"Proof attached" removal guide
What is "Proof attached"?
"Proof attached" is the name of a spam email campaign that is categorized as a 'sextortion' scam. Generally, scams of this type are used to scare people (recipients) and trick them into believing that scammers have recorded a compromising video (or taken photos) and will proliferate the material unless recipients pay a specific sum. In summary, this scam is used to extort money from people and we strongly recommend that you ignore the emails.
There are at least two variants of this particular scam, however, their purpose is essentially identical. The emails state that the recipient has installed a program that allowed these cyber criminals to use the computer microphone and webcam. It is stated that the webcam was used to record an embarrassing video of the recipient watching a pornographic video. This program is apparently capable of stealing data such as contacts, account details, and so on. Scammers urge recipients to pay $310 within three days (or $660 within two days, depending on the version of this scam). In either case, the money must be transferred using a cryptocurrency (Bitcoin). A Bitcoin wallet address is provided in both variants. Additionally, the emails contain attachments (archive files) that contain videos, photos, text files, and so on. These files are presented as 'proof' that scammers have access to the recipient's computer, however, these archives are password protected. To open/extract these files, people must first pay. These scam emails contain web links that open Satoshibox or Cryptonator pages (as in the screenshots below) for making payments. We strongly recommend that you do not pay, since this is just another way to extort money from people.
|Name||Proof Attached Email Scam|
|Threat Type||Phishing, Scam, Social Engineering, Fraud|
|Fake Claim||Crooks claim that they have a humiliating video of the recipient "pleasuring him/her self". It is also said that they have access to recipient's personal data (contacts, certain accounts, etc.)|
|Cyber Criminal Cryptowallet Address (Bitcoin)||16fSXe21QhnmhvZskmtrWnvoRWFbAeAVG3 (cyber criminals use different cryptowallet addresses for different variants of this spam campaign).|
|Ransom Amount||$310, $660 (price depends on spam campaign's variant).|
|Symptoms||Unauthorized online purchases, changed online account passwords, identity theft, illegal access of one's computer.|
|Distribution methods||Deceptive emails, rogue online pop-up ads, search engine poisoning techniques, misspelled domains.|
|Damage||Loss of sensitive private information, monetary loss, identity theft.|
To eliminate possible malware infections our malware researchers recommend scanning your computer with Spyhunter.
We receive a great deal of feedback from concerned users about this scam email. Here is the most popular question we receive:
Q: Hi pcrisk.com team, I received an email stating that my computer was hacked and they have a video of me. Now they are asking for a ransom in Bitcoins. I think this must be true because they listed my real name and password in the email. What should I do?
A: Do not worry about this email. Neither hackers nor cyber criminals have infiltrated/hacked your computer and there is no video of you watching pornography. Simply ignore the message and do not send any Bitcoins. Your email, name, and password was probably stolen from a compromised website such as Yahoo (these website breaches are common). If you are concerned, you can check if your accounts have been compromised by visiting the haveibeenpwned website.
How do spam campaigns infect computers?
Spam campaigns used to proliferate viruses cause damage only if the attached files are opened. If the attachment is a Microsoft Office document, once opened, it will demand permission to disable "Protected View" mode. Infected MS Office files can download and install malicious programs only when this mode is disabled. Therefore, we strongly recommend that you never disable it. If the attachment is an archive file such as ZIP, RAR or other, then its contents will need to be extracted and opened, otherwise they will not be able to cause any damage. Remember, no attachment can install computer infections without first being opened.
How to avoid installation of malware?
