Consumer Fraud Reporting

There are affiliate links on this page.
Read our disclosure policy to learn more.

Translate this page to any language by choosing a language in the box below.

Cryptocurrency blackmail scam email: ghnbogeyaum@outlook.com 'I hacked your computer' or cell phone, tablet, etc.

With news stories of hacking into credit card companies, Facebook accounts, email accounts, computers and cell phones being hacked and more, scammers are busy trying to take advantage of fears of being hacked. While it certainly is possible to have all of these hacked, many scammers simply prey upon consumers' fear of being hacked to extort their victims into surrendering money. The FBI is seeing an increase in the number of reported extortion attempts, claiming your device has been hacked. In one recent month, the FBI's Internet Crime Complaint Center, or IC3, received an additional 13,000 complaints about the extortion scam over the previous months. Extortion occurs when someone threatens to distribute your private and sensitive material if you don't pay a ransom fee, usually by Bitcoin. The scammers may claim they used your webcam to record you or installed software to record websites you visited. None of that is actually true. They probably got your email address  from a recent data breach at your bank or other institution. .So, they may really know one of your old or recent passwords, and they include it in the message to prove it. They hope that will scare you into paying them the blackmail.

Here is a common, and unfortunately, popular example of this.

The email

A victim receives an email similar to the one below. In this email, the scammer claims:

  1. He hacked into your device (computer, tablet, phone). He says that allowed  "your browser initiated working as a RDP that has a key logger which gave me access to your screen and also web camera"
  2. His software "collected your complete contacts from your Messenger, Facebook, as well as emailaccount"
  3. He activated the camera on your device and recorded you watching porn and created a split screen video of you and the porn.
  4. He can tell that you read the email
  5. He can't be traced.

After making these claims, he then issues his threats: you pay him by bitcoin or he will send the video to everyone in your contact list.

Example scam email:

I've received this twice in two weeks and my wife also received it from Return-Path:   the subject line has a former password I used (but no longer use) years ago.  I'll first paste the email message asking for $2000 US bitcoin payment. 

The scammers email:

"𝙸 𝚍𝚘 πš”πš—πš˜πš , πš˜πš›πšπšŠπš—πš’πšœπš, πš’πšœ πš’πš˜πšžπš› πš™πšŠπšœπšœπš πš˜πš›πš.

𝙸 πš›πšŽπššπšžπš’πš›πšŽ πš’πš˜πšžπš› πšπšžπš•πš• πšŠπšπšπšŽπš—πšπš’πš˜πš— πšπš˜πš› πšπš‘πšŽ πš—πšŽπš‘πš 𝟸𝟺 πš‘πš›πšœ, πš˜πš› 𝙸 πš πš’πš•πš• πš–πšŠπš”πšŽ πšœπšžπš›πšŽ 𝚒𝚘𝚞 πšπš‘πšŠπš 𝚒𝚘𝚞 πš•πš’πšŸπšŽ 𝚘𝚞𝚝 𝚘𝚏 πšπšžπš’πš•πš πšπš˜πš› πšπš‘πšŽ πš›πšŽπšœπš 𝚘𝚏 πš’πš˜πšžπš› πšŽπš‘πš’πšœπšπšŽπš—πšŒπšŽ.

