Sextortion email scammers increase their “Hello pervert” money demands

🚨 Sextortion “Hello Pervert” Emails: Ransom Demands Spike Amid Inflation

By: Legal & Cybersecurity Team | Date: June 2025

Hello Pervert sextortion email warning

📬 What’s Changing?

Recent waves of the notorious **“Hello pervert” sextortion emails** are now demanding significantly more money from recipients. Attackers claim surveillance over your device and intimate activities, threatening public exposure unless paid in cryptocurrency :contentReference[oaicite:2]{index=2}.

🧩 How the Scam Works

  • The message often begins with “Hello pervert,” then asserts the sender emailed you from your own account to imply full compromise :contentReference[oaicite:3]{index=3}.
  • They falsely reference **Pegasus spyware** or similar tools, claiming long‑term surveillance across devices and recording of explicit behavior :contentReference[oaicite:4]{index=4}.
  • The email may include your old password (from breaches) or even mention your physical address to enhance fear :contentReference[oaicite:5]{index=5}.
  • Targets are told to pay within 48 hours—amounts have risen to around **$1,650 USD (or equivalent in LTC/BTC)** :contentReference[oaicite:6]{index=6}.

⚠️ Why It’s a Scam – Not Reality

This extortion attempt is entirely fraudulent:

  • No real access to your microphones, camera, or webcam footage—**Pegasus spyware use is myth here** :contentReference[oaicite:7]{index=7}.
  • References to passwords are likely pulled from old breaches, not generated via device hacks.
  • Spoofing of sender addresses is trivial; appearing to come from your own account doesn’t prove compromise :contentReference[oaicite:8]{index=8}.

🛡️ How to React Legally & Securely

  • **Do NOT reply**, open attachments, or click links. Replying confirms the address is active.
  • If your password was included, **change it immediately** and enable **two‑factor authentication** on that and other accounts.
  • Use a reputable password manager to avoid password reuse.
  • Disable or cover your webcam for peace of mind.
  • If unsure, scan your system using trusted anti‑malware (e.g., Malwarebytes, Gridinsoft) :contentReference[oaicite:9]{index=9}.

🔍 From a Compliance & Legal Viewpoint

These scams exploit disinformation and fear. Legal counsel should inform stakeholders that:

  • There is no genuine breach—these messages are thinly veiled threats lacking technical validity.
  • Maintaining incident response plans, implementing password hygiene policies, and phishing awareness training helps demonstrate due diligence.
  • Encouraging victims to report such crimes and offering support under data protection regulations adds legal and ethical credibility.

🧠 SEO Summary & Keywords

This post dives into the updated **“Hello pervert” sextortion scam**, higher disputes over inflated ransom demands (~$1,650), bogus claims of surveillance (Pegasus/Passwords), and recommended legal and security guidance.

📖 Read the Full Article

For full details—including technical posted examples, payment wallet addresses, and in-depth background—see the original **Malwarebytes blog post by Pieter Arntz (June 25, 2025)**:

👉 Read the Malwarebytes article

Have Any Problem With Your Computer?

Got Computer Problems? We’ve Got the Solution!

Recent Post

Scroll to Top