"Proof attached" removal guide
What is "Proof attached"?
"Proof attached" is a name of an email spam campaign that is categorized as sextortion scam. As a rule, scams of this type are used to scare people (recipients), to trick them into thinking that scammers have recorded an embarrassing video (or taken photos) and will spread it if recipients will not send them a particular amount of money. Simply said, this is a scam that is used to swindle people out of their money, we strongly recommend to ignore emails of this type.
There are at least two variants of this particular scam, however, them main point is basically the same. These emails say that a recipient has installed some program that allowed these cyber criminals to use a computer's microphone and webcam. It is stated that the webcam was used to record an embarrassing video of a recipient watching some pornography video. Besides, it says that this program is capable of stealing data such as contacts, some account details and so on. Scammers urge recipients to send them $310 in three days (or $660 in two days, depending on the version of this scam). One way or another, the money must be transferred using cryptocurrency (Bitcoin). There is a Bitcoin wallet address provided in both variants. Additionally, their emails contain attachments (archive files) that contain some videos, photos, text files and so on. These files are presented as a proof that scammers have access to a recipient's computer. However, these archives are password protected. In order to open/extract any of these files, people have to pay for it first. These scam emails contain web links that open either Satoshibox or Cryptonator pages (as in screenshots below) that should be used to make a payment. We strongly recommend not to pay for it, this is just another way to extract money from people.
|Name||Proof Attached Email Scam|
|Threat Type||Phishing, Scam, Social Engineering, Fraud|
|Fake Claim||Crooks claim that they have a humiliating video of the recipient "pleasuring him/her self". It is also said that they have access to recipient's personal data (contacts, certain accounts, etc.)|
|Cyber Criminal Cryptowallet Address (Bitcoin)||16fSXe21QhnmhvZskmtrWnvoRWFbAeAVG3 (cyber criminals use different cryptowallet addresses for different variants of this spam campaign).|
|Ransom Amount||$310, $660 (price depends on spam campaign's variant).|
|Symptoms||Unauthorized online purchases, changed online account passwords, identity theft, illegal access of one's computer.|
|Distribution methods||Deceptive emails, rogue online pop-up ads, search engine poisoning techniques, misspelled domains.|
|Damage||Loss of sensitive private information, monetary loss, identity theft.|
To eliminate possible malware infections our malware researchers recommend scanning your computer with Spyhunter.
We receive a great deal of feedback from concerned users about this scam email. Here is the most popular question we receive:
Q: Hi pcrisk.com team, I received an email stating that my computer was hacked and they have a video of me. Now they are asking for a ransom in Bitcoins. I think this must be true because they listed my real name and password in the email. What should I do?
A: Do not worry about this email. Neither hackers nor cyber criminals have infiltrated/hacked your computer and there is no video of you watching pornography. Simply ignore the message and do not send any Bitcoins. Your email, name, and password was probably stolen from a compromised website such as Yahoo (these website breaches are common). If you are concerned, you can check if your accounts have been compromised by visiting the haveibeenpwned website.
How do spam campaigns infect computers?
Spam campaigns that are used to spread viruses cause damage only if the attached files are opened. If the attachment is a Microsoft Office document, once opened, it will ask for a permission to disable "Protected View" mode. Infected MS Office files can download and install malicious programs only when this mode is disabled. Therefore, we strongly recommend not to disable it. If the attachment is some archive file like ZIP, RAR or other, then its contents will need to be extracted and opened, otherwise they will not be able to cause any damage. No matter what is the attachment, it cannot install computer infections without being opened.
How to avoid installation of malware?
Do not open attachments that are present in emails received from unknown or suspicious email addresses, or/and if the email (its subject) is irrelevant. Same applies to website links, they usually lead to infected files. Avoid downloading software from unofficial websites, using Peer-to-Peer networks (like eMule, torrent clients and so on), third party downloaders and other similar sources. The safest way to download software is to do it using official websites and direct links. Install (or download) software with care, always check what are the "Custom", "Advanced" and other similar download or installation setup options. Opt-out offers to install some additional applications/programs and only then finish the process. Do not use various third party software updaters, update software using tools or functions provided by official developers only. Do not activate paid software using various 'cracking' tools, these are illegal and often are used as tools to proliferate computer infections. MS Office 2010 and later releases include the "Protected View" mode that is designed prevent downloaded malicious attachments from spreading various viruses. We recommend to use newer versions. Having a reputable anti-spyware or anti-virus software installed and enabled is a great prevention too. If you've already opened malicious attachments, we recommend running a scan with Spyhunter for Windows to automatically eliminate infiltrated malware.