π™·πšŽπš•πš•πš˜ πšπš‘πšŽπš›πšŽ, 𝚒𝚘𝚞 𝚍𝚘 πš—πš˜πš πš”πš—πš˜πš  πš–πšŽ πš™πšŽπš›πšœπš˜πš—πšŠπš•πš•πš’. 𝚈𝚎𝚝 𝙸 πš”πš—πš˜πš  πš™πš›πšŽπšπšπš’ πš–πšžπšŒπš‘ πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš πšŒπš˜πš—πšŒπšŽπš›πš—πš’πš—πš 𝚒𝚘𝚞. πšˆπš˜πšžπš› πš™πšŽπš›πšœπš˜πš—πšŠπš• πšπš‹ πšŒπš˜πš—πšπšŠπšŒπš πš•πš’πšœπš, πšœπš–πšŠπš›πšπš™πš‘πš˜πš—πšŽ πšŒπš˜πš—πšπšŠπšŒπšπšœ 𝚊𝚜 πš πšŽπš•πš• 𝚊𝚜 πšŠπš•πš• πšπš‘πšŽ πš˜πš—πš•πš’πš—πšŽ πšŠπšŒπšπš’πšŸπš’πšπš’ πš˜πš— πš’πš˜πšžπš› πšŒπš˜πš–πš™πšžπšπšŽπš› πšπš›πš˜πš– πš™πš›πšŽπšŸπš’πš˜πšžπšœ 𝟷𝟸𝟺 𝚍𝚊𝚒𝚜.

π™Έπš—πšŒπš•πšžπšπš’πš—πš, πš’πš˜πšžπš› πšœπšŽπš•πš πš™πš•πšŽπšŠπšœπšžπš›πšŽ πšŸπš’πšπšŽπš˜ 𝚏𝚘𝚘𝚝𝚊𝚐𝚎, πš πš‘πš’πšŒπš‘ πš‹πš›πš’πš—πšπšœ πš–πšŽ 𝚝𝚘 πšπš‘πšŽ πš™πš›πš’πš–πšŠπš›πš’ πš›πšŽπšŠπšœπš˜πš— πš πš‘πš’ 𝙸 'πš– πšŒπš›πšŠπšπšπš’πš—πš πšπš‘πš’πšœ πšœπš™πšŽπšŒπš’πšπš’πšŒ πš–πšŠπš’πš• 𝚝𝚘 𝚒𝚘𝚞.

πš†πšŽπš•πš• πšπš‘πšŽ πš™πš›πšŽπšŸπš’πš˜πšžπšœ πšπš’πš–πšŽ 𝚒𝚘𝚞 πšŸπš’πšœπš’πšπšŽπš πšπš‘πšŽ πšŠπšπšžπš•πš πš–πšŠπšπšŽπš›πš’πšŠπš• πš πšŽπš‹πš™πšŠπšπšŽπšœ, πš–πš’ πš–πšŠπš•πš πšŠπš›πšŽ πšŽπš—πšπšŽπš πšžπš™ πš‹πšŽπš’πš—πš πšŠπšŒπšπš’πšŸπšŠπšπšŽπš πš’πš—πšœπš’πšπšŽ πš’πš˜πšžπš› πšŒπš˜πš–πš™πšžπšπšŽπš› πš πš‘πš’πšŒπš‘ πšŽπš—πšπšŽπš πšžπš™ πš•πš˜πšπšπš’πš—πš 𝚊 𝚎𝚒𝚎-πšŒπšŠπšπšŒπš‘πš’πš—πš πšŸπš’πšπšŽπš˜ 𝚘𝚏 πš’πš˜πšžπš› πšœπšŽπš•πš πš™πš•πšŽπšŠπšœπšžπš›πšŽ πš™πš•πšŠπš’ πšœπš’πš–πš™πš•πš’ πš‹πš’ πšπš›πš’πšπšπšŽπš›πš’πš—πš πš’πš˜πšžπš› πš πšŽπš‹ πšŒπšŠπš–πšŽπš›πšŠ.
(𝚒𝚘𝚞 𝚐𝚘𝚝 𝚊 πšŽπš‘πšŒπšŽπš™πšπš’πš˜πš—πšŠπš•πš•πš’ 𝚘𝚍𝚍 𝚝𝚊𝚜𝚝𝚎 πš‹πš’ πšπš‘πšŽ 𝚠𝚊𝚒 πš•πš–πšŠπš˜)

