“Hello, You are in big trouble” email scam (fake) - Free Instructions
“Hello, You are in big trouble” email scam Removal Guide
What is “Hello, You are in big trouble” email scam?
“Hello, You are in big trouble” is a fake email that attempts to scare you into paying over $1k in Bitcoin
“Hello, You are in big trouble” is an alarming phrase that is the opening line of a new wave of email scams targeting unsuspecting individuals. These scams, known as sextortion, involve cybercriminals claiming to have compromising information about the recipient. They demand payment to prevent this supposed information from being shared with friends, family, and colleagues.
In these emails, the scammers assert that the victim is “now on the radar of an international group of hackers.” They use fear and urgency to manipulate the recipient into complying with their demands. Understanding how these scams work and knowing how to respond is crucial for protecting yourself from becoming a victim.
If you have received “Hello, You are in big trouble” scam email, you should not make any attempts to contact the email author, and neither should you transfer any money. We will explain everything in detail below.
Name | “Hello, You are in big trouble” or “You are now on the radar of an international group of hackers” |
Type | Email scam, fraud, fake email, sextortion |
Distribution | Malspam – the attackers send thousands of emails in bulk to extort money from unsuspecting users |
Operation | The operator claims that the target was filmed while using porn sites and threatening to release the material publically |
Ransom size | $1,240 to be transferred to a specified Bitcoin crypto-wallet |
Dangers | Financial losses, malware infections |
Similar scams | “Your personal data has leaked due to suspected harmful activities,” “Have you heard about Pegasus,” “Security Status not satisfied“ |
Removal | Make sure you scan your system with security software SpyHunter 5Combo Cleaner to ensure no malicious software is present |
Other tips |
Crooks behind the email attempt to manipulate victims' emotions
Scammers employ a variety of manipulation techniques to create fear and urgency in their victims. The email provided serves as a prime example of these tactics. Here's the full message you might receive:
Hello, You are in big trouble. However, don't panic right away. Listen to me first, because there is always a way out.
You are now on the radar of an international group of hackers, and such things never end well for anyone. I'm sure you've heard of Anonymous. Well, compared to us, they are a bunch of schoolboys. We are a worldwide network of several thousand professionals, each with their own role.
Someone hacks corporate and government networks, someone cooperates with intelligence agencies on the most delicate tasks, and someone (including me) deals with people like you to maintain the infrastructure of our group. “What kind of people like me?” – that is the question you are probably asking yourself now.
The answer is simple: people who like to watch highly controversial and, shall we say, unconventional pornography on the internet that most normal people would consider perverted. But not you!
In order to leave you without any doubts, I'll explain how I found it out. Two months ago, my colleagues and I installed spyware software on your computer and then gained access to all of your devices, including your phone. It was easy – one of those many pop-ups on porn sites was our work.
By the way, here is your email password on hacking moment: [EMAIL PASSWORD]
I think you already understand that we would not write to an ordinary man who watches “vanilla” and even hardcore porn – there is nothing special about that. But the things you're watching are beyond good and evil. So after accessing your phone and computer cameras, we recorded you masturbating to extremely controversial videos. There is a close-up footage of you and a little square on the right with the videos you're pleasing yourself. However, as I said earlier, there is always a way out, because even the most degraded sinner deserves leniency. You are lucky today because I am not a sadist who enjoys other people's suffering. Only money matters to me.
Here is your salvation: you must transfer $1240 in Bitcoin to this BTC cryptocurrency wallet: 1MwQ86ozgvhQuQehh6Xx1uBJuBqvGnWMcn
You have exactly 48 hours to make the payment, so think less, and do more. As soon as I receive confirmation of the transaction, I will delete all compromising content and permanently disable our computer worm. Believe me, I always abide by gentleman's agreements. Even with people who are hardly gentlemen. Because it's nothing personal, just business.
If I do not receive a payment, I will send all videos of you to every person in your contact list, messengers and email. Relatives, loved ones, colleagues, friends-everyone you've ever been in contact with will receive them. You understand perfectly well that you will never be able to wash this stain on your reputation. Everyone will remember you as sick as fuck. Your life will be completely ruined, and, most likely, only a tightened noose around your neck will be able to save the day.
If you haven't dealt with crypto before, I suppose it won't be difficult for you to figure it all out. Simply type in the “crypto exchange” into the search bar and pay with a credit card. Besides, based on your browser history, you are a savvy user. When you want to, you can dig into the darkest depths of the Internet, so I'm sure you will be able to find out what is what.
Here is what my colleagues and I should warn you against: …Do not reply to this email. Do you really think we are so stupid to be tracked by an email address? This is a temporary disposable email. As soon as I clicked “Send”, it was gone for good. …Forget about law-enforcement authorities. As soon as I see that you are trying to contact them, the compromising material will be published. Remember, I have access to all your devices, and I can even track your movements. …Do not reset your devices to factory settings and do not try to get rid of your devices. It won't help in any way. Look above – my All-seeing eye is watching all your actions. It is easy to hunt you down.
