“Hello, You are in big trouble” email scam (fake) - Free Instructions

“Hello, You are in big trouble” email scam Removal Guide

What is “Hello, You are in big trouble” email scam?

“Hello, You are in big trouble” is a fake email that attempts to scare you into paying over $1k in Bitcoin

"Hello, You are in big trouble" scam

“Hello, You are in big trouble” is an alarming phrase that is the opening line of a new wave of email scams targeting unsuspecting individuals. These scams, known as sextortion, involve cybercriminals claiming to have compromising information about the recipient. They demand payment to prevent this supposed information from being shared with friends, family, and colleagues.

In these emails, the scammers assert that the victim is “now on the radar of an international group of hackers.” They use fear and urgency to manipulate the recipient into complying with their demands. Understanding how these scams work and knowing how to respond is crucial for protecting yourself from becoming a victim.

If you have received “Hello, You are in big trouble” scam email, you should not make any attempts to contact the email author, and neither should you transfer any money. We will explain everything in detail below.

Name “Hello, You are in big trouble” or “You are now on the radar of an international group of hackers”
Type Email scam, fraud, fake email, sextortion
Distribution Malspam – the attackers send thousands of emails in bulk to extort money from unsuspecting users
Operation The operator claims that the target was filmed while using porn sites and threatening to release the material publically
Ransom size $1,240 to be transferred to a specified Bitcoin crypto-wallet
Dangers Financial losses, malware infections
Similar scams Your personal data has leaked due to suspected harmful activities,” “Have you heard about Pegasus,” “Security Status not satisfied
Removal Make sure you scan your system with security software SpyHunter 5Combo Cleaner to ensure no malicious software is present
Other tips
  • Use FortectIntego to clear your browser caches and browsing history automatically
  • Change all your passwords
  • Contact your bank and explain the situation – you should be advised on what to do next to ensure your security
  • Report the incident to your local cybersecurity authority

Crooks behind the email attempt to manipulate victims' emotions

Scammers employ a variety of manipulation techniques to create fear and urgency in their victims. The email provided serves as a prime example of these tactics. Here's the full message you might receive:

Hello, You are in big trouble. However, don't panic right away. Listen to me first, because there is always a way out.

You are now on the radar of an international group of hackers, and such things never end well for anyone. I'm sure you've heard of Anonymous. Well, compared to us, they are a bunch of schoolboys. We are a worldwide network of several thousand professionals, each with their own role.

Someone hacks corporate and government networks, someone cooperates with intelligence agencies on the most delicate tasks, and someone (including me) deals with people like you to maintain the infrastructure of our group. “What kind of people like me?” – that is the question you are probably asking yourself now.

The answer is simple: people who like to watch highly controversial and, shall we say, unconventional pornography on the internet that most normal people would consider perverted. But not you!

In order to leave you without any doubts, I'll explain how I found it out. Two months ago, my colleagues and I installed spyware software on your computer and then gained access to all of your devices, including your phone. It was easy – one of those many pop-ups on porn sites was our work.

By the way, here is your email password on hacking moment: [EMAIL PASSWORD]

I think you already understand that we would not write to an ordinary man who watches “vanilla” and even hardcore porn – there is nothing special about that. But the things you're watching are beyond good and evil. So after accessing your phone and computer cameras, we recorded you masturbating to extremely controversial videos. There is a close-up footage of you and a little square on the right with the videos you're pleasing yourself. However, as I said earlier, there is always a way out, because even the most degraded sinner deserves leniency. You are lucky today because I am not a sadist who enjoys other people's suffering. Only money matters to me.

Here is your salvation: you must transfer $1240 in Bitcoin to this BTC cryptocurrency wallet: 1MwQ86ozgvhQuQehh6Xx1uBJuBqvGnWMcn

You have exactly 48 hours to make the payment, so think less, and do more. As soon as I receive confirmation of the transaction, I will delete all compromising content and permanently disable our computer worm. Believe me, I always abide by gentleman's agreements. Even with people who are hardly gentlemen. Because it's nothing personal, just business.

If I do not receive a payment, I will send all videos of you to every person in your contact list, messengers and email. Relatives, loved ones, colleagues, friends-everyone you've ever been in contact with will receive them. You understand perfectly well that you will never be able to wash this stain on your reputation. Everyone will remember you as sick as fuck. Your life will be completely ruined, and, most likely, only a tightened noose around your neck will be able to save the day.

If you haven't dealt with crypto before, I suppose it won't be difficult for you to figure it all out. Simply type in the “crypto exchange” into the search bar and pay with a credit card. Besides, based on your browser history, you are a savvy user. When you want to, you can dig into the darkest depths of the Internet, so I'm sure you will be able to find out what is what.

Here is what my colleagues and I should warn you against: …Do not reply to this email. Do you really think we are so stupid to be tracked by an email address? This is a temporary disposable email. As soon as I clicked “Send”, it was gone for good. …Forget about law-enforcement authorities. As soon as I see that you are trying to contact them, the compromising material will be published. Remember, I have access to all your devices, and I can even track your movements. …Do not reset your devices to factory settings and do not try to get rid of your devices. It won't help in any way. Look above – my All-seeing eye is watching all your actions. It is easy to hunt you down.

