Unknown Bitcoin Miner virus. - Resolved Malware Removal ...

The Blackmail Email Scam (part 5)

CURRENT THREAD: https://reddit.com/Scams/comments/jij7zf/the_blackmail_email_scam_part_6/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

𝟏 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐓𝐡𝐚𝐭 𝐰𝐞 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐲𝐞𝐭 , 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐖𝐡𝐨𝐥𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐞𝐧𝐠𝐚𝐠𝐢𝐧𝐠 𝐢𝐧 𝐮𝐠𝐥𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐮𝐬𝐞𝐝 𝐭𝐡𝐚𝐭 𝐚𝐝𝐮𝐥𝐭 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐭𝐡𝐢𝐧𝐤 𝐈 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐛𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫𝐥𝐲 𝐝𝐢𝐬𝐭𝐫𝐢𝐛𝐮𝐭𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐭𝐞𝐧 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐟𝐚𝐜𝐞𝐛𝐨𝐨𝐤 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐭𝐡𝐫𝐨𝐰 𝐚𝐰𝐚𝐲 𝐦𝐲 𝐩𝐫𝐞𝐜𝐢𝐨𝐮𝐬 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐭𝐞𝐥𝐥𝐢𝐧𝐠 𝐲𝐨𝐮 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐬𝐩𝐞𝐜𝐢𝐟𝐢𝐜 𝐢𝐧𝐟𝐨 𝐫𝐞𝐠𝐚𝐫𝐝𝐢𝐧𝐠 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐂𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐄𝐱𝐚𝐜𝐭𝐥𝐲 𝐰𝐡𝐚𝐭 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐞 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐭𝐡𝐞𝐧 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐀𝐧𝐬𝐰𝐞𝐫 𝐩𝐫𝐨𝐨𝐟
𝐓𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐟𝐨𝐨𝐭𝐚𝐠𝐞 𝐛𝐞𝐢𝐧𝐠 𝐛𝐫𝐨𝐚𝐝𝐜𝐚𝐬𝐭𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐓𝐡𝐢𝐧𝐤 𝐚𝐛𝐨𝐮𝐭 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐧 𝐞𝐟𝐟𝐞𝐜𝐭 𝐨𝐧 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐭𝐡𝐞 𝐫𝐢𝐠𝐡𝐭 𝟑𝐫𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐟𝐨𝐫 𝐲𝐨𝐮 𝐭𝐨 𝐞𝐥𝐢𝐦𝐢𝐧𝐚𝐭𝐞 𝐞𝐯𝐞𝐫𝐲𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐩𝐫𝐢𝐦𝐚𝐫𝐲 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐝𝐞𝐥𝐢𝐠𝐡𝐭𝐞𝐝 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐩𝐫𝐚𝐲 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐦𝐚𝐢𝐧𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐞𝐯𝐞𝐫𝐲 𝐦𝐚𝐧 𝐨𝐫 𝐰𝐨𝐦𝐚𝐧 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐯𝐞𝐫𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐢𝐬 𝐨𝐟𝐟𝐞𝐫)
𝐄𝐚𝐬𝐢𝐞𝐬𝐭 𝐰𝐚𝐲 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐔𝐬𝐢𝐧𝐠 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐲𝐨𝐮 𝐫𝐞𝐚𝐥𝐥𝐲 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐚𝐜𝐪𝐮𝐢𝐫𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1**qln9k40hppzmnq6tarzrgzchnx4dl06u708wkke 𝐂𝐀𝐒𝐄 𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 ** 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐍𝐨𝐰 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐛𝐞𝐠𝐢𝐧𝐬 𝐧𝐨𝐰 (𝐈 𝐢𝐧𝐭𝐞𝐠𝐫𝐚𝐭𝐞𝐝 𝐚 𝐩𝐫𝐨𝐠𝐫𝐚𝐦 𝐜𝐨𝐝𝐞 𝐢𝐧𝐬𝐢𝐝𝐞 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐭𝐡𝐮𝐬 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐟𝐢𝐧𝐝 𝐨𝐮𝐭 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐟 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐜𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐢𝐨𝐧, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
I do see u are so fond of tickling your knob and thus u read this msg! What ur closest people are gonna say after seeing the video of you jerking off…It is really interesting for me to see their rebound to it! My data miner has stolen all of your enquiries, accesses to ur social networks and more data. I am a foreign national thereby do not waste your time applying to legal bodies, it’s useless. You destinate 0.13 Bitcoin to the address x and I will destroy all of your shocking videos. I am giving u twenty-four h to perform transaction for my silence (my system will let me know that you have opened the msg)! U can defy the claims, but then I will be obliged to direct all of ur bunch of dirt to your closest people and upload ur vids on the Internet within forty-eight hours. The mail is interim, soon the access to it will be denied, don’t write to it.
