• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  extortion • Ransomware  /  How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”
How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”
04 July 2024

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

Written by Gagandeep Saini
Gagandeep Saini
extortion, Ransomware

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

A recent email scam titled “You Have Been Under Surveillance” is a classic example of a sextortion scam. These scams involve cybercriminals threatening to expose sensitive or compromising information about the recipient unless a ransom is paid. Recipients must recognize these fraudulent attempts and avoid engaging with scammers.

A recent email scam titled "You Have Been Under Surveillance" is a classic example of a sextortion scam. These scams involve cybercriminals threatening to expose sensitive or compromising information about the recipient unless a ransom is paid. Recipients must recognize these fraudulent attempts and avoid engaging with scammers.

Anatomy of the Scam

The scammers behind these emails typically claim to have hacked into the recipient’s system, alleging they possess compromising material. Here’s a breakdown of their tactics:

  • False Hacking Claims: The scammers assert that the recipient’s system has been compromised and that they have been under surveillance for an extended period.
  • Infection Allegations: They claim the recipient’s device was infected by visiting an adult website and that they have recorded explicit videos.
  • Data Theft Claims: They also allege that they have copied all data from the recipient’s device to their servers.
  • Ransom Demand: A demand is made for a ransom, often in Bitcoin, with threats of public exposure if the payment is not made within a specified timeframe.
  • Intimidation Tactics: The email employs threats of legal consequences and claims of anonymity to intimidate the recipient.
  • Detection Evasion: They claim the virus used is undetectable and that password changes will be futile.
  • Reporting Threats: The scammers warn against replying to or reporting the email, claiming the sender’s address is untraceable and threatening to publish the recipient’s data if law enforcement is contacted.

Recognizing and Reporting

Such emails are purely coercive attempts to extort money using fear and intimidation. Recipients should not respond or engage with these scammers. Instead, they should report the email to the appropriate authorities or their email service provider to prevent further exploitation.

How Do Spam Campaigns Infect Computers?

Cybercriminals often deliver malware via email through deceptive tactics such as phishing. They disguise emails as legitimate messages from trusted sources, enticing recipients to click on malicious links or download infected attachments. Here are common methods:

  • Malicious Attachments: Files such as executable files (.exe), compressed files (.zip or .rar), Microsoft Office documents (.doc or .docx), and PDF files can contain hidden malware payloads.
  • Malicious Links: Embedded links in emails can direct recipients to seemingly trustworthy websites that trigger drive-by downloads or prompt users to download malicious files.

How to Avoid Malware Installation

To protect yourself from malware infections through emails, follow these guidelines:

  1. Exercise Caution: Be wary of email attachments or links, especially if they come unexpectedly or seem irrelevant, particularly from unfamiliar or suspicious addresses.
  2. Keep Software Updated: Ensure your operating system, installed programs, and security tools are up to date to mitigate vulnerabilities.
  3. Download from Reputable Sources: Only download applications and files from official websites and trusted app stores.
  4. Avoid Dubious Websites: Approach pop-ups, advertisements, or buttons on suspicious websites with scepticism.
  5. Refrain from Using Pirated Software: Avoid using pirated software or cracking tools.
  6. Regular Scans: Regularly scan your computer to identify and eliminate any existing threats that may compromise your system’s security.

If you have already opened malicious attachments, it is recommended to run a “Full System Scan” with your security software to automatically eliminate any infiltrated malware.

By staying informed and vigilant, you can protect yourself from falling victim to these and other cyber threats.

 Previous PostHow AI is Changing the Go-to-Market Strategy of Cyber Criminals
Next Post  Umbrella of Pakistani Threats: Converging Tactics of Cyber-operat...
Gagandeep Saini

About Gagandeep Saini

Gagandeep Saini is a seasoned Technical Support Manager with a passion for cybersecurity. With over 12 years of experience in the industry, he has established a...

Articles by Gagandeep Saini »

Related Posts

  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
  • How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

    March 11, 2025
  • Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks

    January 31, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies