The “Proof attached” scam has been the latest entry in a series of sextortion scams, trying to scare people that hackers made a fake video of them watching pornographic content and masturbating. People receiving the message are demanded to pay a ransom fee in Bitcoin (the sum varying around 310 US dollars). Do not pay the money in any case as that will not help you. Read on what you must do in case you are truly breached, but keep in mind that in most cases this is a total scam.
|Name||"Proof attached" E-mail Scam|
|Type||Email Scam Message|
|Short Description||A scam that tries to scare you into paying a ransom fee for a supposed breach of your email account credentials.|
|Symptoms||You receive an email message that tries to trick you into thinking that your email account got compromised, plus that your password is leaked and exposed to hackers.|
|Distribution Method||Email Spam Messages, Suspicious Sites|
See If Your System Has Been Affected by malware
Malware Removal Tool
|User Experience||Join Our Forum to Discuss "Proof attached" E-mail Scam.|
“Proof attached” Scam – Distribution Tactics
The “Proof attached” scam is mainly distributed through e-mail messages that may even be filtered as spam by email providers by now. It could also be using targeted attacks to aim for a bigger payout by companies or rich people. Different distribution tactics may exist, too. For instance, there are mentions of the “Proof attached” scam over Facebook, and the scareware tactics and doxing may be successful there, just as well.
“Proof attached” Scam – More Details
The “Proof attached” scam is a type of sextortion. The message is sent over email and is trying to scare users into sending money to cybercriminals. The extortionists want to blackmail you into paying around 310 dollars in Bitcoin. They claim they have recorded you while visiting an adult website and that they have made a fake video of you watching porn. Also they claim to have your IP address and geographic location so they will use those to make it look like you bought drugs over the internet.
The email message looks like the following:
Subject: Re: #68585942 You can panic ñ 07.04.2019 11:44:14
Camèra rèady,N0tificati0n: #68585942 ñ 07.04.2019
Status: Waiting for Reply 56xuTaYy5A4f98wJnMmIkM3XrT4Ey95Bu0_Priority: Norma]l
Hi there.. .
This email will not acquire a lot of time, so direct to the issue. I obtained a movie of you buffing the banana when at the pornweb site youíre stopped at, due to a good arse software program I have been able to put on several sites with that type of content.
You press play and all cameras and a mic begin their work it also will save every fucking element coming from your computer system, just like contact info, account details or crap like that, guess where i have this e-mail from?) Therefore now we all know who i am going to deliver that to, if you not necessarily gonna negotiate this with me.
I am going to place a account wallet address under for you to send me 310 usd in Three dayz maximum through bitcoin. See, it isnít that big of a total to pay, guess this tends to make me not that terrible of a guy.
Youíre welcome to try and do whatever da fuck you would like to, yet if i wonít find the total in the period of time mentioned above, clearlyÖ u by now understand what can happen.
So itís under your control now. I am not gonna undergo all the info and shit, simply donít have time for this and also you most likely know that net is filled with mail similar to this, so itís as well your decision to trust in this or not, there is only a proven way to find out.
Hereís the btc wallet address- 16fSXe21QhnmhvZskmtrWnvoRWFbAeAVG3
Password in the video >>
Come up with a new password for your email …
There are a number of possibilities, but in most cases this is an absolute scam. You should ignore it. Do not reply to it. Do not pay the cybercriminals behind it. Change your email password, but first make sure your computer is clean from viruses. Also, check if you are changing it from the real URL address of your email provider and not a phishing page.
The Bitcoin address listed down below is given by the criminals for paying the fee they demand:
- 56xuTaYy5A4f98wJnMmIkM3XrT4Ey95Bu0 Bitcoin Email Scam
You are demanded to pay 310 US dollars to allegedly not spread your personal pictures and files to family and friends. However, you should NOT under any circumstances pay any sum. No guarantee exists that your “data” is not going to be leaked even if you pay. This is known as doxing – an extortion involving the threat of releasing personal information, photos or videos which might be embarrassing or otherwise unwanted by the person being extorted. Adding to all of this, giving money to cybercriminals will most likely motivate them to create more ransom-based scams, “viruses” or commit different criminal activities. That may even result to the criminals wanting more money after payment.