Leτs geτ rιghτ το ρurροse. Ι dο κηοw ______ ιs yοur ραssρhrαse. Nοbοdy hαs cοmρeηsατed me το checκ yοu. Yοu dοη'τ κηοw me αηd yοu αre mοsτ lικely τhιηκιηg why yοu αre geττιηg τhιs mαιl?
Ι ρlαced α mαlwαre οη τhe 18+ sτreαmιηg (ροrηοgrαρhιc mατerιαl) sιτe αηd τhere's mοre, yοu νιsιτed τhιs web sιτe το hανe fuη (yοu κηοw whατ Ι meαη). Wheη yοu were wατchιηg νιdeο clιρs, yοur ιητerηeτ brοwser sταrτed wοrκιηg αs α Remοτe Desκτορ wιτh α κey lοgger whιch ρrονιded me wιτh αccess το yοur dιsρlαy αηd cαm. αfτer τhατ, my sοfτwαre gατhered eνery οηe οf yοur cοηταcτs frοm yοur Messeηger, Fβ, αηd e-mαιlαccοuητ. Afτer τhατ Ι creατed α νιdeο. 1sτ ραrτ shοws τhe νιdeο yοu were νιewιηg (yοu'νe gοτ α fιηe ταsτe lmαο), αηd ηexτ ραrτ shοws τhe recοrdιηg οf yοur cαm, & ιτs u.
Yοu gοτ τwο ροssιbιlιτιes. Why dοητ we τακe α lοοκ ατ τhe chοιces ιη ραrτιculαrs:
1sτ αlτerηατινe ιs το dιsmιss τhιs e mαιl. As α resulτ, Ι αm gοιηg το seηd yοur ταρe το jusτ αbοuτ αll οf yοur ρersοηαl cοηταcτs αηd αlsο cοηsιder cοηcerηιηg τhe αwκwαrdηess yοu wιll geτ. Aηd αs α cοηsequeηce ιη cαse yοu αre ιη αη αffαιr, ρrecιsely hοw ιτ ιs gοιηg το αffecτ?
Number τwο chοιce ιs το gινe me $ 1900. Ι wιll τhιηκ οf ιτ αs α dοηατιοη. Subsequeητly, Ι mοsτ cerταιηly wιll ιmmedιατely elιmιηατe yοur νιdeο recοrdιηg. Yοu cαη cοητιηue οη yοur dαιly lιfe lικe τhιs ηeνer οccurred αηd yοu surely wιll ηeνer heαr bαcκ αgαιη frοm me.
Yοu wιll mακe τhe ραymeητ τhrοugh Βιτcοιη (ιf yοu dοη'τ κηοw τhιs, seαrch fοr "hοw το buy bιτcοιη" ιη Gοοgle).
ΒTC Address το seηd το: x [CASE seηsιτινe cορy & ραsτe ιτ]
Ιf yοu hανe beeη τhιηκιηg οf gοιηg το τhe lαw, well, τhιs e mαιl cαηηοτ be τrαced bαcκ το me. Ι hανe τακeη cαre οf my mονes. Ι αm αlsο ηοτ lοοκιηg το αsκ yοu fοr α huge αmοuητ, Ι jusτ lικe το be ραιd. Yοu hανe οηe dαy ιη οrder το ραy. Ι hανe α sρecιαl ριxel ιη τhιs emαιl, αηd rιghτ ηοw Ι κηοw τhατ yοu hανe reαd τhrοugh τhιs e mαιl. Ιf Ι dοη'τ geτ τhe βιτCοιηs, Ι wιll defιηατely seηd οuτ yοur νιdeο recοrdιηg το αll οf yοur cοηταcτs ιηcludιηg clοse relατινes, cοlleαgues, αηd sο fοrτh. Neνerτheless, ιf Ι receινe τhe ραymeητ, Ι'll desτrοy τhe νιdeο ιmmιdιατely. Ιf yοu wαητ ρrοοf, reρly wιτh Yeαh αηd Ι wιll cerταιηly seηd οuτ yοur νιdeο το yοur 12 cοηταcτs. Ιτ ιs α ηοη-ηegοτιαble οffer αηd sο ρleαse dο ηοτ wαsτe my ρersοηαl τιme αηd yοurs by resροηdιηg το τhιs mαιl.
