"I'll Begin With The Most Important" removal guide
What is "I'll Begin With The Most Important"?
Scammers use the "I'll Begin With The Most Important" deceptive email to blackmail people. The main purpose of this scam is to trick victims into paying a ransom to cyber criminals. They claim that they have recorded a compromising video of the recipient and will proliferate it unless the ransom payment is transferred to a Bitcoin wallet address provided. There are many similar spam campaigns spread via the internet, and none should be trusted.
According to this email, cyber criminals have hacked the recipient's computer and obtained access to all accounts, including email. To send this email, they use the so-called "spoofing" method, which allows them to falsify the sender's email address. In this case, they use the recipient's email address, thus making it seem as if the email was sent by the recipient. This does not mean that they have hacked the email account. Scammers behind this scam also claim that they have infected the computer with a Trojan. They state that this happened when the recipient was visiting an adult website (on which they planted the infection). They claim that the Trojan worked as remote access tool and allowed cyber criminals to access the webcam and microphone, and to obtain contacts lists from social networks and messengers. The main threat is that they claim they have recorded the screen when the user was watching an adult video, and also recorded a video of the user watching the video (via the webcam). Scammers demand payment of $700 using the Bitcoin wallet provided, otherwise they threaten to send the video to all of the recipient's contacts. They also promise to delete the video (and not proliferate it) if their demands are met. Do not believe any statements made by the "I'll Begin With The Most Important" email scam. Cyber criminals send these emails to many people hoping that a percentage will fall for the scam and pay to prevent distribution of videos that do not actually exist. Unfortunately, sometimes they succeed. The best option is to ignore these emails and simply delete them.
There are many spam campaigns of this type, such as "I Know * Is One Of Your Pass", "Yоu May Not Know Mе", and "Wе Arе Nоt Going To Steal A Lot Of Time". Most are used to trick people into paying ransoms to cyber criminals. Other spam campaigns are used by cyber criminals to infect computers with high-risk infections such as LokiBot, TrickBot, Emotet, AZORult, Adwind, and others. They achieve this by sending emails that contain attachments such as Microsoft Office documents, archive files, executable files, PDF's and so on. The main purpose of these emails is to provoke recipients into opening the attachment, which results in download and installation of malware. The computer infections that they proliferate using these emails are used to extract (steal) details such as logins, passwords, banking information and so on. Therefore, these malicious programs can cause financial loss, various privacy/browsing safety problems, and so on. Some infect computers with other malicious programs such as ransomware.
We receive a great deal of feedback from concerned users about this scam email. Here is the most popular question we receive:
Q: Hi pcrisk.com team, I received an email stating that my computer was hacked and they have a video of me. Now they are asking for a ransom in Bitcoins. I think this must be true because they listed my real name and password in the email. What should I do?
A: Do not worry about this email. Neither hackers nor cyber criminals have infiltrated/hacked your computer and there is no video of you watching pornography. Simply ignore the message and do not send any Bitcoins. Your email, name, and password was probably stolen from a compromised website such as Yahoo (these website breaches are common). If you are concerned, you can check if your accounts have been compromised by visiting the haveibeenpwned website.
How do spam campaigns infect computers?
Cyber criminals infect computers only if they succeed in tricking people into opening attachments within the emails they send. Therefore, these scam campaigns cannot harm computers without users first opening the attachments. For instance, if the attached file is a Microsoft Office document, it will demand permission to enable macro commands. Once enabled, the malicious MS Office document will download and install a computer infection. All malicious files need to be executed in some way before they can do any damage.
How to avoid installation of malware?
If the attached file (or entire email) seems irrelevant or is received from a suspicious, unknown email address, keep it unopened. Do not open or download attachments without studying them. Third party software downloaders, installers, and other similar (dubious) sources should not be used to download or install software. Many tools of this type are monetized by distributing rogue apps that might cause computer infections. We recommend that you install and download software carefully. Do not miss any available "Custom", "Advanced" settings of any download/installation set-up, deselect offers to install unwanted applications, and only then finish the process. The safest way to update installed software is using implemented functions or tools provided by official software developers. Other third party updaters might cause installation of malicious software rather than the updates/improvements. If you are using MS Office, use versions no earlier than 2010. Later versions include "Protected View" mode that prevents untrustworthy attachments from downloading and installing computer infections. Finally, do not use software cracking tools, since cyber criminals use them to proliferate computer infections. Furthermore, they often install malicious programs rather than illegally activating paid software (which is a cyber crime). If you have already opened malicious attachments, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
Text presented in the "I'll Begin With The Most Important" email message:
Subject: Security Notice. Someone have access to you system.
I'll begin with the most important.
I hacked your device and then got access to all your accounts... Including *************.
It is easy to check - I wrote you this email from your account.
Also I have an old password for the hacking day: ******
Moreover, I know your intim secret, and I have proof of this.
You do not know me personally, and no one paid me to check you.
It is just a coincidence that I discovered your mistake.
In fact, I posted a malicious code (exploit) to an adult site, and you visited this site...
While watching a video Trojan virus has been installed on your device through an exploit.
This darknet software working as RDP (remote-controlled desktop), which has a keylogger,
which gave me access to your microphone and webcam.
Soon after, my software received all your contacts from your messenger, social network and email.
At that moment I spent much more time than I should have.
I studied your love life and created a good video series.
The first part shows the video that you watched,
and the second part shows the video clip taken from your webcam (you are doing inappropriate things).
Honestly, I want to forget all the information about you and allow you to continue your daily life.
And I will give you two suitable options. Both are easy to do.
First option: you ignore this email.
The second option: you pay me $700(USD).
Let's look at 2 options in detail.
The first option is to ignore this email.
Let me tell you what happens if you choose this path.
I will send your video to your contacts, including family members, colleagues, etc.
This does not protect you from the humiliation that you and
your family need to know when friends and family members know about your unpleasant details.
The second option is to pay me. We will call this "privacy advice."
Now let me tell you what happens if you choose this path.
Your secret is your secret. I immediately destroy the video.
You continue your life as if none of this has happened.
Now you might think: "I'll call to police!"
Undoubtedly, I have taken steps to ensure that this letter cannot be traced to me,
and it will not remain aloof from the evidence of the destruction of your daily life.
I don't want to steal all your savings.
I just want to get compensation for my efforts that I put in to investigate you.
Let us hope that you decide to create all this in full and pay me a fee for confidentiality.
You make a Bitcoin payment (if you don't know how to do it, just enter "how to buy bitcoins" in Google search)
Shipping amount: $700(USD).
Getting Bitcoin Addresses: 1FVuyuSN41aa3JN9sn8qkuD2PmaMEMHHnc
(This is sensitive, so copy and paste it carefully)
Don't tell anyone what to use bitcoins for. The procedure for obtaining bitcoins can take several days, so do not wait.
I have a spetial code in Trojan, and now I know that you have read this letter.
You have 48 hours to pay.
If I don't get BitCoins, I'll send your video to your contacts, including close relatives, co-workers, and so on.
Start looking for the best excuse for friends and family before they all know.
But if I get paid, I immediately delete the video.
This is a one-time offer that is non-negotiable, so do not waste my and your time.
Time is running out.
Instant automatic removal of possible malware infections:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of possible malware infections. Download it by clicking the button below:
- What is "I'll Begin With The Most Important"?
- STEP 1. Manual removal of possible malware infections.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck the "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Spyhunter for Windows.