"I am a spyware software developer Email Scam" removal guide
What is "I am a spyware software developer Email Scam"?
The "I am a spyware software developer Email Scam" is a spam email campaign used to threaten people and to trick them into transferring Bitcoins. Generally, scammers claim that they have obtained compromising photos or videos of a person and threaten to proliferate the material if their demands are not met. There are many email scam campaigns similar to this on the internet. If you have received the "I am a spyware software developer Email Scam" email (or similar), there is nothing to worry about. These email scams should never be trusted or taken seriously.
The "I am a spyware software developer Email Scam" email is sent using the "email spoofing method". Therefore, it may seem as if the email was sent from the recipient's address. Scammers who use this method are able to falsify the sender's email address. The message states that a hacker/spyware developer has hacked your computer and infected it with a virus, and is thus able to monitor what you are doing on your computer (and has been doing this for some time). The scammers claim that they have access to your browsing history, various passwords, photos, videos, and so on. Furthermore, a person behind "I am a spyware software developer Email Scam" claims that he/she has recorded videos and taken photos of you while you were visiting an adult website(s). If you do not wish this material to be sent to your contacts (friends, colleagues, and so on), you are encouraged to transfer $840 in Bitcoins to a cryptocurrency wallet provided within 48 hours of reading the email. This scammer also claims that, if you do not transfer the requested cryptocurrency sum, the content will be distributed and your disk formatted (you will lose all of your data). Note that this is just one of many scam campaigns. Most of these scammers make identical threats. We recommend that you simply ignore this email scam (and all similar scams).
Some examples of other similar scam campaigns are So I'm the hacker who broke your email, I'm a programmer who cracked your email, My virus captured all your personal data etc. Most share the same purpose: to threaten people by claiming that hackers have obtained humiliating videos/photos and to make ransom demands. There are also other types of scam campaigns used to infect computers with viruses by tricking people into opening malicious attachments. The attachments are usually Microsoft Office documents, PDF, archive or executable files. Once opened, they infect computers with viruses such as TrickBot, Emotet, AZORult, Adwind, and so on. Typically, these viruses are designed to steal logins, passwords, bank account details and other sensitive or/and personal data. These infections can thus cause various privacy, financial, and other issues. Some of these viruses are designed to open "backdoors" for other viruses to infiltrate - therefore, having a computer infected with viruses of this type can lead to even more infections including, for example, ransomware.
We receive a great deal of feedback from concerned users about this scam email. Here is the most popular question we receive:
Q: Hi pcrisk.com team, I received an email stating that my computer was hacked and they have a video of me. Now they are asking for a ransom in Bitcoins. I think this must be true because they listed my real name and password in the email. What should I do?
A: Do not worry about this email. Neither hackers nor cyber criminals have infiltrated/hacked your computer and there is no video of you watching pornography. Simply ignore the message and do not send any Bitcoins. Your email, name, and password was probably stolen from a compromised website such as Yahoo (these website breaches are common). If you are concerned, you can check if your accounts have been compromised by visiting haveibeenpwned website.
How do spam campaigns infect computers?
Email scam campaigns used to infect computers through malicious email attachments (or links that lead to malicious downloads) are only successful if the attachment (or link) is opened. In some cases (if the attachment is a MS Office document), infections proliferate when permission to enable macros commands is given. In other cases, it is enough to simply open the attachment - for example, to extract an archive (rar, zip or similar), run the executable (.exe) file, and so on. In summary, as long as the attachment stays unopened, it cannot do any harm to a computer or its user.
How to avoid installation of malware?
Do not open attachments (or links) that are presented in emails received from unknown/suspicious senders without studying them first. If the email seems to be irrelevant, do not open the attachment or link (if there is one). Download software using official, trustworthy sources only. Do not use third party downloaders (such as torrents, eMule, peer-to-peer networks, and so on). Third party downloaders/installers are used to proliferate rogue applications. Check "Custom", "Advanced" and other similar settings when downloading or installing software, especially if it is free. Keep your software updated, however, use implemented functions or tools provided by the official developers only. Fake updaters usually install malware or unwanted applications rather than the promised updates. If you are using Microsoft Office, we recommend that you use MS Office 2010 or later. Newer versions have "Protected View" mode, which prevent malicious attachments from downloading/installing malware (or other unwanted software). If you have already opened malicious attachments, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
Text presented in the "I am a spyware software developer Email Scam" email message:
Subject: Account Issue. Changed password. (your password: user's password)
Dear user of -!