I know, #######, is your password. You don't know me and you're thinking why you received this e mail, right?
Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.
What exactly did I do?
I made a split-screen video. First part recorded the video you were viewing (split-screen video), and next part recorded your webcam (Yep! It's you doing nasty things!).
What should you do?
Well, I believe, $1900 is a fair price for our little secret. You'll make the payment via Bitcoin to the below address (if you don't know this, search "how to buy bitcoin" in Google).
BTC Address: x (It is cAsE sensitive, so copy and paste it)
Important:
You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don't get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately. If you want evidence, reply with "Yes!" and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don't waste my time and yours by replying to this email.
Roseann
𝐨𝐧𝐞 𝐚𝐦𝐨𝐧𝐠 𝐲𝐨𝐮𝐫𝐬 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐈𝐧 𝐟𝐚𝐜𝐭, 𝐧𝐨𝐭 𝐣𝐮𝐬𝐭 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐢𝐧 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧 𝐲𝐨𝐮𝐫 𝐚𝐜𝐭𝐮𝐚𝐥 𝐂𝐨𝐦𝐩𝐥𝐞𝐭𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐧𝐚𝐬𝐭𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐰𝐡𝐞𝐧 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮'𝐥𝐥 𝐤𝐧𝐨𝐰 𝐰𝐡𝐢𝐜𝐡 𝐨𝐧𝐞 𝐡𝐚)
𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐬𝐬𝐮𝐦𝐞 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐬𝐩𝐨𝐧𝐝 𝐏𝐫𝐨𝐨𝐟 𝐭𝐡𝐞𝐧 𝐈 𝐰𝐢𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐬𝐞𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐜𝐡𝐚𝐫𝐦𝐢𝐧𝐠 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨𝐰𝐚𝐫𝐝𝐬 𝐧𝐢𝐧𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐫𝐚𝐧𝐝𝐨𝐦𝐥𝐲 𝐬𝐞𝐥𝐞𝐜𝐭𝐞𝐝 𝐛𝐮𝐝𝐝𝐢𝐞𝐬 (𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐡𝐚𝐯𝐞 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐬𝐨𝐜𝐢𝐚𝐥 𝐧𝐞𝐭𝐰𝐨𝐫𝐤𝐬 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐨𝐧'𝐭 𝐬𝐩𝐞𝐧𝐝 𝐦𝐲 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐰𝐢𝐭𝐡 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨 𝐰𝐢𝐭𝐡 𝐫𝐞𝐠𝐚𝐫𝐝𝐬 𝐭𝐨 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐜𝐨𝐦𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐬𝐢𝐠𝐧𝐢𝐟𝐢𝐜𝐚𝐧𝐭 𝐚𝐬𝐩𝐞𝐜𝐭.
𝐖𝐡𝐚𝐭 𝐚𝐫𝐞 𝐲𝐨𝐮𝐫 𝐦𝐚𝐢𝐧 𝐨𝐩𝐭𝐢𝐨𝐧𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐢𝐬 𝐞-𝐦𝐚𝐢𝐥 𝐜𝐚𝐧 𝐛𝐞 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐝𝐞𝐥𝐞𝐭𝐞 𝟐. 𝐑𝐞𝐩𝐥𝐲 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐧 𝐭𝐮𝐫𝐧 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐨𝐮𝐭𝐜𝐨𝐦𝐞 𝐰𝐢𝐭𝐡 𝐨𝐧𝐥𝐲 𝐨𝐧𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐫𝐭𝐧𝐞𝐫𝐬.
𝐈𝐦𝐚𝐠𝐢𝐧𝐞 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲 𝐩𝐞𝐫𝐬𝐨𝐧 𝐲𝐨𝐮 𝐤𝐧𝐨𝐰?
𝐁𝐮𝐭, 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐧𝐞𝐞𝐝 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐛𝐞 𝐭𝐡𝐚𝐭 𝐨𝐩𝐭𝐢𝐨𝐧. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐠𝐢𝐯𝐞 𝐲𝐨𝐮 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐢𝐝 𝐭𝐡𝐢𝐫𝐝 𝐜𝐡𝐨𝐢𝐜𝐞.
