How to fix Bitcoin email scam

Article' purpose is to help you to fix Bitcoin email scam and understand what to do if you received fake message.

There are the plenty complaints in 2019 on strange messages from email address completely the same as the victims one. One of the example of suchlike scam is on the picture below:

Bomb threat scam

The text is very similar: hackers say that your computer was infected by Trojan virus and to release system you need to pay sum to their bitcoin wallet. As additional argument, frauds say that they using our web camera while you watching porno. They menace to send this video to victim's family and friends. Do not lose your composure; it is fake message with the same text to everyone. Even for people without web camera for example.

Security Notice. Someone have access to you system.

I'll begin with the most important.

I hacked your device and then got access to all your accounts.

It is easy to check - I wrote you this email from your account.

Also I have an old password for the hacking day: ...

Moreover, I know your intim secret, and I have proof of this.

You do not know me personally, and no one paid me to check you.

It is just a coincidence that I discovered your mistake.

In fact, I posted a malicious code (exploit) to an adult site, and you visited this site...

While watching a video Trojan virus has been installed on your device through an exploit.

This darknet software working as RDP (remote-controlled desktop), which has a keylogger,

which gave me access to your microphone and webcam.

Soon after, my software received all your contacts from your messenger, social network and email.

At that moment I spent much more time than I should have.

I studied your love life and created a good video series.

The first part shows the video that you watched,

and the second part shows the video clip taken from your webcam (you are doing inappropriate things).

Honestly, I want to forget all the information about you and allow you to continue your daily life.

And I will give you two suitable options. Both are easy to do.

First option: you ignore this email.

The second option: you pay me $700(USD).

Let's look at 2 options in detail.

The first option is to ignore this email.

Let me tell you what happens if you choose this path.

I will send your video to your contacts, including family members, colleagues, etc.

This does not protect you from the humiliation that you and

your family need to know when friends and family members know about your unpleasant details.

The second option is to pay me. We will call this "privacy advice."

Now let me tell you what happens if you choose this path.

Your secret is your secret. I immediately destroy the video.

You continue your life as if none of this has happened.

Now you might think: "I'll call to police!"

Undoubtedly, I have taken steps to ensure that this letter cannot be traced to me,

and it will not remain aloof from the evidence of the destruction of your daily life.

I don't want to steal all your savings.

I just want to get compensation for my efforts that I put in to investigate you.

Let us hope that you decide to create all this in full and pay me a fee for confidentiality.

You make a Bitcoin payment (if you don't know how to do it, just enter "how to buy bitcoins" in Google search)

Shipping amount: $700(USD).

Getting Bitcoin Addresses: 1FVuyuSN41aa3JN9sn8qkuD2PmaMEMHHnc (This is sensitive, so copy and paste it carefully)

Don't tell anyone what to use bitcoins for. The procedure for obtaining bitcoins can take several days, so do not wait.

I have a spetial code in Trojan, and now I know that you have read this letter.

You have 48 hours to pay.

If I don't get BitCoins, I'll send your video to your contacts, including close relatives, co-workers, and so on.

Start looking for the best excuse for friends and family before they all know.

But if I get paid, I immediately delete the video.

This is a one-time offer that is non-negotiable, so do not waste my and your time.

Time is running out.


"The head of the mail looks like "Security Notice. Someone have access to you system" or "Hackers broke your computer". In addition, all of them give its own bitcoin address for the payment. The most activity was in USA and Australia. One of the most realistic suggestion is that frauders have database with e-mails and passwords. The most probable version is that some website, where you had registered before, were hacked.

Hackers can ask different sums from the victim from 200 to 3000 usd according to their greedy.

Virus removal instruction

If you are MAC user, follow this guide How to remove virus from MAC

If you think that your system infected by virus, just do some common action and scan the system by antivirus. After you make it, change all important passwords.

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab


Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner

Remember that you do not need to buy Spyhunter right now - you can examine its effectiveness by getting a free trial version. If you're interested in buying Spyhunter or need more information - press the link below.

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

What is Trojan

Experts declare that Trojan viruses make up most share of all harmful software, due to usability and effectiveness. The regular examples of such tasks are theft of passwords and other data, botnets development, espionage or downloading and maintaining already installed viruses.Despite the numerous advantages, Trojan viruses have one important disadvantage - they cannot infect victim's device independently. Many customers believe that virus is anything that is not good for their machines, but you cannot call Trojans viruses, since virus is the self-replicating program, that can avalanche spreading through local networks and the Internet. Trojans efficiently penetrate systems with help of other programs or with user's help, but cannot make it on their own. There is only thing that Trojan virus is capable of doing before entering the PC is waiting until the inexperienced user chooses to download it and installs it. All things that are written above bring us to one solution: Trojan viruses need to be found and avoided until they infest the computer.

Many customers think that to prevent malware infection they just have to install an antivirus, but it is wrong. Antiviral programs are very useful, but they cannot restrict the whole Internet, and forbid you to download anything you want, including malware. Nevertheless, if you will assist your antivirus to work, and will not prevent him from doing its job, the system will be safe. There are two recipes to achieve this effect:

  • If you aren't going to totally forget about using unlicensed utilities, you have to thoroughly examine each installed tool. Trojans usually hide beneath the guise of helpful programs such as browser games, search engines, special software, browsers, system optimizers and driver updaters. Do not install weird utilities from this list, and while installing another pirated utility - watch closely at the installation, declining all offers for getting more programs.
  • The easiest option is to completely stop using utilities of dubious provenance. These rules concern any tool downloaded not from the reliable developer websites or well-known vendors. Of course, all cracked replicas of useful utilities also are probably dangerous. If you stop installing suchlike software, the chances of penetration would be decreased to minimal, and antivirus will be able to rapidly deal with this minimum.

Abide to these rules and you will immediately notice the fruits: the PC will become workable, safe and fast, and will remain so for years.



This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.