<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri","sans-serif";}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><p>Well, hello there, my perverted friend.</p>
<p>I'll get right to the point.<br />We've actually known each other for a while now, at least I've known you.<br />You can call me Big Brother or the All-Seeing Eye.</p>
<p>I'm a hacker who a few months ago gained access to your device, including your browser history and webcam.<br />And I recorded some videos of you jerking off to highly controversial "adult" videos.<br />I doubt very much you'd want your family, coworkers, and your entire contact list to see footage<br />of you pleasuring yourself, especially given the specifics of your favorite genre.<br />I'll also put these videos on porn sites, and they'll go viral, so much so that it will be physically impossible to remove them from everywhere.</p>
<p><br />How did I do that?<br />Because of your disregard for Internet security, I was able to easily install a Trojan horse on your device.<br />which accessed all the data on your device and allowed me to control it remotely.<br />Once I infected one device, I had no problem accessing all the other devices.</p>
<p>My spyware is embedded in the drivers and updates its signature every few hours, so no antivirus or firewall can even detect it.</p>
<p>So now I'm just gonna give you a condition. A small sum in exchange for your former quiet life.<br />Transfer 1200 USD to my bitcoin wallet:</p>
<p>11qvQ97ppQqLzgJzvn5jg4QrxEQknWS7m</p>
<p>As soon as I receive confirmation of the transfer, I will delete all the videos that compromise you, remotely erase the virus on your devices and you will never hear from me again.</p>
<p>Agree, it's a very small price to pay for not destroying your reputation in the eyes of others who, judging by your correspondence in messengers,<br />has an opinion of you as a decent human being.<br />You can think of me as a kind of mentor who wants you to start appreciating what you have.</p>
<p>You have 48 hours - I'll be notified as soon as you open this letter, and from then on it's a countdown.<br />If you've never dealt with cryptocurrency before, it's super easy - type "crypto exchange" into a search engine, and the next thing to do.</p>
<p>Here's what you shouldn't do:<br />Don't reply to my email. It was sent from a disposable e-mail account.<br />Don't call law enforcement. Remember, I have access to all of your devices, and as soon as I notice such activity, it will automatically lead to the release of all of your data.<br />Do not attempt to reinstall your system or factory reset your device.<br />First of all, I already have the video and all your data, and secondly, as I already said, I have remote access to all your devices and as soon as I notice such an attempt, it will lead to irreversible consequences.<br />Remember that crypto-addresses are anonymous, so you won't be able to figure me out from my wallet.<br />Anyway, let's make this a win-win situation.<br />I always keep my word, unless I'm being tricked. <br />Advice for the future: take more seriously your security on the Internet. Also regularly change passwords and set up multi-factor authorization on all your accounts.</p><o:p></o:p></p></div></body></html>