Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
Physical Address
Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine
The “We Hacked Your System” email is a sophisticated sextortion scam that attempts to extort money from victims through psychological manipulation and false claims about compromised systems. This scam falsely claims to have video recordings of victims visiting adult websites, threatening to release this alleged footage to their contacts unless a Bitcoin payment is made. This comprehensive analysis explains how this scam operates, why these claims are false, and what steps you should take if you receive such messages.
This sextortion scam operates through carefully crafted emails designed to create panic and prompt hasty payments. The scam follows a predictable pattern that relies more on psychological manipulation than actual technical compromise:
Source: Analysis of “We Hacked Your System” email scam tactics and operation flow
The scam begins with a mass email campaign targeting thousands of random email addresses. The message falsely claims that the recipient’s device has been infected with malware after visiting an adult website. According to the email, this supposed infection allowed the scammer to:
The scammer then demands payment (typically around $1,300 USD in Bitcoin) within a short timeframe (usually 50 hours), threatening to send the fabricated video to all the victim’s contacts if payment isn’t received. This tactic is similar to other sextortion scams like the Internet Fraudsters Arrested scam and the Unauthorized Geolocation Sign-in scam.
Consider this message as your last warning.
We hacked your system!
We have copied all the data from your device to our own servers.
Curious videos were recorded from your camera and your actions while watching porn.
Your device was infected with our virus when you visited the porn site.
The Trojan virus gives us full access, allows us to control your device.The virus allows not only to see your screen, but also to turn on your camera, microphone, without your knowledge.
We took over the video from your screen and camera, then we mounted a video in which you can see you watching porn in one part of the screen and masturbating in the other.But that’s not all! We have access to all the contacts in your phone book and social networks.
It won’t take us long to send this video to your friends, family and friends on social networks, messengers and email in minutes.
We have a lot of audio recordings of your personal conversations, where a lot of “interesting” things are revealed!
This information can destroy your reputation once and for all in a matter of minutes.
You have an opportunity to prevent irreversible consequences.To do this:
Transfer 1300 $ USD (US dollars) to our Bitcoin wallet: bc1qj2aesryeq0yhg6ntk4s8n2sssgtpde4a2jt5eq
You have 50 hours (approximately two days) from the moment this letter was received.
Despite the alarming nature of these emails, they contain no genuine threat for several important reasons:
Similar tactics are used in various email scams like the Criminals Redirect Funds email scam and Unclaimed Prize email scams, which likewise use psychological pressure rather than real technical exploits.
There are several tell-tale signs that can help you identify this and similar scam emails:
Red Flag | Explanation |
---|---|
Generic Greeting | Lack of personal details or a generic greeting indicates mass-produced messages |
Technical Inconsistencies | Claims that don’t align with how technology actually works (e.g., remote webcam activation without permission indicators) |
Cryptocurrency Payment | Demand for payment in cryptocurrency due to its anonymity and irreversibility |
Urgent Timeframe | Short deadlines designed to prevent critical thinking and promote hasty action |
Threats Without Proof | No sample of the allegedly compromising material is provided to verify claims |
Grammar/Spelling Errors | Poor language quality often indicates foreign-based scam operations |
Recycled Email Address/Password | Inclusion of old credentials from public data breaches to add false legitimacy |
If you receive this type of sextortion email, follow these steps:
The “We Hacked Your System” scam is part of a broader category of sextortion and extortion scams that share similar characteristics. Being aware of these related scams can help you identify and avoid them:
Implementing these preventive measures can significantly reduce your risk of falling victim to email scams:
Since many sextortion scams reference webcam access, these additional steps can provide peace of mind:
The “We Hacked Your System” email scam represents a common type of online threat that relies on fear, shame, and technical intimidation rather than actual malware or system compromise. Understanding that these messages are mass-produced fraud attempts with no basis in reality is the first step in protecting yourself. By recognizing the red flags in these emails and implementing basic security practices, you can easily dismiss these threats and avoid becoming a victim of extortion.
While these emails are fraudulent, they highlight the importance of maintaining good cybersecurity hygiene. Regular password updates, two-factor authentication, and updated security software remain your best defenses against the genuine threats that exist online. If you’re concerned about potential malware infections, consider performing a thorough scan with reputable security software to ensure your system is clean.
No. The claims made in “We Hacked Your System” emails are false. Scammers have not infected your device, accessed your webcam, or created any compromising recordings. These emails are sent to thousands of recipients in mass campaigns with no targeting, relying on fear and shame to trick people into paying.
Scammers typically obtain email addresses from public data breaches, purchased lists, or through automated scraping of websites. If an old password appears in the email, it was likely obtained from leaked databases from previous data breaches. You can check if your information has been compromised on sites like HaveIBeenPwned.
Nothing will happen because the threats are not real. The scammer has not infected your system or created compromising videos as claimed. The countdown is simply a pressure tactic to create urgency and prevent rational thinking. Once the deadline passes, nothing happens, although you may receive similar scam attempts in the future.
Unfortunately, cryptocurrency payments are typically not recoverable due to their anonymous nature. If you’ve already paid, consider the following actions: 1) Stop any further communication with the scammers, 2) Report the incident to your local authorities and the FBI’s Internet Crime Complaint Center (IC3), 3) Monitor your financial accounts for unusual activity, and 4) Be extra vigilant about future scam attempts, as paying once may mark you as a potential target for further scams.
To check if your computer actually has any malware (unrelated to these false claims), run a thorough scan with reputable antivirus or anti-malware software. Look for suspicious processes in Task Manager, unexpected system slowdowns, or strange network activity. Professional security tools can detect genuine threats that may be present on your system, distinct from the fabricated claims in sextortion emails.