Also, keep in mind that your password may have been leaked from an older password breach database. You can check using the Have I Been Pwned? service. If you have any accounts still using a password that’s been breached, be certain to change it and make sure you use a different password for each account. If you can, enable two-factor authentication on the accounts. Stay safe and ever vigilant.
A simple solution
Since all recent extortion-based scams are relying on purported recordings of the recipient watching adult content, simply cover up your laptop’s camera. This may sound silly but knowing that your camera is covered leaves no place for you to worry, regardless of the scammer’s claims.
Another simple thing you can do to avoid email harvesting (where scammers and third parties harvest email addresses in bulk) is the so-called email address munging, or simply changing the “@” sign into “at” and the “.” into “dot”. This is especially valid for individuals with business emails that are visible to the entire internet.
And once again, no matter how persuasive the email you received sounds, don’t fall for it because it is a scam.
Note. If you have previously interacted with a phishing message where you clicked a suspicious link or email attachment, your accounts may have been compromised, email accounts included. Your financial details may be at risk, as well. So it may be a good idea to scan your system for spyware or malware.
- Guide 1: How to Remove "Proof attached" E-mail Scam from Windows.
- Guide 2: Get rid of "Proof attached" E-mail Scam on Mac OS X.
- Guide 3: Remove "Proof attached" E-mail Scam in Google Chrome.
- Guide 4: Erase "Proof attached" E-mail Scam from Mozilla Firefox.
- Guide 5: Uninstall "Proof attached" E-mail Scam from Microsoft Edge.
- Guide 6: Remove "Proof attached" E-mail Scam from Safari.
- Guide 7: Eliminate "Proof attached" E-mail Scam from Internet Explorer.
- Guide 8: Disable "Proof attached" E-mail Scam Push Notifications in Your Browsers.
How to Remove "Proof attached" E-mail Scam from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove "Proof attached" E-mail Scam
Step 2: Uninstall "Proof attached" E-mail Scam and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it.
Step 3: Clean any registries, created by "Proof attached" E-mail Scam on your computer.
The usually targeted registries of Windows machines are the following:
You can access them by opening the Windows registry editor and deleting any values, created by "Proof attached" E-mail Scam there. This can happen by following the steps underneath:
Get rid of "Proof attached" E-mail Scam from Mac OS X.
Step 1: Uninstall "Proof attached" E-mail Scam and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove "Proof attached" E-mail Scam via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove "Proof attached" E-mail Scam files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as "Proof attached" E-mail Scam, the recommended way of eliminating the threat is by using an anti-malware program. SpyHunter for Mac offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Remove "Proof attached" E-mail Scam from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Erase "Proof attached" E-mail Scam from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Uninstall "Proof attached" E-mail Scam from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Remove "Proof attached" E-mail Scam from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the "Proof attached" E-mail Scam will be removed.
Eliminate "Proof attached" E-mail Scam from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.
Remove Push Notifications caused by "Proof attached" E-mail Scam from Your Browsers.
Turn Off Push Notifications from Google Chrome
To disable any Push Notices from Google Chrome browser, please follow the steps below:
Step 1: Go to Settings in Chrome.
Step 2: In Settings, select “Advanced Settings”:
Step 3: Click “Content Settings”:
Step 4: Open “Notifications”:
Step 5: Click the three dots and choose Block, Edit or Remove options:
Remove Push Notifications on Firefox
Step 1: Go to Firefox Options.
Step 2: Go to “Settings”, type “notifications” in the search bar and click "Settings":
Step 3: Click “Remove” on any site you wish notifications gone and click “Save Changes”
Stop Push Notifications on Opera
Step 1: In Opera, press ALT+P to go to Settings
Step 2: In Setting search, type “Content” to go to Content Settings.
Step 3: Open Notifications:
Step 4: Do the same as you did with Google Chrome (explained below):
Eliminate Push Notifications on Safari
Step 1: Open Safari Preferences.
Step 2: Choose the domain from where you like push pop-ups gone and change to "Deny" from "Allow".