Do not open attachments that are present in emails received from unknown or suspicious email addresses or if the email (subject) is irrelevant. The same applies to website links, since they usually lead to infected files. Avoid downloading software from unofficial websites, using Peer-to-Peer networks (eMule, torrent clients, and so on), third party downloaders and other similar sources. The safest way to download software is to use official websites and direct links. Install (or download) software with care - check "Custom", "Advanced" and other similar download or installation setup options. Opt-out of offers to install additional applications/programs and only then finish the process. Do not use third party software updaters - update software using tools or functions provided by official developers only. Do not activate paid software using 'cracking' tools, since these are illegal and are often used to proliferate computer infections. MS Office 2010 and later releases include the "Protected View" mode, which is designed to prevent downloaded malicious attachments from proliferating viruses. Therefore, we recommend that you use newer versions of MS Office. Having reputable anti-spyware or anti-virus software installed and enabled is also good prevention. If you have already opened malicious attachments, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
Text presented in the "Proof attached" email message (first variant):
Subject: Re: #68585942 You can panic ñ 07.04.2019 11:44:14
Camèra rèady,N0tificati0n: #68585942 ñ 07.04.2019
Status: Waiting for Reply 56xuTaYy5A4f98wJnMmIkM3XrT4Ey95Bu0_Priority: Norma]l
Hi there.. .
This email will not acquire a lot of time, so direct to the issue. I obtained a movie of you buffing the banana when at the pornweb site youíre stopped at, due to a good arse software program I have been able to put on several sites with that type of content.
You press play and all cameras and a mic begin their work it also will save every fucking element coming from your computer system, just like contact info, account details or crap like that, guess where i have this e-mail from?) Therefore now we all know who i am going to deliver that to, if you not necessarily gonna negotiate this with me.
I am going to place a account wallet address under for you to send me 310 usd in Three dayz maximum through bitcoin. See, it isnít that big of a total to pay, guess this tends to make me not that terrible of a guy.
Youíre welcome to try and do whatever da fuck you would like to, yet if i wonít find the total in the period of time mentioned above, clearlyÖ u by now understand what can happen.
So itís under your control now. I am not gonna undergo all the info and shit, simply donít have time for this and also you most likely know that net is filled with mail similar to this, so itís as well your decision to trust in this or not, there is only a proven way to find out.
Hereís the btc wallet address- 16fSXe21QhnmhvZskmtrWnvoRWFbAeAVG3
Password in the video >>
Come up with a new password for your email .. .
Screenshot of a second variant of "Proof attached scam":
Text presented in the second variant of "Proof attached" scam:
Subject: Case #48942113 You have been warned many times - 07/04/2019 10:57:20
Camera ready,Notificition: #48942113 - 07/04/2019
Status: Waiting for Reply 74xuNaOy8A2f21wLnBmGkG3WrC6Ry53Xu8_Priority: Norm[a]l
Hi there.. .
This email won't acquire too much of your efforts, and so straight to the issue. I obtained a video of you flogging the dolphin when at a pornpage you are visited, thanks to an incredible arse software program I've managed to put on a few web sites with that type of content.
You hit play button and all of the cams and a microphone begin their work in addition it saves every fucking element through your pc, for example contact information, account details or shit such as that, guess just where i got this email address from?) Therefore now we all know just who i will deliver that to, if you aren't gonna negotiate this along with me.
I am going to place a account wallet address down be!
low so that you can hit me 660 $ within 2 days utmost via bitcoin. See, it isn't that large of a total to pay, guess that makes me not that terrible of a person.
You are allowed to try and do what ever the shit you wish to, yet if i won't see the total within the period of time mentioned above, clearly... you already realize what will happen.
And so it is your choice right now. Now i'm not going to proceed through every detail and shit, just simply ain't got precious time for this and also you likely know that web is filled with mail such as this, therefore it is as well your decision to believe in this or not, there may be only one way to uncover.
This is the bitcoin wallet address- 1J7uHaMeKV9aoYLB5bLmTUuzYeY7Cbicvf
Password in the video >>
Come up with a new password for your!
email .. .
Cyber criminals attempt to sell the archive password via Cryptonator:
Screenshot of the files uploaded to Satoshibox:
Screenshot of the files in password-protected archive file (attachment):
Instant automatic removal of possible malware infections:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of possible malware infections. Download it by clicking the button below:
- What is "Proof attached"?
- STEP 1. Manual removal of possible malware infections.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task - usually it is best to allow antivirus or anti-malware programs to do this automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user's computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click "Options" at the top and uncheck the "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Spyhunter for Windows.