Text presented in the "Proof attached" email letter (first variant):
Subject: Re: #68585942 You can panic ñ 07.04.2019 11:44:14
Camèra rèady,N0tificati0n: #68585942 ñ 07.04.2019
Status: Waiting for Reply 56xuTaYy5A4f98wJnMmIkM3XrT4Ey95Bu0_Priority: Norma]l
Hi there.. .
This email will not acquire a lot of time, so direct to the issue. I obtained a movie of you buffing the banana when at the pornweb site youíre stopped at, due to a good arse software program I have been able to put on several sites with that type of content.
You press play and all cameras and a mic begin their work it also will save every fucking element coming from your computer system, just like contact info, account details or crap like that, guess where i have this e-mail from?) Therefore now we all know who i am going to deliver that to, if you not necessarily gonna negotiate this with me.
I am going to place a account wallet address under for you to send me 310 usd in Three dayz maximum through bitcoin. See, it isnít that big of a total to pay, guess this tends to make me not that terrible of a guy.
Youíre welcome to try and do whatever da fuck you would like to, yet if i wonít find the total in the period of time mentioned above, clearlyÖ u by now understand what can happen.
So itís under your control now. I am not gonna undergo all the info and shit, simply donít have time for this and also you most likely know that net is filled with mail similar to this, so itís as well your decision to trust in this or not, there is only a proven way to find out.
Hereís the btc wallet address- 16fSXe21QhnmhvZskmtrWnvoRWFbAeAVG3
Password in the video >>
Come up with a new password for your email .. .
Screenshot of a second variant of "Proof attached scam":
Text presented in the second variant of "Proof attached" scam:
Subject: Case #48942113 You have been warned many times - 07/04/2019 10:57:20
Camera ready,Notificition: #48942113 - 07/04/2019
Status: Waiting for Reply 74xuNaOy8A2f21wLnBmGkG3WrC6Ry53Xu8_Priority: Norm[a]l
Hi there.. .
This email won't acquire too much of your efforts, and so straight to the issue. I obtained a video of you flogging the dolphin when at a pornpage you are visited, thanks to an incredible arse software program I've managed to put on a few web sites with that type of content.
You hit play button and all of the cams and a microphone begin their work in addition it saves every fucking element through your pc, for example contact information, account details or shit such as that, guess just where i got this email address from?) Therefore now we all know just who i will deliver that to, if you aren't gonna negotiate this along with me.
I am going to place a account wallet address down be!
low so that you can hit me 660 $ within 2 days utmost via bitcoin. See, it isn't that large of a total to pay, guess that makes me not that terrible of a person.
You are allowed to try and do what ever the shit you wish to, yet if i won't see the total within the period of time mentioned above, clearly... you already realize what will happen.
And so it is your choice right now. Now i'm not going to proceed through every detail and shit, just simply ain't got precious time for this and also you likely know that web is filled with mail such as this, therefore it is as well your decision to believe in this or not, there may be only one way to uncover.
This is the bitcoin wallet address- 1J7uHaMeKV9aoYLB5bLmTUuzYeY7Cbicvf
Password in the video >>
Come up with a new password for your!
email .. .
Cyber criminals attempt to sell the archive's password via Cryptonator:
Screenshot of the files uploaded to Satoshibox:
Screenshot of the files in password-protected archive file (attachment):
Instant automatic removal of possible malware infections:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of possible malware infections. Download it by clicking the button below:
- What is "Proof attached"?
- STEP 1. Manual removal of possible malware infections.
- STEP 2. Check if your computer is clean.
How to remove malware manually?
Manual malware removal is a complicated task, usually it's better to let antivirus or anti-malware programs do it automatically. To remove this malware we recommend using Spyhunter for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here's an example of a suspicious program running on user's computer:
If you checked the list of programs running on your computer, for example using task manager and identified a program that looks suspicious you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Extract the downloaded archive and run Autoruns.exe file.
In the Autoruns application click "Options" at the top and uncheck "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure click the "Refresh" icon.
Check the list provided by Autoruns application and locate the malware file that you want to eliminate.
You should write down it full path and name. Note that some malware hides their process names under legitimate Windows process names. At this stage it's very important to avoid removing system files. After you locate he suspicious program you want to remove right click your mouse over it's name and choose "Delete"
After removing the malware through Autoruns application (this ensures that the malware won't run automatically on the next system startup) you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the file of the malware be sure to remove it.
Reboot your computer in normal mode. Following these steps should help remove any malware from your computer. Note that manual threat removal requires advanced computer skills, it's recommended to leave malware removal to antivirus and anti-malware programs. These steps might not work with advanced malware infections. As always it's better to avoid getting infected that try to remove malware afterwards. To keep your computer safe be sure to install latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections we recommend scanning it with Spyhunter for Windows.