Hack - iPhone camera and websites

I got the email below and the subject line had the last 4 digits of my phone number. What should I do? Is what he says even possible and if so, how??


****#$$


Hey. It's me! Your future friend or enemy.

You do not know me and think why I received this letter.

I am sorry for my english, its not my native language.

I learn more machine language - code.


I hack phones and save information from them.

I installed you a program with the functions of saving video and saving typing.


When you visited the sites that interest me. (Sites containing ****.)

My program recorded video from your screen with simultaneous connection to your camera.

Saying thanks you to the phone manufacturers. This mode - Split Screen.


Also, I saved a full backup of your phone, which contains all your files.

History of correspondence, browser history and all telephone contacts during the hacking.

Saying thanks you to the phone manufacturers. This mode - backup.


At the moment the program is deactivated, and I am writing to you.


You think what I should do. And, of course, you are furious.

You have to make a choice.

And remember. You make choice, what will happen next in your life.


1. You can delete and ignore this email. When I return, I will see that the letter is being viewed.

In this case, I will be able to share this personal record with your contacts.


To track the reading of a message and the actions in it, I use the facebook pixel.

Thanks to them. (Everything that is used for the authorities can help us.)

More you can find out by the link.

https://www.facebook.com/business/help/898185560232180?helpref=faq_content


2. You can write to the police, and they will investigate the hacked ip and hacked mail.

In order to find me and protect you. I think time is too small for this, 48 hours before sending the files.

In this case, I will be able to share this personal record with your contacts.

The police will not save you from the ridicule of friends, colleagues and family. You want live with this?

In my practice, there were cases when people had to change the whole way of life and place of residence.

They wanted to pay, but it was too late. It's time, and the files have been sent.


Everything that is downloaded on the Internet there and will remain forever.

More information you can find on request in Google

"Beyonce delete photo from internet"


3. I want to get paid for the work done. We all want our work to be paid.

(Even if it was not a wanted job.)

I want 1000 USD. In Bitcoin

My wallet BTC Address:


1EkAVVDg8Rbwwa7j9DbvHQ7VmQ4FkBdEGT


(CASE sensitive, copy and paste it carefully)


If you have any questions, you can write me. Email will be available for short-term support.

For payment after opening the letter 48 hours.


Pay me and you make new choice.

4. Receiving video only personally.

5. Delete all the data.


Time has begun.


***##$$

iPhone X, iOS 12

Posted on Sep 25, 2018 12:16 AM

Reply
Question marked as Top-ranking reply

Posted on Sep 25, 2018 8:06 AM

It's a scam. They have no such recordings. There have been multiple topics on these forums regarding this same stupid email.


This is one of the results of the many hacked servers you've seen in the news where they've stolen millions of customer data records. They're using the data to send out these bogus emails to the addresses harvested in the hacks. It's also where they got your phone number from to make the claims more believable.


It's still just scam. They have nothing, but are hoping you'll give them lots of money for nothing.


DO NOT respond to these emails in any way. Just delete them.

Similar questions

36 replies

Sep 25, 2018 8:35 AM in response to andyandy6789

Oh, I just received the same email and I'm living in South Korea.

And I don't ever remember that I approached to a **** site using my phone unless I'm a sleepwalker who's unconsciousness is full of that, (well, happy that I'm not.)


So that was the point I first doubted about the email..

Furthermore, I actually don't give a **** to it and am not quite afraid if everyone in my contact gets to know my private life with photos or video of myself. I got only 40 contacts in my phone anyways. Also, everybody's got dark sides which they try to hide so people will understand and eventually forget about me.


BUT! I'm happy to know clearly that this email is just a scam,

Thanks everyone for sharing ideas.

Sep 27, 2018 6:16 PM in response to andyandy6789

They just have a partial number. I think somebody hacked a site that sends a code to your phone to prove it's you when you login. A lot like this site does...(Hmmm...). All they can see is part of your number and your email. address. If they really had your entire number I'm sure they wouldn't hesitate to show you. Seeing your entire phone number would scare the crap out of people and would definitely bring in a huge amount of money!!!

Sep 26, 2018 2:45 PM in response to BoyTheo

Hi,

Before you register to a website, please make sure that the website is secured; ie. Https instead of http. If they are using http, use a password that is not used in other website login.


Anyone can create a form, make it looks like a password field (but it actually not), and store it in the database as is, not encrypted. And if the database itself not encrypted, well..


Hope it helps.



A.

Sep 26, 2018 4:31 PM in response to Aquanova27

Sorry, but that doesn't help. The site for a bank or whatever itself can be secure, but that has nothing to do with how the transferred data is stored.


HTTPs only ensures that the site and your browser have negotiated an encryption key that only they know. No one who snags data packets in between can do anything with it since they don't have the decryption key.


But, once the bank (insurance company, etc.) has your data, they can choose to add it to an encrypted, or unencrypted database.

Sep 27, 2018 1:38 AM in response to Kurt Lang

No one here is listening. As I said at the start... HACKERS HAVE STOLEN SO MANY DATABASES AND THEN DECRYPT PASSWORDS... Or even the passwords are stored in plain-text. Once they have that, they have a password you are using on many sites.


And as I said, already... at the start... that no one even listened to...


NONE OF THAT IS EVEN NECESSARY.


Just store a HASH OF THE PASSWORD. A salted-hash using a salt unique to your company.


Don't tell me "use a unique password per site". No one does that... unless they log in to only 2 websites. Anyone who uses the internet a lot... who has used hundreds of websites, will be reusing passwords. That or using some "password solution" to generate unique-passwords per-site... and remember it for them... but that's not built in or standardised... most people are only able to just reuse a few passwords.


Anyone saying anything different is either a hypocrit or has only ever logged into two websites. One being this one apple.com... so they probably only log into one other website in their entire life time.

Sep 27, 2018 6:26 PM in response to BoyTheo

BoyTheo wrote:


Don't tell me "use a unique password per site". No one does that


I do that. I have a password vault that has a unique random password for each site I visit. It's no trouble at all; the password vault application generates the password. When I log into a site the vault provides the password for that specific site. I have over 400 sites in the vault, each with a unique password. There are quite a few password vault apps. 1password is probably the most popular. I happen to use SplashID Safe, because it was one of the first. It has my passwords back almost 20 years. And if you have Apple products there's a built in one called Keychain.




Anyone saying anything different is either a hypocrit or has only ever logged into two websites. One being this one apple.com... so they probably only log into one other website in their entire life time.

And no, I am not a hypocrite. As I said, I have unique passwords for 400 different logins, websites, apps and servers that I manage. Although I use public/private key pairs for servers these days.

Sep 28, 2018 9:49 AM in response to Lawrence Finch

Where am I going wrong in thinking that separate passwords and a vault to manage them, including Keychain, are necessary only because it's not so remote a possibility any one of them might somehow be cracked.


The vault is local, presumably protected by at least a router firewall, and the websites are all accessed remotely; they might have wonderful protection but we have no control over that.


Other than that, why does the original logic not make it scary to put everything in one vault… particularly if it's on a lap-top, whose theft will negate the router firewall and give the thieves all day to hack it, while at the same time presumably leaving the owner locked out of everything and unable even to close down accounts?

Sep 28, 2018 10:03 AM in response to Robbie Goodwin

Well, you need a strong password for the password vault app. That's a given. Mine is 26 random characters (not random to me, but would be to anyone else). It's a password I don't use anywhere else. And with a good vault it is the encryption key for the contents of the vault. For a password of the length I use the time to hack it would be greater than the lifetime of the Sun.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Hack - iPhone camera and websites

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.