𝙸 πš˜πš πš— πšπš‘πšŽ πš πš‘πš˜πš•πšŽ πš›πšŽπšŒπš˜πš›πšπš’πš—πš. π™Ήπšžπšœπš πš’πš— 𝚌𝚊𝚜𝚎 𝚒𝚘𝚞 πšπš‘πš’πš—πš” 𝙸 'πš– πš™πš•πšŠπš’πš’πš—πš πšŠπš›πš˜πšžπš—πš, πš“πšžπšœπš πš›πšŽπš™πš•πš’ πš™πš›πš˜πš˜πš πšŠπš—πš 𝙸 πš πš’πš•πš• πš‹πšŽ πšπš˜πš›πš πšŠπš›πšπš’πš—πš πšπš‘πšŽ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› πš›πšŽπšŒπš˜πš›πšπš’πš—πš πš›πšŠπš—πšπš˜πš–πš•πš’ 𝚝𝚘 𝟷𝟢 πš™πšŽπš˜πš™πš•πšŽ 𝚒𝚘𝚞 πš›πšŽπšŒπš˜πšπš—πš’πš£πšŽ.

π™Έπš πšŒπš˜πšžπš•πš πšŽπš—πš πšžπš™ πš‹πšŽπš’πš—πš πš’πš˜πšžπš› πšπš›πš’πšŽπš—πš, 𝚌𝚘 πš πš˜πš›πš”πšŽπš›πšœ, πš‹πš˜πšœπšœ, πš–πš˜πšπš‘πšŽπš› πšŠπš—πš πšπšŠπšπš‘πšŽπš› (𝙸 πšπš˜πš—'𝚝 πš”πš—πš˜πš ! π™Όπš’ πšœπš˜πšπšπš πšŠπš›πšŽ πš πš’πš•πš• πš›πšŠπš—πšπš˜πš–πš•πš’ πš™πš’πšŒπš” πšπš‘πšŽ πšŒπš˜πš—πšπšŠπšŒπšπšœ).

πš†πš˜πšžπš•πš 𝚒𝚘𝚞 πš‹πšŽ πšŠπš‹πš•πšŽ 𝚝𝚘 𝚐𝚊𝚣𝚎 πš’πš—πšπš˜ πšŠπš—πš’πš˜πš—πšŽ'𝚜 𝚎𝚒𝚎𝚜 πšŠπšπšŠπš’πš— πšŠπšπšπšŽπš› πš’πš? 𝙸 πššπšžπšŽπšœπšπš’πš˜πš— πšπš‘πšŠπš...

π™½πš˜πš—πšŽπšπš‘πšŽπš•πšŽπšœπšœ, πš’πš πšπš˜πšŽπšœπš—'𝚝 πš—πšŽπšŽπš 𝚝𝚘 πš‹πšŽ πšπš‘πšŠπš πš™πšŠπšπš‘.

𝙸'πš– πšπš˜πš’πš—πš 𝚝𝚘 πš–πšŠπš”πšŽ 𝚒𝚘𝚞 𝚊 πš˜πš—πšŽ πšπš’πš–πšŽ, πš—πš˜ πš—πšŽπšπš˜πšπš’πšŠπš‹πš•πšŽ πš˜πšπšπšŽπš›.

π™Ώπšžπš›πšŒπš‘πšŠπšœπšŽ πš„πš‚π™³ 𝟸𝟢𝟢𝟢 πš’πš— πš‹πš’πšπšŒπš˜πš’πš— πšŠπš—πš πšœπšŽπš—πš πš’πš πš˜πš— πšπš‘πšŽ πš•πš’πšœπšπšŽπš πš‹πšŽπš•πš˜πš  πšŠπšπšπš›πšŽπšœπšœ:



[𝚌𝚊𝚜𝚎 πšœπšŽπš—πšœπš’πšπš’πšŸπšŽ πšŒπš˜πš™πš’ & πš™πšŠπšœπšπšŽ πš’πš, πšŠπš—πš πš›πšŽπš–πš˜πšŸπšŽ ** πšπš›πš˜πš– πš’πš]

