{"id":10747,"date":"2022-04-07T12:08:02","date_gmt":"2022-04-07T12:08:02","guid":{"rendered":"https:\/\/nftsgary.com\/?p=801"},"modified":"2022-04-07T12:08:02","modified_gmt":"2022-04-07T12:08:02","slug":"a-new-blackmail-scam-attantion-wannacry-team","status":"publish","type":"page","link":"https:\/\/myonlinesecurity.co.uk\/a-new-blackmail-scam-attantion-wannacry-team\/","title":{"rendered":"A New Blackmail Scam \u201c!!!Attantion WannaCry-Team!!!\u201d"},"content":{"rendered":"

Following on from the porn themed blackmail scam documented Attempted Blackmail Scam Watching Porn<\/a> attempted-blackmail-scam-watching-porn\/ we are now seeing another blackmail scam attempt.<\/p>\n

This time it pretends to alert about a new Wannacry outbreak that has infected your computer, saying you have been hacked by them and all your computer will be encrypted or deleted unless you pay them a large sum of money in bitcoins within 24 hours. They are currently asking for 0.1 bitcoin $650 but in the porn themed version that amount varied between $200 to about $800.<\/p>\n

This of course is a total scam and you should just delete the email, move on & forget all about it.
\nThe subject so far, in copies that I have seen says \u201c!!!Attantion WannaCry-Team!!!\u201d and comes from \u201cWannaCry-Hack-team \u201d the actual sending addresses vary with each email, but there appear to be hundreds so far today. No doubt as the day progresses and the weeks go past, the subjects will change slightly in the same way they did with the porn themed blackmail versions.<\/p>\n

Body content is similar to these 2 examples. There will be hundreds of different Bitcoin addresses in the emails. These are sent to a multiple list of recipients, so the email you receive will probably have several other email addresses listed in the to: box. Please just delete the email. Do not reply to the scammers and definitely do not press reply all or this will perpetuate the scam.<\/p>\n

Hello! WannaCry is back! All your devices were hacked with our program installed on them. We have developed operation of our program, so you will not be able to recover your data after the attack.<\/em>
\nAll the information will be encrypted and then erased. Antivirus software will not be able to detect our program, while firewalls will be bedrid against our unique code.<\/em><\/p>\n

Should your files be encrypted, you will lose them forever. Our program also permeates into the local network, erasing data on all computers connected to the network and remote servers, all cloud-stored data, and blocking website operation. We have already deployed our program on your devices.<\/em><\/p>\n

Deletion of your data is scheduled for June 22, 2018, at 5:00 \u2013 10:00 PM. All data stored on your computers, servers, and mobile devices will be destroyed. Devices working on any version of Windows, iOS, macOS, Android, and Linux are subject to data erasion.<\/em><\/p>\n

In place to ensure against data demolition, you can pay 0.1 BTC (~$650) to the bitcoin wallet:1EXwemM1ijWGkEJ1v4kSUvo3f3VUP4SCd4<\/em><\/p>\n

You must pay at the proper time and notify us about the payment via email until 5:00 PM on June 22, 2018. After payment confirmation, we will send you instructions on how to avoid data erasion and such situations further. Should you try to delete our program yourself, data erasion will commence shortly.<\/em><\/p>\n

To pay with bitcoins, please use localbitcoins.com or other similar platforms, or just google for other means. After payment write to us: support_wc@bitmessage.ch<\/em><\/p>\n

Hello! WannaCry returned! All your devices were hacked with our program installed on them. We have perfected operation of our program, so you will not be able to regain the data after the attack.<\/em><\/p>\n

All the information will be encrypted and then erased. Antivirus software will not be able to detect our program, while firewalls will be emasculate against our one-of-a-kind code.<\/em><\/p>\n

Should your files be encrypted, you will lose them forever. Our program also develops across the local network, erasing data on all network-connected computers and remote servers, all cloud-stored data, and blocking website operation. We have already deployed our program on your devices.<\/em><\/p>\n

Deletion of your data will take place on June 22, 2018, at 5:00 \u2013 10:00 PM. All data stored on your computers, servers, and mobile devices will be destroyed. Devices working on any version of Windows, iOS, macOS, Android, and Linux are subject to data erasion.<\/em><\/p>\n

So as to ensure against data demolition, you can pay 0.1 BTC (~$650) to the bitcoin wallet:1EavShz7fUxkeVx6PSk2Lb1h6ijtBkvnv2<\/em><\/p>\n

You must pay at the proper time and notify us about the payment via email until 5:00 PM on June 22, 2018. After payment confirmation, we will send you instructions on how to avoid data erasion and such situations from now on. Should you try to delete our program yourself, data erasion will commence without any delay.<\/em>
\nTo pay with bitcoins, please use localbitcoins.com or other similar platforms, or just google for other means. After payment write to us: support_wc@bitmessage.ch<\/em><\/p>\n

Once again just delete the email. Don\u2019t worry, you have not been hacked. Your device will not be encrypted. Your Data will not be wiped. You haven\u2019t been especially targeted. Theses scammers are just sending out millions of these emails in the hope that 1 in every 100,000 or so will respond.
\n\"\"<\/p>\n

Fake Blackmail email<\/strong><\/em><\/p>\n

\"\"<\/p>\n

Fake Blackmail email<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Following on from the porn themed blackmail scam documented Attempted Blackmail Scam Watching Porn attempted-blackmail-scam-watching-porn\/ we are now seeing another blackmail scam attempt. This time it pretends to alert about a new Wannacry outbreak that has infected your computer, saying you have been hacked by them and all your computer will be encrypted or deleted…<\/p>\n","protected":false},"author":8,"featured_media":13435,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":["https:\/\/myonlinesecurity.co.uk\/wp-content\/uploads\/2022\/03\/Office-Macro-Malware.jpg",1000,773,false],"author_info":{"display_name":"Darrel Heers","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/darrel-heers\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/10747"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=10747"}],"version-history":[{"count":0,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/10747\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media\/13435"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=10747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}