A cybercriminal hides behind a mask, pretending to be friendly

Beware of Sextortion Blackmail: No One is Watching You Go to Porn Sites

Beware of porn site extortion emails that pretend to have evidence of you getting off at a porn site. They don’t. Please don’t fall for this scam.

Warning: Don’t read this if you don’t like graphic sexual descriptions.

I have received an email over and over again demanding money so that a video of me watching porn will not be released.  It makes me giggle because I don’t go to porn sites. But as the owner of a computer repair business, I know a lot of people occasionally go to them. So what? It’s not something to feel ashamed about or pay a fraudulent person a lot of cash for on bitcoin.

This email has all the markings of a blackmail scam email.  The content of the email is filled with grammatical errors and says the same thing over and over again.  Furthermore, the supposed hacker goes back and forth from trying to be “helpful” and then back to threatening again.  If the overall intent of the email is threatening, don’t buy into the idea that the supposed hacker is trying to just help you out.

Mad young woman worker losing job result on broken pc What is wrong. Anxious angry hispanic female splash hands unable to access database on laptop forgetting password having weak wifi signal. Mad shocked young woman worker losing job result on broken pc angry computer stock pictures, royalty-free photos & images

If this supposed hacker had the video he claims he has, then he would not be sending me email threats over and over again (like he has been) and would show me the video as evidence.  Yet, I do not respond and I get this sextortion email over and over again.  I know that I have never been on porn sites, so I know such a video doesn’t exist, but maybe you do go on porn sites from time to time.  I am not here to judge but to help you avoid falling for silly scam tricks like these.

No one is watching you. If they were they would show proof.  They also don’t have access to your email.  They are just good at convincing people they do.

You should never exchange money for a scam email such as this.  The chance that such a video exists is very small, as is the supposed access the cybercriminal has to all of your emails.  If such a video existed, the sextortionist would show it to us.  No, this person obviously is trying to trick us and a lot of other people at the same time.  Even if just a few people fall for the scam, it makes it profitable for the cybercriminal.

Hacker with laptop computer stealing confidential data, personal information and credit card detail. Hacking concept. email scam stock illustrations

Unfortunately, some people who do visit porn sites will likely fall for this sort of scam.  That keeps cybercriminals such as these going.  There will always be some, so it is important to stay vigilant.

To avoid fraud and phishing scams watch out for:

    1. Poor use of English grammar
    2. Repetitive and threatening language
    3. Writing that tries to sound official
    4. Emails that look legitimate but ask for information that legitimate companies would already have.
    5. Emails that ask for a set amount of money to be sent in bitcoin or some other online, anonymous manner.

If you have any doubt, give Ducktoes a shout at 403-219-3031. Or visit our website.

If you have any doubt, give Ducktoes a shout at 403-219-3031. Or visit our website.
These are all red flags to look out for.  Many email scams will not be as obvious as the following email.


You have an outstanding payment. 

From administrator@ducktoes.com on 2021-10-27 03:26

Hello there!

Unfortunately, there are some bad news for you.
Around several months ago I have obtained access to your devices that you were using to browse internet.
Subsequently, I have proceeded with tracking down internet activities of yours.

Below, is the sequence of past events:
In the past, I have bought access from hackers to numerous email accounts (today, that is a very straightforward task that can be done online).
Clearly, I have effortlessly logged in to email account of yours (administrator@ducktoes.com).

A week after that, I have managed to install Trojan virus to Operating Systems of all your devices that are used for email access.
Actually, that was quite simple (because you were clicking the links in inbox emails).
All smart things are quite straightforward. (>_<)

The software of mine allows me to access to all controllers in your devices, such as video camera, microphone and keyboard.
I have managed to download all your personal data, as well as web browsing history and photos to my servers.
I can access all messengers of yours, as well as emails, social networks, contacts list and even chat history.
My virus unceasingly refreshes its signatures (since it is driver-based), and hereby stays invisible for your antivirus.

So, by now you should already understand the reason why I remained unnoticed until this very moment…

While collecting your information, I have found out that you are also a huge fan of websites for adults.
You truly enjoy checking out porn websites and watching dirty videos, while having a lot of kinky fun.
I have recorded several kinky scenes of yours and montaged some videos, where you reach orgasms while passionately masturbating.

If you still doubt my serious intentions, it only takes couple mouse clicks to share your videos with your friends, relatives and even colleagues.
It is also not a problem for me to allow those vids for access of public as well.
I truly believe, you would not want this to occur, understanding how special are the videos you love watching, (you are clearly aware of that) all that stuff can result in a real disaster for you.

