public inbox for bunsen@sourceware.org
 help / color / mirror / Atom feed
From: John Smith <messagee60454b539459@nannyjob.co.uk>
To: bunsen@sourceware.org
Subject: I recorded you
Date: Fri, 1 Jan 2021 20:44:40 +0100	[thread overview]
Message-ID: <4qxfz9vMiTSRvxwr5oIsQ0yQ8j6mHVb0rrvMpfNpsIk@kglink> (raw)

Hi!

I know that you visit regularly PRONOGRAPHIC movies!
Your smartphone got infected and this gave me access to record with your camera and the microphone without your knowledge while you satisfy yourself! Here is the deal... you have to pay me 800$ value in BIT C0lN I will release the video with you doing... you know what to your contacts.
My sneaky app that was installed had also a second function, to extract all your contacts from emails, phone book list, social media friends and so on. Did I got the passwords? Neah, any smart-phone have like a virus detection tool build-in and they scan for what kind of activity an app can have, so... Trying to extract passwords? Very bad, it may get detected! Using the camera and extracting all the contacts without user permission? No problem!
Ok! So in order to buy some coins go and search on Google for "Buy BIT C0lN instantly" and use the next address to send the coins:

Address: 1 A 7 B r r S q 4 e N R 7 P 7 r Z A E W v 9 v v f a E V C D 1 U 9 E
Amount: 0.027

Very important! My address which is Case Sensitive was split with spaces, and you have to manually remove all spaces and the result it has to be a string of 34 characters long also it will start with "1" also it will end with "E". Use the string without spaces to send my coins! You have a few days!

Ok... to uninstall my sneaky app apply a reset with factory settings. Use Google for "Reset to factory settings [your phone model]". Also maybe you think that I got your passwords, you can change them! To avoid getting infected next time, your browser and your OS must to be updated regularry!
Also maybe you will consider to stop with this habbit of watching videos like this... it makes a mess in your brain.
After you sent the coins maybe you will receive those emails simply ignore them. My compromised machines are programmed to send this message multiple times.

             reply	other threads:[~2021-01-01 19:44 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-01-01 19:44 John Smith [this message]
  -- strict thread matches above, loose matches on Subject: below --
2021-01-01 16:49 John Doe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4qxfz9vMiTSRvxwr5oIsQ0yQ8j6mHVb0rrvMpfNpsIk@kglink \
    --to=messagee60454b539459@nannyjob.co.uk \
    --cc=bunsen@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).