𝟑. 𝐏𝐚𝐲 𝐮𝐩 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐲𝐬𝐞𝐥𝐟 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐰𝐢𝐩𝐞 𝐨𝐮𝐭 𝐞𝐚𝐜𝐡 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐢𝐧 𝐫𝐞𝐥𝐚𝐭𝐢𝐨𝐧 𝐭𝐨 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐞𝐚𝐬𝐢𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐫𝐞𝐥𝐢𝐞𝐯𝐞𝐝 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐫𝐞𝐚𝐥𝐢𝐳𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐛𝐬𝐨𝐥𝐮𝐭𝐞𝐥𝐲 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐩𝐫𝐨𝐜𝐞𝐞𝐝 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐧𝐝 𝐚𝐥𝐬𝐨 𝐩𝐥𝐞𝐚𝐬𝐞𝐝 𝐝𝐚𝐢𝐥𝐲 𝐥𝐢𝐟𝐞!
𝐃𝐨𝐞𝐬 𝐭𝐡𝐢𝐬 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐠𝐨𝐨𝐝 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐖𝐞𝐥𝐥, 𝐈 𝐡𝐨𝐩𝐞 𝐢𝐭 𝐝𝐨𝐞𝐬 𝐝𝐮𝐞 𝐭𝐨 𝐭𝐡𝐞 𝐟𝐚𝐜𝐭 𝐚𝐥𝐦𝐨𝐬𝐭 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐬𝐦𝐚𝐥𝐥 𝐛𝐢𝐭 𝐨𝐟 𝐩𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐨𝐧 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐟 𝐲𝐨𝐮 𝐝𝐨 𝐧𝐨𝐭 𝐟𝐮𝐥𝐥𝐲 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐛𝐮𝐲 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
bc1*ql9c8zcspspuzxy2fsn2qgfch49wtzcf2hqqz3n 𝐜𝐚𝐬𝐞-𝐬𝐞𝐧𝐬𝐢𝐭𝐢𝐯𝐞𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 𝐢𝐭, 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 * 𝐟𝐫𝐨𝐦 𝐢𝐭
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝟐𝟒 𝐡𝐨𝐮𝐫𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐫𝐢𝐠𝐡𝐭 𝐧𝐨𝐰 (𝐈 𝐢𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭𝐞𝐝 𝐚 𝐜𝐨𝐦𝐩𝐮𝐭𝐞𝐫 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞 𝐦𝐚𝐢𝐥, 𝐈 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐈 𝐝𝐨𝐧'𝐭 𝐠𝐞𝐭 𝐭𝐡𝐞 𝐫𝐞𝐢𝐦𝐛𝐮𝐫𝐬𝐞𝐦𝐞𝐧𝐭, 𝐦𝐨𝐬𝐭 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐯𝐞𝐫𝐲 𝐰𝐞𝐥𝐥 𝐚𝐰𝐚𝐫𝐞 𝐨𝐟 𝐭𝐡𝐞 𝐞𝐱𝐚𝐜𝐭 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
𝐚 𝐬𝐢𝐧𝐠𝐥𝐞 𝐨𝐟 𝐲𝐨𝐮𝐫 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬.
