Blog / Re: SCAM WARNING - eBusiness Number Registry (European Business Registry)
« Last post by kat on January 30, 2024, 01:23:10 PM »register@tokenbrb.com
Subject: Response for you're doing.
Message: Hello ****,
I want to inform you about a very bad situation for you. However, you can benefit from it, if you will act wisely.
Have you heard of Pegasus?
This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners.
It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, and Windows.
I guess, you already figured out where I'm getting at.
It's been a few months since I installed it on all your devices because you were not quite choosy about what links to click on the internet.
During this period, I've learned about all aspects of your private life, but one is of special significance to me.
I've recorded many videos of you **** to highly controversial **** videos.
Given that the "questionable" genre is almost always the same, I can conclude that you have sick ****.
I doubt you'd want your friends, family and co-workers to know about it. However, I can do it in a few clicks.
Every number in your contact book will suddenly receive these videos - on WhatsApp, on Telegram, on Skype, on email - everywhere.
It is going to be a tsunami that will sweep away everything in its path, and first of all, your former life.
Don't think of yourself as an innocent victim. No one knows where your **** might lead in the future, so consider this a kind of deserved punishment to stop you.
Better late than never.
I'm some kind of God who sees everything.
However, don't panic. As we know, God is merciful and forgiving, and so do I.
But my mercy is not free.
Transfer $1320 USD to my bitcoin wallet: [bitcoin address]
Once I receive confirmation of the transaction, I will permanently delete all videos compromising you, uninstall Pegasus from all of your devices, and disappear from your life. You can be sure - my benefit is only money.
Otherwise, I wouldn't be writing to you, but destroy your life without a word in a second.
I'll be notified when you open my email, and from that moment you have exactly 48 hours to send the money.
If cryptocurrencies are unchartered waters for you, don't worry, it's very simple.
Just google "crypto exchange" and then it will be no harder than buying some useless stuff on Amazon.
I strongly warn you against the following:
) Do not reply to this email. I sent it from a temp email so I am untraceable.
) Do not contact the police. I have access to all your devices, and as soon as I find out you ran to the cops, videos will be published.
) Don't try to reset or destroy your devices.
As I mentioned above: I'm monitoring all your activity, so you either agree to my terms or the videos are published.
Also, don't forget that cryptocurrencies are anonymous, so it's impossible to identify me using the provided address.
Good luck, my perverted friend. I hope this is the last time we hear from each other.
And some friendly advice: from now on, don't be so careless about your online security.
"...
[account label]_1705854851.mp4 (55.4 MB)
[account label]_1705191812.mp4 (108.1 MB)
[account label]_1705281491.mp4 (42.8 MB)
...
[account label]_1705566894.mp4 (75.8 MB)
[account label]_1705456574.mp4 (44.3 MB)
..."
"...
1 Bitcoin now costs exactly 31500 GBP.
So send exactly 0.0798186 BTC to the address below.
...
1 Bitcoin now costs exactly 31500 GBP.
So send exactly 0.0799329 BTC to the address below.
..."
There are five basic stages in this model of infiltration:
— James Lindsay, anti-Fascist (@ConceptualJames) January 5, 2024
1) Demand access.
2) Demand accommodation.
3) Demand a seat at the table (demand power).
4) Demand to run the table (demand controlling power).
5) Demand to run the room (demand total power).
Hello there!
Unfortunately, there are some bad news for you.
Some time ago your device was infected with my private trojan, R.A.T (Remote Administration Tool), if you want to find out more about it simply use Google.
My trojan allowed me to access your files, accounts and your camera.
Check the sender of this email, I have sent it from your email account.
You truly enjoy checking out **** websites and watching dirty videos, while having a lot of **** fun.
I RECORDED YOU (through your camera) SATISFYING YOURSELF!
After that I removed my malware to not leave any traces.
If you still doubt my serious intentions, it only takes couple mouse clicks to share the video of you with your friends, relatives, all email contacts, on social networks, the darknet and to publish all your files.
All you need is $399 USD in Bitcoin (BTC) transfer to my account.
After the transaction is successful, I will proceed to delete everything.
Be sure, I keep my promises.
You can easily buy Bitcoin (BTC) here:
https ://cex .io/buy-bitcoins
https ://nexo .com/buy-crypto/bitcoin-btc <https ://nexo .com/buy-crypto/bitcoin-btc>
https ://bitpay .com/buy-bitcoin/?crypto=BTC <https ://bitpay .com/buy-bitcoin/?crypto=BTC>
https ://paybis .com/
https ://invity .io/buy-crypto
Or simply google other exchanger.
After that send the Bitcoin (BTC) directly to my wallet, or install the free software: Atomicwallet, or: Exodus wallet, then receive and send to mine.
My Bitcoin (BTC) address is: [scammy bitcoin address]
Yes, that's how the address looks like, copy and paste my address, it's (cAsE-sEnSEtiVE).
You are given not more than 3 days after you have opened this email.
As I got access to this email account, I will know if this email has already been read.
Everything will be carried out based on fairness.
An advice from me, regularly change all your passwords to your accounts and update your device with newest security patches.
Some of the references discussed.
SEC. 3. ADDRESSING INFORMATION AND COMMUNICATION TECHNOLOGY PRODUCTS AND SERVICES THAT POSE UNDUE OR UNACCEPTABLE RISK.(a) In General.-The Secretary, in consultation with the relevant executive department and agency heads, is authorized to and shall take action to identify, deter, disrupt, prevent, prohibit, investigate, or otherwise mitigate, including by negotiating, entering into, or imposing, and enforcing any mitigation measure to address any risk arising from any covered transaction by any person, or with respect to any property, subject to the jurisdiction of the United States that the Secretary determines-(1) poses an undue or unacceptable risk of-(b) Procedure.-(2) otherwise poses an undue or unacceptable risk to the national security of the United States or the safety of United States persons.(A) sabotage or subversion of the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of information and communications technology products and services in the United States;
(B) catastrophic effects on the security or resilience of the critical infrastructure or digital economy of the United States;
(C) interfering in, or altering the result or reported result of a Federal election, as determined in coordination with the Attorney General, the Director of National Intelligence, the Secretary of Treasury, and the Federal Election Commission; or
(D) coercive or criminal activities by a foreign adversary that are designed to undermine democratic processes and institutions or steer policy and regulatory decisions in favor of the strategic objectives of a foreign adversary to the detriment of the national security of the United States, as determined in coordination with the Attorney General, the Director of National Intelligence, the Secretary of Treasury, and the Federal Election Commission; or
(1) IN GENERAL.-Not later than 180 days after the date of enactment of this Act, the Secretary, in consultation with the relevant executive department and agency heads, shall review any transaction described in subsection (a) to-(A) determine, not later than 180 days after the date on which the Secretary initiates such review, if such transaction poses an undue or unacceptable risk under subsection (a)(2) and qualifies as a covered transaction; and
(B) with respect to a transaction found to pose an undue or unacceptable risk and qualify as a covered transaction, determine whether-
(i) the covered transaction should be prohibited; or
(ii) any other action should be taken to mitigate the effects of the covered transaction.