Hacked email account
Clash Royale CLAN TAG#URR8PPP
up vote
1
down vote
favorite
I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.
iphone email hacking
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
add a comment |Â
up vote
1
down vote
favorite
I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.
iphone email hacking
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago
add a comment |Â
up vote
1
down vote
favorite
up vote
1
down vote
favorite
I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.
iphone email hacking
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
I received an email saying that someone has hacked my email over 6 months ago and they say that through it they have infected my operating system with a virus. They say they have access to all my accounts, browsing history, photos, files on my computer, they also said that they have taken screenshots through the camera on my device. Is this at all possible. I do have a computer that I use occasionally but mainly go through my I pad or I phone. Any help would be appreciated.
iphone email hacking
iphone email hacking
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
asked 1 hour ago


sam utting
61
61
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
New contributor
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
sam utting is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago
add a comment |Â
Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago
Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago
Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago
add a comment |Â
1 Answer
1
active
oldest
votes
up vote
3
down vote
Fake. Delete It and Move On
I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.
Delete it and move on.
Sample Spam
The SPAM email I received:
Hello!
My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.
So, your password from is (and incorrect, btw).
Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.
I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.
I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!
During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!
I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.
Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.
Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!
Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.
I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!
Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago
add a comment |Â
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
3
down vote
Fake. Delete It and Move On
I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.
Delete it and move on.
Sample Spam
The SPAM email I received:
Hello!
My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.
So, your password from is (and incorrect, btw).
Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.
I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.
I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!
During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!
I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.
Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.
Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!
Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.
I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!
Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago
add a comment |Â
up vote
3
down vote
Fake. Delete It and Move On
I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.
Delete it and move on.
Sample Spam
The SPAM email I received:
Hello!
My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.
So, your password from is (and incorrect, btw).
Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.
I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.
I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!
During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!
I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.
Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.
Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!
Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.
I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!
Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago
add a comment |Â
up vote
3
down vote
up vote
3
down vote
Fake. Delete It and Move On
I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.
Delete it and move on.
Sample Spam
The SPAM email I received:
Hello!
My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.
So, your password from is (and incorrect, btw).
Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.
I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.
I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!
During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!
I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.
Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.
Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!
Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.
I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!
Fake. Delete It and Move On
I got a similar email last week and it is fake. All the details you mentioned are identical to the email I received. In my case, I use 2-factor authentication for my mail (Gmail) and I use LastPass for my password management and a VPN for all my connected devices. The most telling part of the fakery is that the ‘hacker’ compromised you six months ago, yet has not taken any action. If they have the goods on you, why not sooner? Lastly, the email appeared in my Gmail SPAM filter. That’s the biggest clue to that it is SPAM.
Delete it and move on.
Sample Spam
The SPAM email I received:
Hello!
My nickname in darknet is hort17.
I hacked this mailbox more than six months ago,
through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.
So, your password from is (and incorrect, btw).
Even if you changed the password after that - it does not matter, my virus intercepted all the caching data on your computer
and automatically saved access for me.
I have access to all your accounts, social networks, email, browsing history.
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.
I was most struck by the intimate content sites that you occasionally visit.
You have a very wild imagination, I tell you!
During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.
Oh my god! You are so funny and excited!
I think that you do not want all your contacts to get these files, right?
If you are of the same opinion, then I think that $890 is quite a fair price to destroy the dirt I created.
Send the above amount on my BTC wallet (bitcoin): 1EZS92[...redacted...]E62e9XY
As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.
Otherwise, these files and history of visiting sites will get all your contacts from your device.
Also, I'll send to everyone your contact access to your email and access logs, I have carefully saved it!
Since reading this letter you have 48 hours!
After your reading this message, I'll receive an automatic notification that you have seen the letter.
I hope I taught you a good lesson.
Do not be so nonchalant, please visit only to proven resources, and don't enter your passwords anywhere!
Good luck!
edited 12 mins ago


Graham Miln
25.6k55986
25.6k55986
answered 30 mins ago


IconDaemon
11k62740
11k62740
Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago
add a comment |Â
Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago
Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago
Hahahahaha. Tbh this is a better phishing attempt then most. But some dead give aways are the use of buzz words. "darknet" "synchronizing" "passwords" "data" "cache". Also the sense of urgency, "48 hours". Lastly, if you take out the emotion there is 0 information. No proof that he has anything: passwords, emails, pictures, porn (which is apparently "very wild"😜 ). But nice try...
– JBis
4 mins ago
add a comment |Â
sam utting is a new contributor. Be nice, and check out our Code of Conduct.
sam utting is a new contributor. Be nice, and check out our Code of Conduct.
sam utting is a new contributor. Be nice, and check out our Code of Conduct.
sam utting is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fapple.stackexchange.com%2fquestions%2f340295%2fhacked-email-account%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Is this computer running macOS? In any case, it is possible that your computer is affected by ransomware, but just knowing your email credentials does not necessarily provide the hacker with access to your files, much less your computer camera. If, however, you have installed unknown or suspicious software coming through your email via attachment or link, you could have been compromised.
– Jaime Santa Cruz
32 mins ago