camera.
If you believe this is a joke, no, I know your password: {an actual password}
I have collected all your private data and RECORDED FOOTAGE OF YOU MASTRUBATING THROUGH YOUR CAMERA!
To erase all traces, I have removed my malware.
If you doubt my seriousness, it takes only a few clicks to share your private video with friends, family, contacts, social networks, the darknet, or to publish your files.
You are the only one who can stop me, and I am here to help.
The only way to prevent further damage is to pay exactly $800 in Bitcoin (BTC).
This is a reasonable offer compared to the potential consequences of disclosure.
You can purchase Bitcoin (BTC) from reputable exchanges here:
{list of crypto-currency exchanges}
Once purchased, you can send the Bitcoin directly to my wallet address or use a wallet application such as Atomic Wallet or Exodus Wallet to manage your transactions.
My Bitcoin (BTC) wallet address is: {bitcoin wallet which has received 1 payment at the time of writing}
Copy and paste this address carefully, as it is case-sensitive.
You have 4 days to complete the payment.
Since I have access to this email account, I will be aware if this message has been read.
Upon receipt of the payment, I will remove all traces of my malware, and you can resume your normal life peacefully.
I keep my promises!

The message is a bit contradictory. Early on, the sender claims they have already removed the malware to “erase all traces,” but later promises to remove it after receiving payment.

Where the password comes from

I found that one particular sender using the name Jenny Green and the Gmail address [email protected] sent many of these emails to people that use the FakeMailGenerator service.

FakeMailGenerator is a free disposable email service that gives users a temporary, receive‑only inbox they can use instead of their real address, mainly to get around email confirmations or avoid spam.

As mentioned, the addresses are receive‑only, meaning they cannot legitimately send mail and the mailbox is not tied to a specific person. On top of that, there is no login. Anyone who knows the address (or guesses the inbox URL) can see the same inbox.

My guess is that the scammer searched these public inboxes for passwords and then reused those passwords in their sextortion emails.

So users of FakeMailGenerator and similar services should consider this a warning. Your inbox may be publicly accessible, show up in search results, and you may receive a lot more than what you signed up for. Definitely don’t use services like this for anything sensitive.

How to stay safe

Knowing these scams exist is the first step to avoiding them. Sextortion emails rely on panic and embarrassment to push people into paying quickly. Here are a few simple steps to protect yourself:

  • Don’t rush. Scammers rely on fear and urgency. Take a moment to think before reacting.
  • Don’t reply to the email. Responding tells the attacker that someone is reading messages at that address, which may lead to more scams.
  • Change your password if it appears in the email. If you still use that password anywhere, update it.
  • Use a password manager. If you’re having trouble generating or storing a strong password, have a look at a password manager.
  • Don’t open unsolicited attachments. Especially when the sender address is suspicious or even your own.
  • Don’t use disposable inboxes for important accounts. The mail in that inbox might be available for anyone to find.
  • For peace of mind, turn your webcam off or buy a webcam cover so you can cover it when you’re not using the webcam.

Pro tip: Malwarebytes Scam Guard immediately recognized this for what it is: a sextortion scam.


What do cybercriminals know about you?

Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/03/sextortion-i-recorded-you-emails-reuse-passwords-found-in-disposable-inboxes
如有侵权请联系:admin#unsafe.sh