I am sorry that we met in such circumstances. Probably, everything could be different if you had been more careful about what you are doing on the Internet. Watch yourself from now on, because even such things that you previously considered insignificant can destroy your life in the future like a butterfly effect. I hope this is goodbye forever. However, it depends on you.

P.S. The countdown is on. The choice is yours.

The opening line, “Hello, You are in big trouble,” is designed to immediately capture the recipient's attention and induce panic. This sets the stage for the scammer's demands and makes the victim more susceptible to manipulation.

One common technique used in these scams is the creation of an imaginary, powerful adversary. In this case, the scammers claim to be part of an “international group of hackers” that is more formidable than well-known hacker groups like Anonymous. This exaggeration aims to make the threat seem more credible and overwhelming, increasing the victim's sense of vulnerability.

"You are now on the radar of an international group of hackers" scam

The scammers also exploit the victim's fear of shame and social embarrassment. They claim to have accessed the victim's computer and recorded compromising footage of them. By mentioning specific details, such as an old email password, they attempt to add legitimacy to their claims. The idea of having intimate and private moments exposed to friends, family, and colleagues is a powerful motivator for many victims, who may feel desperate to prevent this imagined scenario from becoming a reality.

In addition to shame, scammers use time pressure to compel their victims to act quickly. The email gives a strict deadline of 48 hours to transfer the demanded amount in Bitcoin. This urgency is intended to prevent the victim from thinking rationally, seeking advice, or contacting authorities. The shorter the time frame, the less likely the victim is to scrutinize the claims and more likely to comply with the demands out of fear.

Scammers also employ a tone of authority and control throughout the email. They warn the recipient against seeking help or trying to outsmart them, claiming they can monitor all actions and communications. This tactic reinforces the idea that resistance is futile and that the victim's only option is to comply. The use of technical jargon and references to hacking methods further intimidates the recipient, making the scam appear more sophisticated than it actually is.

Ultimately, these manipulation techniques are designed to prey on human emotions, such as fear, shame, and panic. By crafting a scenario that feels personal and urgent, scammers increase their chances of coercing victims into paying large sums of money.

Why am I receiving this email and how did they find out my email password?

You are receiving this email because scammers have targeted you in a widespread sextortion scam. These emails are often sent in bulk to many recipients, hoping that a few will fall for the threats. The password they provide is usually outdated and obtained from previous data breaches where large amounts of personal data, including email addresses and passwords, were leaked. Scammers use this information to make their threats seem more credible. If you want to check whether your email or password has been compromised, use free resources such as “Have I Been Pwned.”

While the email may seem personal and specific, it is a common tactic used by cybercriminals to exploit your fear and urgency. They do not actually have access to your computer or any compromising footage. Instead, they rely on the shock value of revealing an old password to create a false sense of legitimacy.

What to do after receiving “Hello, You are in big trouble” email?

  1. Do not panic
    Remember, these emails are designed to create fear and urgency. Stay calm and do not respond to the email or make any payments.
  2. Verify the claims
    The likelihood that your system is actually infected is very low. These scammers usually do not have any real access to your devices. They rely on fear and intimidation rather than actual hacking.
  3. Scan for malware
    To be safe, use reputable anti-malware software such as SpyHunter 5Combo Cleaner or Malwarebytes to scan your computer for any malware or spyware. These tools can help identify and remove any potential threats.
  4. Change your passwords
    Even though the password they provided is likely outdated, it's a good practice to update your passwords. Ensure that you use strong, unique passwords for each of your accounts, and consider using a password manager to keep track of them.
  5. Enable Two-factor authentication
    Add an extra layer of security to your online accounts by enabling two-factor authentication (2FA). This makes it harder for scammers to access your accounts even if they have your password.
  6. Report the email
    Report the scam email to your email provider. Most email services have options to mark emails as phishing or spam, which helps improve filters and protects other users.

By following these steps, you can protect yourself from falling victim to sextortion scams and keep your personal information secure.

Offer
do it now!
Download
Fortect Happiness
Guarantee
Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

How to prevent from getting malware

Protect your privacy – employ a VPN

There are several ways how to make your online time more private – you can access an incognito tab. However, there is no secret that even in this mode, you are tracked for advertising purposes. There is a way to add an extra layer of protection and create a completely anonymous web browsing practice with the help of Private Internet Access VPN. This software reroutes traffic through different servers, thus leaving your IP address and geolocation in disguise. Besides, it is based on a strict no-log policy, meaning that no data will be recorded, leaked, and available for both first and third parties. The combination of a secure web browser and Private Internet Access VPN will let you browse the Internet without a feeling of being spied or targeted by criminals. 

No backups? No problem. Use a data recovery tool

If you wonder how data loss can occur, you should not look any further for answers – human errors, malware attacks, hardware failures, power cuts, natural disasters, or even simple negligence. In some cases, lost files are extremely important, and many straight out panic when such an unfortunate course of events happen. Due to this, you should always ensure that you prepare proper data backups on a regular basis.

If you were caught by surprise and did not have any backups to restore your files from, not everything is lost. Data Recovery Pro is one of the leading file recovery solutions you can find on the market – it is likely to restore even lost emails or data located on an external device.

About the author
Lucia Danes
Lucia Danes - Virus researcher

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Lucia Danes
About the company Esolutions