What is the “Is Visiting A More Convenient Way To Reach” email

What is the “Is Visiting A More Convenient Way To Reach” email

“Is Visiting A More Convenient Way To Reach” email is a sextortion scam that falsely claims users’ computers have been infected with malware, which supposedly allowed its operators to create a video of users watching pornography. The contents of the email are completely fake but this particular email uses a new tactic to convince users of its legitimacy. This sextortion includes a photo of the recipient’s home or street and reveals their addresses.

 

 

Sextortion emails have been around for years, and most users will have received at least one at some point. They all look more or less the same so if you’ve seen one, you’ve seen them all. However, some sextortion emails come up with new tactics to alarm users and pressure them into paying. Revealing users’ passwords is a common tactic but this particular “Is Visiting A More Convenient Way To Reach” email uses a new one. The email includes the recipient’s home addresses and an image of either their streets or their homes. This will certainly alarm many users and convince them to pay. However, this sextortion email is still a scam and its contents are fake.

This “Is Visiting A More Convenient Way To Reach” email starts by revealing the recipient’s home address. It also includes an image of the recipient’s street or house. This image makes it seem like it was taken in person but it’s actually an edited image from Google Maps or a similar service. The text that follows is what’s usually included in sextortion emails. The sender uses a demeaning tone to explain that they noticed the recipient browsing adult websites and watching pornography after infecting their device with the Pegasus malware. Pegasus is a legitimate malicious program developed by an Israeli cyber-intelligence company NSO Group. It’s commonly used by governments to spy on various parties and individuals. Scammers likely use known malware names to scare users in case they try to research what the malware is.

The email sender claims that they recorded users watching pornography and will send this video to all contacts unless users agree to pay $1,950. Paying would be a complete waste of money because the contents of the email are fake. If you receive this email, there is no malware on your computer, nor do malicious actors have a video of you watching pornography.

The full “Is Visiting A More Convenient Way To Reach” email is provided below:

Is visiting – a more convenient way to reach in case you don’t act

Have been here before?

I suggest you read this message carefully. Take a minute to relax, breathe, and really dig into it. ‘Cause we’re about to discuss a deal between you and me, and I don’t play games. You don’t know me but I know ALOT about you and you must be wondering how, correct?

Well, You’ve been treading on thin ice with your browsing habits, scrolling through those filthy videos and clicking on links, stumbling upon some not-so-safe sites. I actually placed a Spyware called “Pegasus” on a app you frequently use. Pegasus is a spyware that is designed to be covertly and remotely installed on mobile phones running iOS and Android. And while you were busy enjoying those videos, your smartphone initiated working as a RDP (Remote Control) which allowed me complete control over your device. I can look at everything on your display, flick on your cam and mic, and you wouldn’t even suspect a thing. Oh, and I’ve got access to all your emails, contacts, and social media accounts too.

What did I do?
Been keeping tabs on your pathetic life for a while now. It’s just your bad luck that I discovered your bad deeds. I gave in more days than I probably should have exploring into your personal life. Extracted quite a bit of juicy info from your system. and I’ve seen it all. Yeah, Yeah, I’ve got footage of you doing embarrassing things in your room (nice setup, by the way). I then developed videos and screenshots where on one side of the screen, there’s whatever garbage you had been playing, and on the other half, its someone jerking off.
With simply a click, I can send this garbage to every single of your contacts.

What should you do?
I see you are getting anxious, but let’s get real. In good faith, I want to wipe the slate clean, and allow you to continue with your life and forget you ever existed. I am about to offer you two options. Either ignore this warning (bad for you and your family) or pay me a small amount. Let us examine those two options in details.
Alternative one is to turn a deaf ear my e mail. Let us see what will happen if you opt this option. I will send your video to all of your contacts. The video was lit, and I can’t even fathom the humiliation you’ll endure when your colleagues, friends, and fam check it out. But hey, that’s life, ain’t it? Don’t be playing the victim
Wise Second Option is to pay me, and be confidential about it. We’ll call it my “privacy charges”. Lets discuss what happens if you opt this choice. Your dirty secret will remain private. I’ll destroy all the data and evidence once you send payment. You have to make the payment via Bitcoin only. Pay attention, I’m telling you straight:

‘We gotta make a deal’. I want you to know Im coming at you with good intentions. My promises are non-negotiable.

Transfer Amount: USD 1950
My BTC Address: 1NSaKPShj9t3rWVQBUit7VhBWmXUY8HHyC
Or, (Here’s your Bitcoin QR code, you can scan it):

Let me tell ya, it’s peanuts for your tranquility.

Important: You got one day to sort this out. (I’ve a unique pixel within this e-mail, and right now I know that you have read this email message). My system will catch that Bitcoin payment and wipe out all the dirt I got on you. Don’t even think about replying to this, it’s pointless. The email and wallet are custom-made for you, untraceable. I don’t make mistakes, Robert. If I suspect that you’ve shared or discussed this email with anyone abu, these or view is any se geting sept your contacts. And don’t even think about tuming off

Honestly, those online tips about covering your camera aren’t as useless as they seem.

Don’t dwell on it. Take it as a little lesson and keep your guard up in the future.

How did sextortion scammers obtain your personal information?

Revealing users’ personal information in a sextortion email has proven to be a successful tactic. Users get very alarmed when they see their information in such an email and are much more likely to react. Many users may wonder how malicious actors were able to obtain such information if not because of malware on their computers. There’s a simple explanation for how this information is acquired, and it has nothing to do with malware on users’ computers. Users’ personal information is stolen in cyberattacks targeting companies and then sold on hacker forums and marketplaces. What likely happened in this particular case is scammers purchased users’ home addresses and included Google Maps images of those addresses in the emails. The images may seem like they were taken in person but that is not the case.

Unfortunately, receiving this particular sextortion email likely means that your email address and home address have been leaked. Email addresses are leaked all the time, which is why we all receive so many scam emails. However, while leaked email addresses are nothing out of the ordinary and not something you should worry about, leaked home addresses are a cause for concern. It’s very likely that a huge breach has taken place recently and highly personal information was stolen. This information likely ended up on hacker forums and marketplaces.

Site Disclaimer

WiperSoft.com is not sponsored, affiliated, linked to or owned by malware developers or distributors that are referred to in this article. The article does NOT endorse or promote malicious programs. The intention behind it is to present useful information that will help users to detect and eliminate malware from their computer by using WiperSoft and/or the manual removal guide.

The article should only be used for educational purposes. If you follow the instructions provided in the article, you agree to be bound by this disclaimer. We do not guarantee that the article will aid you in completely removing the malware from your PC. Malicious programs are constantly developing, which is why it is not always easy or possible to clean the computer by using only the manual removal guide.

Leave a comment

Your email address will not be published.