Let’s resolve it like this:
All you need is $1750 USD transfer to my account (bitcoin equivalent based on exchange rate during your transfer), and after the transaction is successful, I will proceed to delete all that kinky stuff without delay.
Afterwards, we can pretend that we have never met before. In addition, I assure you that all the harmful software will be deleted from all your devices. Be sure, I keep my promises.

That is quite a fair deal with a low price, bearing in mind that I have spent a lot of effort to go through your profile and traffic for a long period.
If you are unaware how to buy and send bitcoins – it can be easily fixed by searching all related information online.

Below is bitcoin wallet of mine: 1P8zGx51BpyxEy5jBgr5ugoPXbSgyd7fpw

You are given not more than 48 hours after you have opened this email (2 days to be precise).

Below is the list of actions that you should not attempt doing:

Do not attempt to reply my email (the email in your inbox was created by me together with return address).
Do not attempt to call police or any other security services. Moreover, don’t even think to share this with friends of yours. Once I find that out (make no doubt about it, I can do that effortlessly, bearing in mind that I have full control over all your systems) – the video of yours will become available to public immediately.
Do not attempt to search for me – there is completely no point in that. All cryptocurrency transactions remain anonymous at all times.
Do not attempt reinstalling the OS on devices of yours or get rid of them. It is meaningless too, because all your videos are already available at remote servers.

Below is the list of things you don’t need to be concerned about:

That I will not receive the money you transferred.

– Don’t you worry, I can still track it, after the transaction is successfully completed, because I still monitor all your activities (trojan virus of mine includes a remote-control option, just like TeamViewer).

That I still will make your videos available to public after your money transfer is complete.

– Believe me, it is meaningless for me to keep on making your life complicated. If I indeed wanted to make it happen, it would happen long time ago!

Everything will be carried out based on fairness!

Before I forget…moving forward try not to get involved in this kind of situations anymore!
An advice from me – regularly change all the passwords to your accounts.

FacebooktwitterredditpinterestlinkedinmailFacebooktwitterredditpinterestlinkedinmailby feather

Emergency Weekend Virus Removal at Birthday Party

[ad name=”new”]

Yesterday, like most Saturdays, I worked at the Ducktoes Computer Repair shop. It was still bitterly cold out, so I thought it would be a slow day. It turned out not so slow after all.  We got in a few computers and answered a lot of phone calls.


A man visiting from out of town called and said he had a virus on his laptop that had locked his screen. The virus interface, which began as soon as he logged into Windows, wouldn’t let him do anything else but stay on the page, which was the virus’s Interpol version, see below. There was no way to get around it. The text on the page said it was placed there by Interpol for crimes committed on my client’s computer. To unlock it, he was supposed to buy a gift card from Shoppers or Canadian Tire and send it to the “police.” Then they would unlock his screen. My client didn’t buy the card, he knew it was a scam, but he had only overnight before he had to fly out of YYC today for a business meeting.

Screenshot of Interpol Virus

At the computer repair shop, we’ve fixed the Cybercrime virus many times so I agreed to do it quickly. Usually we boot into safe mode with command prompt and then navigate to the flash drive from there. On the flash drive we have our most potent virus tools. Yet the Cybercrime virus had changed as it frequently does. When I tried to boot into safe mode with command prompt, the laptop rebooted immediately. Uh-oh, I said to myself. I had to think of a new solution asap. I tried Kaspersky Rescue Disk but it wouldn’t run for some reason and Avast Rescue disk, but the definitions were too old to catch the virus.

Also last night was our extended family party for my son’s 18th birthday. We were having the family over to celebrate with take-out Indian food, presents, and cake. I was under pressure.


What I did: I removed the hard drive, putting the tiny hard drive screws in a safe place, then put drive in a 2.5 enclosure. Then I connected it to my laptop and ran Malwarebytes Pro on it and Avast. It was not finished before the birthday party began so I let the scans run during the party. They both caught many infections. Between the meal, which was delicious by the way, and opening presents, I put the hard drive back into the laptop and it booted without the fraudulent Interpol page coming up on the desktop. Hurray!! The computer was still infected but now I had cracked the virus enough to really work on it. I ran Combofix which caught many infections in System32 deep within Windows and many other tools until the scans started running clean and then I started speeding it up. I knew it was almost fixed by the time the party was over. I wanted to dance a jig. I do love the challenge of removing a difficult virus.

This morning I’m speeding the laptop up and repairing the registry before giving it back to my client just in time for him to catch his flight.


FacebooktwitterredditpinterestlinkedinmailFacebooktwitterredditpinterestlinkedinmailby feather