(π™Έπš 𝚒𝚘𝚞 πšπš˜πš—'𝚝 πšžπš—πšπšŽπš›πšœπšπšŠπš—πš πš‘πš˜πš , πš•πš˜πš˜πš” πš˜πš—πš•πš’πš—πšŽ πš‘πš˜πš  𝚝𝚘 πš™πšžπš›πšŒπš‘πšŠπšœπšŽ πš‹πš’πšπšŒπš˜πš’πš—. π™³πš˜ πš—πš˜πš 𝚠𝚊𝚜𝚝𝚎 πš–πš’ πš™πš›πšŽπšŒπš’πš˜πšžπšœ πšπš’πš–πšŽ)

π™Έπš 𝚒𝚘𝚞 πšœπšŽπš—πš πšπš‘πš’πšœ 'πšπš˜πš—πšŠπšπš’πš˜πš—' (πš πš‘πš’ πšπš˜πš—'𝚝 𝚠𝚎 πšŒπšŠπš•πš• πšπš‘πš’πšœ πšπš‘πšŠπš?). π™Έπš–πš–πšŽπšπš’πšŠπšπšŽπš•πš’ πšŠπšπšπšŽπš› πšπš‘πšŠπš, 𝙸 πš πš’πš•πš• πšπš’πšœπšŠπš™πš™πšŽπšŠπš› πšŠπš—πš πš—πšŽπšŸπšŽπš› πšŽπšŸπšŽπš› πš–πšŠπš”πšŽ πšŒπš˜πš—πšπšŠπšŒπš πš πš’πšπš‘ 𝚒𝚘𝚞 πšŠπšπšŠπš’πš—. 𝙸 πš πš’πš•πš• 𝚐𝚎𝚝 πš›πš’πš 𝚘𝚏 πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš 𝙸'𝚟𝚎 𝚐𝚘𝚝 πš’πš— πš›πšŽπš•πšŠπšπš’πš˜πš— 𝚝𝚘 𝚒𝚘𝚞. 𝚈𝚘𝚞 πš–πšŠπš’ πšŸπšŽπš›πš’ πš πšŽπš•πš• πšŒπšŠπš›πš›πš’ πš˜πš— πš•πš’πšŸπš’πš—πš πš’πš˜πšžπš› πš—πš˜πš›πš–πšŠπš• 𝚍𝚊𝚒 𝚝𝚘 𝚍𝚊𝚒 πš•πš’πšπšŽπšœπšπš’πš•πšŽ πš πš’πšπš‘ πšŠπš‹πšœπš˜πš•πšžπšπšŽπš•πš’ πš—πš˜ πšπšŽπšŠπš›.

𝚈𝚘𝚞'𝚟𝚎 𝚐𝚘𝚝 𝟸𝟺 πš‘πš˜πšžπš›πšœ πš’πš— πš˜πš›πšπšŽπš› 𝚝𝚘 𝚍𝚘 𝚜𝚘. πšˆπš˜πšžπš› πšπš’πš–πšŽ πš‹πšŽπšπš’πš—πšœ 𝚊𝚜 πšœπš˜πš˜πš— 𝚒𝚘𝚞 πš›πšŽπšŠπš πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πš’πšœ 𝚎-πš–πšŠπš’πš•. 𝙸 πš‘πšŠπšŸπšŽ 𝚐𝚘𝚝 πšŠπš— πšžπš—πš’πššπšžπšŽ 𝚌𝚘𝚍𝚎 πšπš‘πšŠπš πš πš’πš•πš• πšπšŽπš•πš• πš–πšŽ 𝚊𝚜 πšœπš˜πš˜πš— 𝚊𝚜 𝚒𝚘𝚞 𝚐𝚘 πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πš’πšœ 𝚎-πš–πšŠπš’πš• πšπš‘πšŽπš›πšŽπšπš˜πš›πšŽ πšπš˜πš—'𝚝 πšŠπšπšπšŽπš–πš™πš 𝚝𝚘 𝚊𝚌𝚝 πšœπš–πšŠπš›πš."
πš‹πšŽπšπš’πš—πšœ 𝚊𝚜 πšœπš˜πš˜πš— 𝚒𝚘𝚞 πš›πšŽπšŠπš πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πš’πšœ 𝚎-πš–πšŠπš’πš•. 𝙸 πš‘πšŠπšŸπšŽ 𝚐𝚘𝚝 πšŠπš— πšžπš—πš’πššπšžπšŽ 𝚌𝚘𝚍𝚎 πšπš‘πšŠπš πš πš’πš•πš• πšπšŽπš•πš• πš–πšŽ 𝚊𝚜 πšœπš˜πš˜πš— 𝚊𝚜 𝚒𝚘𝚞 𝚐𝚘 πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πš’πšœ 𝚎-πš–πšŠπš’πš• πšπš‘πšŽπš›πšŽπšπš˜πš›πšŽ πšπš˜πš—'𝚝 πšŠπšπšπšŽπš–πš™πš 𝚝𝚘 𝚊𝚌𝚝 πšœπš–πšŠπš›πš."

