"Remote control Desktop with a key logger Email Scam" removal guide
What is "Remote control Desktop with a key logger Email Scam"?
"Remote control Desktop with a key logger Email Scam" is a spam campaign designed to blackmail users who receive the associated malicious emails. Cyber criminals send an email message stating that the user's computer has been infected with malware, in this case a Remote Control (Remote Access Tool) with a 'key logger', and if the required ransom is not paid, they will proliferate an embarrassing video. If you receive this email, do not worry - this is simply a scam used to trick people into paying cyber criminals.
The cyber criminals who send this email state that the user has visited a pornography website, and by watching a certain video/s, a remote access tool was been enabled on the computer that provided access to the screen and webcam. This message also states that the remote access tool gave cyber criminals access to Messenger contacts, social networks, and email accounts. It is stated that if the user ignores this email, the criminals will send the supposedly embarrassing video to everyone in the contacts list. To avoid these consequences, users are encouraged to pay a ransom of $3000 in Bitcoins within 48 hours. This might seem threatening, but if you receive this message, there is no such video and your computer has not been infected with malware (at least not relating to this email). Your computer is safe and there is likely to be no breach of privacy. Many users receive this email (probably thousands). We strongly recommend that you simply ignore this scam.
|Name||Remote Control Desktop With A Key Logger Email Scam|
|Threat Type||Phishing, Scam, Social Engineering, Fraud|
|Symptoms||Unauthorized online purchases, changed online account passwords, identity theft, illegal access of one's computer.|
|Distribution methods||Deceptive emails, rogue online pop-up ads, search engine poisoning techniques, misspelled domains.|
|Damage||Loss of sensitive private information, monetary loss, identity theft.|
To eliminate possible malware infections our malware researchers recommend scanning your computer with Spyhunter.
There are many spam campaigns similar to "Remote control Desktop with a key logger Email Scam" (for example, eFax, Important Documents IRS, You Have A Santander Secure, and HM Revenue & Customs Outstanding Amount). Not all scam campaigns make ransom demands. Other campaigns usually trick users into downloading and opening malicious email attachments (fake bills, invoices, etc.), in most cases, Microsoft Office documents. We strongly recommend that you do not open or download any of these files. Once opened, they download and install high-risk viruses (such as TrickBot, Adwind, FormBook, and other similar viruses). These usually perform actions that result in serious privacy and browsing safety issues. They gather sensitive data such as banking details, social media accounts, logins, passwords, etc. It is also possible that some of these viruses open "backdoors" that grant permissions to proliferate other infections (for example, ransomware-type viruses). These infections might cause financial and data loss, privacy/browsing safety issues, or even more serious problems such as identity theft.
We receive a great deal of feedback from concerned users about this email scam. Here are the most popular questions:
Q. Hi pcrisk.com team, I received an email stating that my computer was hacked and they have a video of me. Now they are asking for a ransom in Bitcoins. I assume this must be true because they listed my real name and password within the email. What should I do?
A. Do not worry about this message. Neither hackers nor cyber criminals have infiltrated/hacked your computer, and there is no video of you watching pornography. The most important thing is to simply ignore this message and do not send any Bitcoins. They probably obtained your email address, name, and password, by stealing it from a compromised website such as Yahoo - such website breaches are common. If required, you can check if any of your accounts are compromised by visiting the haveibeenpwned website.
How do spam campaigns infect computers?
Generally, spam email campaigns are used to proliferate malicious attachments - in most cases, Microsoft Office files (.doc, .ppt and .xls, and so on). To execute certain commands that download and install malware, users are asked to enable macro commands. This technique is only effective for syber criminals when attachments are opened with Microsoft Office applications such as Word, Excel, etc. If the malicious attachment is opened using other software (not MS Office), the malicious files will not be downloaded. In summary, this type of malicious attachment (via email campaigns) targets Windows users only.
How to avoid installation of malware?
Downloading, update, and install software with care. Study each email received, especially any included attachments. If the attached file has been received from an unknown/untrustworthy email address/sender, or it seems like an irrelevant message or attachment, do not open it. Bear in mind that most rogue programs/applications are also distributed using fake updaters and a deceptive marketing method called "bundling". Bundling is stealth installation of deceptive applications with regular, third party software. It is important to keep installed software updated, but use implemented functions or tools provided by the official developer only. Furthermore, avoid using third party download/installation tools, since developers monetize this software by "bundling" (promoting) rogue software. Download software using official sources and direct download links only. Having a legitimate anti-virus/anti-spyware suite installed and running at all times is also very important. Microsoft Office 2010 or later has a "Protected View" mode that prevents malicious attachments from downloading viruses. Therefore, use more recent versions of MS Office. If you have already opened malicious attachments, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
Text presented in the "Remote control Desktop with a key logger Email Scam" email message:
I am aware - one of your passphrases. Lets get right to the purpose. No-one has compensated me to investigate you. You may not know me and you are most likely thinking why you are getting this e mail?
actually, i actually setup a malware on the adult streaming (adult porn) web site and you know what, you visited this web site to have fun (you know what i mean). When you were viewing videos, your web browser started out functioning as a Remote control Desktop having a key logger which provided me accessibility to your screen as well as web cam. after that, my software collected your complete contacts from your Messenger, social networks, and e-mailaccount. and then i created a double-screen video. First part shows the video you were watching (you've got a good taste haha . . .), and second part shows the view of your webcam, & its u.
You get 2 alternatives. We are going to study the options in details:
Very first alternative is to dismiss this email message. in this instance, i most certainly will send your very own video to every bit of your personal contacts and thus imagine about the awkwardness that you receive. and consequently if you happen to be in an intimate relationship, precisely how it will certainly affect?
Number two option is to compensate me $3000. Let us describe it as a donation. Consequently, i most certainly will straight away eliminate your video recording. You could continue your way of life like this never took place and you never will hear back again from me.
You will make the payment via Bitcoin (if you don't know this, search for 'how to buy bitcoin' in Google).
BTC address: 1FqqHxaLvW1fsng92qP1N6NhNT23wzeMsg
[CaSe-sensitive, copy & paste it]
in case you are looking at going to the cops, very well, this e-mail can not be traced back to me. I have taken care of my steps. i am not attempting to charge a fee a lot, i wish to be rewarded. You have 48 hours in order to make the payment. i have a unique pixel within this email message, and right now i know that you have read through this message. if i do not receive the BitCoins, i will definately send your video to all of your contacts including close relatives, co-workers, etc. Nevertheless, if i do get paid, i will erase the recording right away. it's a non:negotiable offer, so do not waste mine time and yours by replying to this mail. if you want to have evidence, reply with Yea! and i will certainly send out your video recording to your 10 friends.
Instant automatic removal of possible malware infections:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of possible malware infections. Download it by clicking the button below:
- What is "Remote control Desktop with a key logger Email Scam"?
- STEP 1. Manual removal of possible malware infections.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck the "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Spyhunter for Windows.