I am a spyware software developer.
Your account has been hacked by me in the summer of 2018.
I understand that it is hard to believe, but here is my evidence:
- I sent you this email from your account.
- Password from account user's email address: user's real password (on moment of hack).
The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2018-0296).
I went around the security system in the router, installed an exploit there.
When you went online, my exploit downloaded my malicious code (rootkit) to your device.
This is driver software, I constantly updated it, so your antivirus is silent all time.
Since then I have been following you (I can connect to your device via the VNC protocol).
That is, I can see absolutely everything that you do, view and download your files and any data to yourself.
I also have access to the camera on your device, and I periodically take photos and videos with you.
At the moment, I have harvested a solid dirt... on you...
I saved all your email and chats from your messangers. I also saved the entire history of the sites you visit.
I note that it is useless to change the passwords. My malware update passwords from your accounts every times.
I know what you like hard funs (adult sites).
Oh, yes .. I'm know your secret life, which you are hiding from everyone.
Oh my God, what are your like... I saw THIS ... Oh, you dirty naughty person ... :)
I took photos and videos of your most passionate funs with adult content, and synchronized them in real time with the image of your camera.
Believe it turned out very high quality!
So, to the business!
I'm sure you don't want to show these files and visiting history to all your contacts.
Transfer $840 to my Bitcoin cryptocurrency wallet: 1Bt4psBJmjfVTcW6eYiJZ6HEbpFgKkBSX4, 19qL8vdRtk5xJcGNVk3WruuSyitVfSAy7f, 1GXazHVQUdJEtpe62UFozFibPa8ToDoUn3, 1A4ffsLWPYC8n7Dq4s4aiY5mzG4szuHx3M, 1122NYbAT2KkZDZ5TFvGy4D2Ut7eYfx4en, 13phdoBirrAtFXKWJQ9HgTYX9b7C2MqXPE, 1Q35Tr3ccKWVJjt3yXDuFFD7FRnqCx2UxU, 17EuB8AmyBm81FgCovdr6huCCoSzv2S7nP, 14VbGhtysr6wrNs7EhdKiS2NoMmMDBM8cn, 1EFBBqVxZ4H71TJXJDD7KNPpWMs35kTdVw, 1971pHPgLaTmuYtoH4BsGSfFMZaAjotium, 1DyDnmFR8KPMdWocDobtYMxSKTNBKsZZdV, 1H2fPTBpvm5tyHqoxTpRy5pYo2qXMbs9to, 1KmsJLvvrXwfgBwwuN1Q31stKrLY9UX9JY, 1K8TqsB2C1iY8qdGqhnHfgen3uE8GBU7c8, 17B1uYtf1D6vuMgyXxEMFjzXkcv6YCWTbt, 14XMwrqXdhz6YnShUuW37dTrKmpMFbJDHL, 1AU8PEZ4E1DwRdixPDZuNLEGCu8skyQSwi
Just copy and paste the wallet number when transferring.
If you do not know how to do this - ask Google.
My system automatically recognizes the translation.
As soon as the specified amount is received, all your data will be destroyed from my server, and the rootkit will be automatically removed from your system.
Do not worry, I really will delete everything, since I am working with many people who have fallen into your position.
You will only have to inform your provider about the vulnerabilities in the router so that other hackers will not use it.
Since opening this letter you have 48 hours.
If funds not will be received, after the specified time has elapsed, the disk of your device will be formatted,
and from my server will automatically send email and sms to all your contacts with compromising material.
I advise you to remain prudent and not engage in nonsense (all files on my server).
Instant automatic removal of possible malware infections:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of possible malware infections. Download it by clicking the button below:
- What is "I am a spyware software developer Email Scam"?
- STEP 1. Manual removal of possible malware infections.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Spyhunter for Windows.