I am sorry that we met in such circumstances. Probably, everything could be different if you had been more careful about what you are doing on the Internet. Watch yourself from now on, because even such things that you previously considered insignificant can destroy your life in the future like a butterfly effect. I hope this is goodbye forever. However, it depends on you.
P.S. The countdown is on. The choice is yours.
The opening line, “Hello, You are in big trouble,” is designed to immediately capture the recipient's attention and induce panic. This sets the stage for the scammer's demands and makes the victim more susceptible to manipulation.
One common technique used in these scams is the creation of an imaginary, powerful adversary. In this case, the scammers claim to be part of an “international group of hackers” that is more formidable than well-known hacker groups like Anonymous. This exaggeration aims to make the threat seem more credible and overwhelming, increasing the victim's sense of vulnerability.
The scammers also exploit the victim's fear of shame and social embarrassment. They claim to have accessed the victim's computer and recorded compromising footage of them. By mentioning specific details, such as an old email password, they attempt to add legitimacy to their claims. The idea of having intimate and private moments exposed to friends, family, and colleagues is a powerful motivator for many victims, who may feel desperate to prevent this imagined scenario from becoming a reality.
In addition to shame, scammers use time pressure to compel their victims to act quickly. The email gives a strict deadline of 48 hours to transfer the demanded amount in Bitcoin. This urgency is intended to prevent the victim from thinking rationally, seeking advice, or contacting authorities. The shorter the time frame, the less likely the victim is to scrutinize the claims and more likely to comply with the demands out of fear.
Scammers also employ a tone of authority and control throughout the email. They warn the recipient against seeking help or trying to outsmart them, claiming they can monitor all actions and communications. This tactic reinforces the idea that resistance is futile and that the victim's only option is to comply. The use of technical jargon and references to hacking methods further intimidates the recipient, making the scam appear more sophisticated than it actually is.
Ultimately, these manipulation techniques are designed to prey on human emotions, such as fear, shame, and panic. By crafting a scenario that feels personal and urgent, scammers increase their chances of coercing victims into paying large sums of money.
Why am I receiving this email and how did they find out my email password?
You are receiving this email because scammers have targeted you in a widespread sextortion scam. These emails are often sent in bulk to many recipients, hoping that a few will fall for the threats. The password they provide is usually outdated and obtained from previous data breaches where large amounts of personal data, including email addresses and passwords, were leaked. Scammers use this information to make their threats seem more credible. If you want to check whether your email or password has been compromised, use free resources such as “Have I Been Pwned.”
While the email may seem personal and specific, it is a common tactic used by cybercriminals to exploit your fear and urgency. They do not actually have access to your computer or any compromising footage. Instead, they rely on the shock value of revealing an old password to create a false sense of legitimacy.
What to do after receiving “Hello, You are in big trouble” email?
- Do not panic
Remember, these emails are designed to create fear and urgency. Stay calm and do not respond to the email or make any payments. - Verify the claims
The likelihood that your system is actually infected is very low. These scammers usually do not have any real access to your devices. They rely on fear and intimidation rather than actual hacking. - Scan for malware
To be safe, use reputable anti-malware software such as SpyHunter 5Combo Cleaner or Malwarebytes to scan your computer for any malware or spyware. These tools can help identify and remove any potential threats. - Change your passwords
Even though the password they provided is likely outdated, it's a good practice to update your passwords. Ensure that you use strong, unique passwords for each of your accounts, and consider using a password manager to keep track of them. - Enable Two-factor authentication
Add an extra layer of security to your online accounts by enabling two-factor authentication (2FA). This makes it harder for scammers to access your accounts even if they have your password. - Report the email
Report the scam email to your email provider. Most email services have options to mark emails as phishing or spam, which helps improve filters and protects other users.
By following these steps, you can protect yourself from falling victim to sextortion scams and keep your personal information secure.
How to prevent from getting malware
Protect your privacy – employ a VPN
There are several ways how to make your online time more private – you can access an incognito tab. However, there is no secret that even in this mode, you are tracked for advertising purposes. There is a way to add an extra layer of protection and create a completely anonymous web browsing practice with the help of Private Internet Access VPN. This software reroutes traffic through different servers, thus leaving your IP address and geolocation in disguise. Besides, it is based on a strict no-log policy, meaning that no data will be recorded, leaked, and available for both first and third parties. The combination of a secure web browser and Private Internet Access VPN will let you browse the Internet without a feeling of being spied or targeted by criminals.
No backups? No problem. Use a data recovery tool
If you wonder how data loss can occur, you should not look any further for answers – human errors, malware attacks, hardware failures, power cuts, natural disasters, or even simple negligence. In some cases, lost files are extremely important, and many straight out panic when such an unfortunate course of events happen. Due to this, you should always ensure that you prepare proper data backups on a regular basis.
If you were caught by surprise and did not have any backups to restore your files from, not everything is lost. Data Recovery Pro is one of the leading file recovery solutions you can find on the market – it is likely to restore even lost emails or data located on an external device.