Adult Website Email Scam: Don’t Give Bitcoin to Thieves

Ben Stegner 03-05-2019

You’re minding your own business, when suddenly you receive an email from your own account that your account has been hacked. Shocked, you open it to find a startling claim: someone has installed malware on your computer, and they have video of you in a compromising situation.


If you don’t send them a bunch of money via cryptocurrency, they’re going to share the video with your friends.

Most people would be a bit nervous at the sight of such an email. But as it turns out, this is a complete farce. Let’s dive into these scam emails and see why they’re bogus so you never hand over your money to scammers.

I’ve Been Hacked?!

We’ve received two similar scam emails in the past few weeks. Each one seems to come from your own email address, and claims that an attacker has fully taken over your system thanks to malware installed while visiting an adult site.

Here’s the first one:

Bitcoin Extortion Email 1


And here’s the second:

Notably, Gmail recognizes that the first message is dangerous and was used to take advantage of people. The only reason these even made it to my inbox is because I’ve set up a filter to make sure messages from email addresses never go to spam. But I’m glad I received them, as they make a good illustration.

Because they sent an email “from your own account,” the attacker claims this is proof of their access. The scammer claims to have video of you using adult material, and threatens to send this to your contacts if you don’t pay hundreds of dollars in Bitcoin within a day or two. Of course, they ask for Bitcoin because it’s untraceable.


Let’s pick out specific lines from these emails to illustrate why this is nonsense.

It’s Easy to Fake Emails

The first email made this claim:

I sent this email from your email account (if you didn’t see, check the from email id). In other words, I have full access to your email account.

The second one goes even further:

Did you detect i’ve emailed you this message using your own e-mail address? This means i posses COMPLETE access to your system!

As you might know, it’s relatively trivial to spoof an email What Is Email Spoofing? How Scammers Forge Fake Emails It looks like your email account has been hacked, but those weird messages you didn't send are actually due to email spoofing. Read More . Someone can send an email to your friend and make it look like the message came from your address.


This is the same as what’s happened here. Nobody has actually broken into your email; they’ve simply spoofed the message to make it look like it came from your own account.

Further, the claim that gaining access to your email account means they have control of your system is a lie too…

They Don’t Control Your System

Both emails insist that they have access to your personal data and computer system:


The malware gave me full access and control over your system, meaning, I can see everything on your screen, turn on your camera or microphone, and you won’t even notice about it. I also have access to all your contacts.

This backdoor downloaded itself onto your device and provides me complete access to all your accounts, e-mails, data, contacts and so on.

While malware does exist that can spy on your webcam without you knowing How to Check If Your Webcam Was Hacked: 7 Things You Need to Do Concerned your webcam may be a target for hackers? Think it's already been hacked? Follow these important steps to find out. Read More , it would likely trigger your security software. One of the emails claimed that “My malware updates its signature every 10 minutes, and there is nothing your antivirus can do about it.” There’s zero reason to believe this, of course.

A piece of malware obtained on a website wouldn’t give the owner access to your contacts, accounts, “and so on” (which is extremely vague). Assuming you were using an incognito window, you wouldn’t be logged into any accounts in your browser. If you don’t have contacts synced to your computer, there’s no way they would have this information. “Data” is not specific at all.

The logistics of a small-time scammer keeping video footage from hundreds or thousands of victims doesn’t make much sense either. This would take up a lot of storage space and be way more work than the person was willing to do.

A Countdown to Destruction

Both messages try to pressure you into paying up by letting you know that you have a limited time to decide:

You have 48 hours to pay. Since I already have access to your system, I now know that you have read this email, so your countdown has begun.

From the time you opened this mail you activated a timer. My setup will at this point monitor this particular bitcoin address for any inbound financial transactions. You possess 12 hrs (just 12!) to generate the transfer.

The message doesn’t include a read receipt, and even with access to your system, it’s highly unlikely that someone would know exactly when you opened an email. This “limited time” is simply a ploy to pressure you into paying quickly.

Not only that, but the second message reveals an interesting blunder. It says that it will monitor its Bitcoin wallet for “any inbound financial transactions.” Any suggests that you are the sole victim of the attack; if the attacker infected multiple people but only received one payment, how would they know who paid? Bitcoin is anonymous, so there’s nothing tying your payment to your email account.

No scammer would go through the trouble of creating custom malware like this only to infect one person.

Societal Pressure

Man depressed with computer
Image Credit: danilkorolev/Depositphotos

The scammer thinks they have you cornered. You wouldn’t want videos like these to go out to all your loved ones, right?

i will deliver all of the pics and videos i possess of you “pleasing yourself” to each of your contacts, imagine the affect this is going to have on your social life!

They want you to worry about what your friends would think about receiving such a video so you pay to silence them. With one email asking for $985 and the other $670, this is an expensive payoff.

Yet you could receive this email even if you’ve never visited such sites, or if your computer doesn’t have a webcam/you have your webcam covered. The scammer is hoping that you fit the description they’ve created so they can scare you.

System Shutdown

The second email was noticeably more aggressive than the first. It warned that if we didn’t pay, the malware would completely shut down our system:

On top of that your system will lock up in a specific timeframe and can never ever be used again . . . . When you do not make the transaction inside of this time-frame your device will lock up, even if you disconnect from the internet or change all your online passwords.

This is also ridiculous, of course. While malware like this is possible in theory, an amateur crook wouldn’t take the time to build such a complex program. They’re looking for a quick and simple payoff, which they would get if you sent them the Bitcoin they’re asking for.

All they had to do for this threat was devise a scary story, send an email, and provide their Bitcoin wallet address. This scam is nothing more than that.

How to Avoid Email Extortion Scams

As you can probably guess, we wrote this long after the “time limit” posed in these emails had passed. This proves that they’re completely false.

We’ve learned some good information from this analysis. Not only are emails easy to fake, but when you break down threats like this, you find that they’re incredibly vague. They don’t provide any proof that they have the compromising information, and they wave off pretty extreme malware infections as trivial.

The messages are also full of grammar mistakes, which shows that the senders didn’t care enough to proofread them and make them any more believable.

Of course, it’s possible that an attack like this could happen at some point in the future. We recommend reading further on how to protect yourself from email extortion scams How to Protect Yourself From Extortion Phishing Scams Scammers are guilt-shaming users of adult material with threats of sharing their online habits in the "You Should Be Ashamed Of Yourself" extortion phishing scam. Find out what this is, and how to avoid it. Read More .

Image Credit: EdZbarzhyvetsky/Depositphotos

Related topics: Bitcoin, Cryptocurrency, Online Security, Scams.

Affiliate Disclosure: By buying the products we recommend, you help keep the site alive. Read more.

Whatsapp Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Todd S
    September 11, 2019 at 1:01 pm

    I get a similar threat. They don’t spoof my address, but rather use a old password in the subject as proof of hack.
    Fortunately, they send it to the wrong address. And the systems in question don’t have cameras. Silly scammers.

  2. Francisco Rdz.
    August 22, 2019 at 6:31 am

    It happened to me but the ironic thing is i never visit adult sites on my computer and on my phone i only visit trusted sites and also only do what i do without internet and i checked my phones for viruses and didn't find an virus or an rare app on system partition, also in the email i received, the person that send me an email put my previous password and it was incomplete, still i enabled verification with my phone number

    • Ben Stegner
      August 22, 2019 at 2:54 pm

      This illustrates the fear that the scammers hope to prey on. They send you a past password that they found in a data leak, hoping you'll believe they actually have access to your system. I'm glad you didn't believe it!

  3. Steve Beavs
    August 15, 2019 at 9:05 pm

    It works, I got 9.00btc from kloviaclinks(.)com tools.

  4. Susan
    May 12, 2019 at 10:46 pm

    Perfect timing, I received one of these emails just two days ago. It was in my junk mail for an account I stopped using because of all the spam I received. It included a password I had used for a few sites about five years ago.

    • Bruno
      August 6, 2019 at 11:53 pm

      Got the same email a few months ago.

  5. Daryl Slate Anderson
    May 7, 2019 at 4:23 am

    What about the ones that include a password that you have used?

    • Ben Stegner
      May 7, 2019 at 1:59 pm

      If they include this, I would analyze what they sent. What account is the password for? If you use the same password on multiple sites, it's possible that they dug up an old password from a known data breach, and are simply providing it to you in the email in the hopes that you'll believe them.

      Everything I wrote above still stands -- it's extremely unlikely that someone hosted malware on a website that was able to steal account passwords, especially if you weren't logged into anything. So there must be another explanation for this.

  6. dragonmouth
    May 3, 2019 at 1:37 pm

    {On top of that your system will lock up in a specific timeframe and can never ever be used again"
    Quite a bold claim. Unless the scammer can change your BIOS password, a simple bare metal restore or re-install will get rid of any malware supposedly present. (You do backup your system regularly?)