The decision to suspend your account. Waiting for payment trojan virus from the computer

Scammers don't want to stop and make a new letters to cheat us and get some money. This wave of attack consist words "The decision to suspend your account. Waiting for payment trojan virus from the computer". It connects with the stolen e-mail database as Security Notice. Someone have access to you system. Even the text is a very similar:

Hi, stranger!

I know the ... this is your password, and I sent you this message from your account.

If you have already changed your password, my malware will be intercepts it every time.

You may not know me, and you are most likely wondering why you are receiving this email, right?

In fact, I posted a malicious program on adults (pornography) of some websites, and you know that you visited these websites to enjoy

(you know what I mean).

While you were watching video clips,

my trojan started working as a RDP (remote desktop) with a keylogger that gave me access to your screen as well as a webcam.

Immediately after this, my program gathered all your contacts from messenger, social networks, and also by e-mail.

What I’ve done?

I made a double screen video.

The first part shows the video you watched (you have good taste, yes … but strange for me and other normal people),

and the second part shows the recording of your webcam.

What should you do?

Well, I think $614 (USD dollars) is a fair price for our little secret.

You will make a bitcoin payment (if you don’t know, look for “how to buy bitcoins” on Google).

BTC Address: 19rvCcYfSwPUSvJJKNyTyRFi5vxt6zaqJC

(This is CASE sensitive, please copy and paste it)


You have 2 days (48 hours) to pay. (I have a special code, and at the moment I know that you have read this email).

If I don’t get bitcoins, I will send your video to all your contacts, including family members, colleagues, etc.

However, if I am paid, I will immediately destroy the video, and my trojan will be destruct someself.

If you want to get proof, answer “Yes!” and resend this letter to youself.

And I will definitely send your video to your any 18 contacts.

This is a non-negotiable offer, so please do not waste my personal and other people’s time by replying to this email.

Look at the video with good description of the e-mail spam and give some information about database leak.

So, it's no reason to be nervous about this virus.Just scan the system to detect malicious files, because it's not be superfluous in any case. Also, you can check temp and application data folders to see suspicious elements and fix hosts file, if you need it. Take a look on our brief guide about trojan removal.

Removal instruction

If you are MAC user, follow this guide How to remove virus from MAC

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab


Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner

Scan system with good antimalware scanner. You don't need to purchase Spyhunter right now - you can examine its effectiveness by installing a free version with limited functionality. If you're interested in purchasing Spyhunter or want to read more about it - click on the link below.

Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

What is trojan

IT-specialists declare that Trojans make up the biggest part of all undesired programs, according to the fact that they are cheap, convenient for various criminal tasks and plain in use. The regular examples of these purposes are updating and controlling already installed viruses, espionage, botnets creation or theft of passwords and crucial data. Despite their abundance of strengths, Trojan viruses got one major disadvantage - they cannot penetrate customer's computer without his assistance. Many customers think that virus is anything that's bad for their machines, but Trojans can’t be called so, because virus is the self-replicating program, that can avalanche spreading over flash drives and the Internet. Trojans cannot replicate themselves, and can’t infect the device independently. The only thing that Trojan is capable of doing before penetrating the system is waiting until some naive victim downloads it and installs it. All the facts described in this paragraph bring us to one decision: Trojan viruses should be recognized and avoided before they get into the device!

Many customers think that to prevent virus infection they just have to install an antivirus, but it's not true. No AV utility can protect your computer if you download new adware on a daily basis. To make sure that the machine is protected, you have to get rid of dangerous habits, and behave wisely in the Web. There are two ways to achieve this effect:

  • The safest way is to totally stop using utilities of suspicious origin. By these we mean all the tools downloaded not from website of its developer or licensed distributors. Obviously, the pirated copies of useful software also are probably harmful. If you quit downloading such programs, the probability of infection would be reduced to minimal, and AV-program can quickly cope with it.
  • If you aren't prepared to fully forget about using unlicensed content, you must carefully examine each installed program. Trojan programs most often lurk beneath the guise of good programs such as search engines, browser games, browsers, system optimizers, AV tools and driver updaters. Do not download suspicious utilities from this list, and while installing any unlicensed program - watch closely at the installation, revoking all offers for installing additional software.

Follow these advices and you'll immediately see the result: your system will be safe, fast and workable, and will remain so forever.

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.