The truth

Notice that except for your email address, all of the information is vague, general and definitely not specific to you. Notice also that he provides no proof or evidence of his claims. It's pretty obvious that if you were to attempt to extort someone like this, you would provide at least a brief clip of the video you claimed to have to prove that you could follow through. This is an obvious sign of the scam nature.  Of course, if you don't visit porn websites, then you would also obviously know immediately this is a scam. Unless of course, you believe you watch porn in your sleep ( "somnapornography" )

While all of the claims are theoretically possible, it would take a pretty sophisticated scammer to achieve this.  And a scammer like that is not going to target individuals; they'll go after corporations and bigger targets.

Variations

Some versions of the scam, like the one above, include one of the recipient's real passwords as "proof" that their claims are true. Criminals are sending emails and letters using their victims' authentic personally identifiable information to make their claims appear legitimate.  How did they get your password? Most like they bought a list of usernames and passwords on the "dark web" from other hackers from a data breach like the ones you've heard about in the news: Experian, Yahoo, Wells Fargo, etc.  Which means they are using a cut and paste program to send out thousands, or even millions of the scams.

What to do

  • First, do NOT reply to the scammer.

  • Do NOT pay the scammer.

  • Never send compromising images of yourself to anyone, no matter who they are or who they say they are.

  • Do not open attachments from people you do not know.

  • Turn off your electronic devices and web cameras - and cover or physically disconnect web cameras when you are not using them.

  • Report the scam to the FTC: www.FTC.gov/Complaint .

  • Report the scammer to Bitcoin (see below)

Report the scammer to Bitcoin

How To Report a Bitcoin Scam, Blackmail, Extortion or Theft:


  1. Create a free account on Bitcoin (you need this to report a scam to them; it costs nothing and you don't need to give them any sensitive information; just an email address so they can get back to you)

  2. Then login on Bitcoin

  3. Enter the bitcoin address in the box on this page

  4. Then click the "Report Scam" button on the page that comes up in step 3 (not here) (it looks like this:)

If you are receiving sextortion threats, you are not alone. The FTC has been warning about these scams for years .  The FBI says in many sextortion cases, the perpetrator is an adult pretending to be a teenager, and you are just one of the many victims being targeted by the same person. If you believe you're a victim of sextortion, or know someone else who is, the FBI wants to hear from you:

Contact your local FBI office (or toll-free at 1-800-CALL-FBI).

Next, the FBI recommends that if you have experienced this situation please notify the IC3 by filing a complaint .

If the email contains information that identifies you personally (other than your email address alone; for example, address, complete name, etc.) you should contact your local or state police and local FBI office .

If you also forward a copy of the emails you receive here , we will examine them as well.

T o see many other versions of the porn extortion scam, click here.

For a comprehensive list of national and international agencies to report scams, see this page.

Create a Mobile Website
View Site in Mobile | Classic
Share by: