"I sent you an email from your account" removal guide
What is "I sent you an email from your account"?
"I sent you an email from your account" is a spam email campaign (scam) used by cyber criminals who threaten to proliferate compromising/humiliating videos of recipients if their ransom demands are not met. This is a common scam, and one of many similar versions. If you receive this email, simply ignore it and do not believe any of the statements within the message. The email is proliferated via an "email spoofing" method used to falsify the sender's email address. In this way, scammers behind this email make it seem as if the recipient of the email is also the sender.
Cyber criminals claim that they have gained full access to the recipient's email account and obtained the password. It is also stated that the computer is infected with a trojan that allows them to change the password at any time (even if the user creates a new one). According to these scammers, this trojan was installed when the recipient visited an adult website. Furthermore, they state that they are capable of controlling the recipient's computer remotely, monitor activities in real time, turn the camera and microphone on, etc. People behind the "I sent you an email from your account" scam claim that they have, at some point, recorded a compromising video that will be sent to all of the recipient's contacts, unless $780 in Bitcoins is transferred to a provided Bitcoin Wallet within 48 hours. Furthermore, they also threaten to proliferate the video if the ransom email is shared with any other party. All statements regarding recorded videos, trojan infections, stolen data, etc. are false. Scammers send these emails to thousands of people hoping that some will fall for it. Never trust this or other similar scams.
Examples of other similar spam campaigns include Looked At You For Several Months, I Am A Spyware Software Developer, and So I'm The Hacker Who Broke Your Email. Scammers who spread these emails simply attempt to trick people into paying ransoms so that they do not reveal various photos or videos (they actually do not exist). Another type of spam email campaign aims to infect recipients' computers with high-risk viruses such as TrickBot, Emotet, AZORult, Adwind, etc. These emails infect computers through attachments or links associated with Microsoft Office documents, PDF documents, archive files (ZIP, RAR, and so on), executable files, etc. Opening these attachments leads to installation of malicious programs that often spread other infections or steal personal data (banking details, various passwords, logins, and so on). Having these programs installed can lead to financial loss, privacy issues, problems with browsing safety, or computer infections with other viruses such as ransomware.
We receive a great deal of feedback from concerned users about this scam email. Here is the most popular question we receive:
Q: Hi pcrisk.com team, I received an email stating that my computer was hacked and they have a video of me. Now they are asking for a ransom in Bitcoins. I think this must be true because they listed my real name and password in the email. What should I do?
A: Do not worry about this email. Neither hackers nor cyber criminals have infiltrated/hacked your computer and there is no video of you watching pornography. Simply ignore the message and do not send any Bitcoins. Your email, name, and password was probably stolen from a compromised website such as Yahoo (these website breaches are common). If you are concerned, you can check if your accounts have been compromised by visiting haveibeenpwned website.
How do spam campaigns infect computers?
Spam email campaigns that contain malicious attachments can only affect systems when an infected attachment is opened (or executable file is executed). Therefore, these emails cannot proliferate malware without the manual intervention of the recipient. For example, if the attachment is a Microsoft Office document, it must be opened and permission to use macro commands given. Once this is done, malicious MS Office documents are able to download and install various computer infections. If the attachment is an archive file, it will probably contain an executable file that needs to be executed before it can do any harm.
How to avoid installation of malware?
If there is an email is received from an unknown/untrustworthy address or the email context seems irrelevant/does not concern you, do not open the presented link or attachment. Do not download software from dubious, unofficial websites (or other sources), using third party downloaders, peer-to-peer networks, and so on. Install/download software carefully: check all available settings or options (such as "Custom", "Manual") and deselect additionally-included apps that you do not want to download/install. Never use third party, unofficial (fake) software updaters, since these often install viruses rather than the updates. Use functions and tools provided by official software developers. Use Microsoft Office versions that are no older than 2010. Later versions have "Protected View" mode that can prevent malicious attachments from downloading various infections. If you have already opened malicious attachments, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
Text presented in the "I sent you an email from your account" email message:
Subject: You password must be need changed
As you may have noticed, I sent you an email from your account.
This means that I have full access to your account: On moment of hack your account has password: *********
You say: this is the old password!
Or: I will change my password at any time!
Yes! You're right!
But the fact is that when you change the password, my trojan always saves a new one!
I've been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks. I can also post access to all your e-mail correspondence and messengers that you use.
If you want to prevent this, transfer the amount of $780 to my bitcoin address (if you do not know how to do this, write to Google: Buy Bitcoin).
My bitcoin addresses (BTC Wallets) are: 19Q3HZtnznuB5cuWng8cacwqZV13gNpZaN, 1HPhZrmyevkNXKo1MYnZG1A65p2PtyEpqc, 18kXxMp9NuTMUFVAfXR4TFT4CrrHWVzwm4, 1PNpAXTo6jh4V9dhXRvimNYqPYjvZEnQiu, 16LBDius3vg6ufFvnc7PGXfiTZgphuZgr5, 18eBGkYam1wjz1S77jz3VmADuYYFzhA3vB, 1BPUUNghhuwQjDDvFd3TnJz2ato5dyDLr8, 1DrCbXWfTqJbaiak2wjGUQiEo1WBzCBnof, 1GEhuEajkFXVe7vhtZqy1hRLdCaguhWBC2, 19rvCcYfSwPUSvJJKNyTyRFi5vxt6zaqJC, 1KeCBKUgQDyyMpaXhfpRi2qUvyrjcsT44o
After receiving the payment, I will delete the video and you will never hear me again.
I give you 48 hours to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
Another variant of "I sent you an email from your account" email letter:
Text presented within this mail:
subject: Your account has been hacked! You need to unlock.
I know the ********, this is your password, and I sent you this message from your account.
If you have already changed your password, my malware will be intercepts it every time.
You may not know me, and you are most likely wondering why you are receiving this email, right?
In fact, I posted a malicious program on adults (pornography) of some websites, and you know that you visited these websites to enjoy
(you know what I mean).
While you were watching video clips,
my trojan started working as a RDP (remote desktop) with a keylogger that gave me access to your screen as well as a webcam.
Immediately after this, my program gathered all your contacts from messenger, social networks, and also by e-mail.
What I've done?
I made a double screen video.
The first part shows the video you watched (you have good taste, yes ... but strange for me and other normal people),
and the second part shows the recording of your webcam.
What should you do?
Well, I think $635 (USD dollars) is a fair price for our little secret.
You will make a bitcoin payment (if you don't know, look for "how to buy bitcoins" on Google).
BTC Address: 19rvCcYfSwPUSvJJKNyTyRFi5vxt6zaqJC
(This is CASE sensitive, please copy and paste it)
You have 2 days (48 hours) to pay. (I have a special code, and at the moment I know that you have read this email).
If I don't get bitcoins, I will send your video to all your contacts, including family members, colleagues, etc.
However, if I am paid, I will immediately destroy the video, and my trojan will be destruct someself.
If you want to get proof, answer "Yes!" and resend this letter to youself.
And I will definitely send your video to your any 19 contacts.
This is a non-negotiable offer, so please do not waste my personal and other people's time by replying to this email.
Instant automatic removal of possible malware infections:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of possible malware infections. Download it by clicking the button below:
- What is "I sent you an email from your account"?
- STEP 1. Manual removal of possible malware infections.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck the "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Spyhunter for Windows.