Hacked email account

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
1
down vote

favorite












I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.










share|improve this question







New contributor




sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.



















  • Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
    – Jaime Santa Cruz
    32 mins ago














up vote
1
down vote

favorite












I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.










share|improve this question







New contributor




sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.



















  • Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
    – Jaime Santa Cruz
    32 mins ago












up vote
1
down vote

favorite









up vote
1
down vote

favorite











I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.










share|improve this question







New contributor




sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.







iphone email hacking






share|improve this question







New contributor




sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question







New contributor




sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question






New contributor




sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked 1 hour ago









sam utting

61




61




New contributor




sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











  • Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
    – Jaime Santa Cruz
    32 mins ago
















  • Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
    – Jaime Santa Cruz
    32 mins ago















Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago




Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago










1 Answer
1






active

oldest

votes

















up vote
3
down vote













Fake. Delete It and Move On



I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.



Delete it and move on.



Sample Spam



The SPAM email I received:




Hello!



My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.



So, your password from is (and incorrect, btw).



Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.



I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.



I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!



During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!



I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.



Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.



Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!



Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.



I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!







share|improve this answer






















  • Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
    – JBis
    4 mins ago










Your Answer







StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "118"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: false,
noModals: false,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);






sam utting is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fapple.stackexchange.com%2fquestions%2f340295%2fhacked-email-account%23new-answer', 'question_page');

);

Post as a guest






























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
3
down vote













Fake. Delete It and Move On



I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.



Delete it and move on.



Sample Spam



The SPAM email I received:




Hello!



My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.



So, your password from is (and incorrect, btw).



Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.



I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.



I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!



During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!



I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.



Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.



Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!



Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.



I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!







share|improve this answer






















  • Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
    – JBis
    4 mins ago














up vote
3
down vote













Fake. Delete It and Move On



I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.



Delete it and move on.



Sample Spam



The SPAM email I received:




Hello!



My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.



So, your password from is (and incorrect, btw).



Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.



I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.



I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!



During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!



I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.



Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.



Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!



Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.



I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!







share|improve this answer






















  • Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
    – JBis
    4 mins ago












up vote
3
down vote










up vote
3
down vote









Fake. Delete It and Move On



I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.



Delete it and move on.



Sample Spam



The SPAM email I received:




Hello!



My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.



So, your password from is (and incorrect, btw).



Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.



I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.



I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!



During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!



I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.



Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.



Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!



Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.



I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!







share|improve this answer














Fake. Delete It and Move On



I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.



Delete it and move on.



Sample Spam



The SPAM email I received:




Hello!



My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.



So, your password from is (and incorrect, btw).



Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.



I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.



I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!



During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!



I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.



Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.



Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!



Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.



I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!








share|improve this answer














share|improve this answer



share|improve this answer








edited 12 mins ago









Graham Miln

25.6k55986




25.6k55986










answered 30 mins ago









IconDaemon

11k62740




11k62740











  • Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
    – JBis
    4 mins ago
















  • Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
    – JBis
    4 mins ago















Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago




Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago










sam utting is a new contributor. Be nice, and check out our Code of Conduct.









 

draft saved


draft discarded


















sam utting is a new contributor. Be nice, and check out our Code of Conduct.












sam utting is a new contributor. Be nice, and check out our Code of Conduct.











sam utting is a new contributor. Be nice, and check out our Code of Conduct.













 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fapple.stackexchange.com%2fquestions%2f340295%2fhacked-email-account%23new-answer', 'question_page');

);

Post as a guest













































































Comments

Popular posts from this blog

What does second last employer means? [closed]

List of Gilmore Girls characters

Confectionery