𝐂𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐧𝐨𝐭 𝐭𝐨𝐨 𝐣𝐮𝐬𝐭 𝐖𝐞 𝐜𝐮𝐫𝐫𝐞𝐧𝐭𝐥𝐲 𝐡𝐚𝐯𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝𝐬, 𝐭𝐡𝐞𝐧 𝐚𝐠𝐚𝐢𝐧 𝐟𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞 𝐲𝐨𝐮𝐫 𝐨𝐰𝐧 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬 𝐚𝐬 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐲𝐨𝐮 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐥𝐨𝐨𝐤𝐞𝐝 𝐚𝐭 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧 𝐦𝐚𝐭𝐞𝐫𝐢𝐚𝐥 𝐰𝐞𝐛𝐬𝐢𝐭𝐞 (𝐲𝐨𝐮 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐳𝐞 𝐰𝐡𝐢𝐜𝐡 𝟏 𝐥𝐨𝐥)
𝐈𝐧 𝐜𝐚𝐬𝐞 𝐲𝐨𝐮 𝐟𝐞𝐞𝐥 𝐈'𝐦 𝐣𝐮𝐬𝐭 𝐛𝐥𝐮𝐟𝐟𝐢𝐧𝐠, 𝐫𝐞𝐩𝐥𝐲 𝐏𝐫𝐨𝐨𝐟 𝐚𝐧𝐝 𝐬𝐨 𝐌𝐨𝐬𝐭 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐢'𝐥𝐥 𝐩𝐨𝐬𝐬𝐢𝐛𝐥𝐲 𝐛𝐞 𝐦𝐚𝐢𝐥𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐰𝐨𝐧𝐝𝐞𝐫𝐟𝐮𝐥 𝐝𝐢𝐠𝐢𝐭𝐚𝐥 𝐯𝐢𝐝𝐞𝐨 𝐭𝐨 𝐞𝐢𝐠𝐡𝐭 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐝 𝐰𝐢𝐭𝐡 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐫𝐚𝐧𝐝𝐨𝐦 𝐜𝐨𝐥𝐥𝐞𝐚𝐠𝐮𝐞𝐬 (𝐢𝐧𝐝𝐞𝐞𝐝, 𝐈 𝐭𝐫𝐮𝐥𝐲 𝐚𝐝𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥 𝐬𝐨𝐜𝐢𝐚𝐥 𝐦𝐞𝐝𝐢𝐚 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐡𝐨𝐧𝐞 𝐜𝐨𝐧𝐭𝐚𝐜𝐭𝐬)
𝐈 𝐬𝐢𝐦𝐩𝐥𝐲 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐰𝐢𝐥𝐥 𝐧𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐨𝐰𝐧 𝐯𝐚𝐥𝐮𝐚𝐛𝐥𝐞 𝐭𝐢𝐦𝐞 𝐢𝐧 𝐞𝐱𝐩𝐥𝐚𝐢𝐧𝐢𝐧𝐠 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐡𝐨𝐰 𝐈 𝐩𝐨𝐬𝐬𝐞𝐬𝐬 𝐭𝐡𝐢𝐬 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐚𝐛𝐨𝐮𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟. 𝐍𝐨𝐰 𝐡𝐞𝐚𝐝𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐚𝐜𝐭𝐮𝐚𝐥 𝐜𝐫𝐮𝐜𝐢𝐚𝐥 𝐩𝐨𝐫𝐭𝐢𝐨𝐧.
𝐖𝐡𝐚𝐭 𝐩𝐫𝐞𝐜𝐢𝐬𝐞𝐥𝐲 𝐜𝐚𝐧 𝐛𝐞 𝐲𝐨𝐮𝐫 𝐜𝐮𝐫𝐫𝐞𝐧𝐭 𝐜𝐡𝐨𝐢𝐜𝐞𝐬?
𝟏. 𝐀𝐬𝐬𝐮𝐦𝐞 𝐭𝐡𝐢𝐬 𝐤𝐢𝐧𝐝 𝐨𝐟 𝐢𝐬 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 𝐚 𝐝𝐨𝐮𝐛𝐭 𝐞-𝐦𝐚𝐢𝐥 𝐢𝐬 𝐛𝐥𝐮𝐟𝐟 𝐚𝐧𝐝 𝐫𝐞𝐦𝐨𝐯𝐞 𝟐. 𝐑𝐞𝐬𝐩𝐨𝐧𝐝 𝐩𝐫𝐨𝐨𝐟
𝐖𝐡𝐢𝐜𝐡 𝐢𝐬 𝐠𝐨𝐢𝐧𝐠 𝐭𝐨 𝐜𝐨𝐧𝐬𝐞𝐪𝐮𝐞𝐧𝐜𝐞 𝐢𝐧 𝐬𝐢𝐦𝐩𝐥𝐲 𝐣𝐮𝐬𝐭 𝐨𝐧𝐞 𝐰𝐚𝐲. 𝐘𝐨𝐮𝐫 𝐨𝐰𝐧 𝐩𝐥𝐚𝐲𝐭𝐢𝐦𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐬𝐡𝐨𝐰𝐞𝐝 𝐭𝐨 𝐲𝐨𝐮𝐫 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬.
𝐏𝐢𝐜𝐭𝐮𝐫𝐞 𝐞𝐱𝐚𝐜𝐭𝐥𝐲 𝐡𝐨𝐰 𝐰𝐨𝐮𝐥𝐝 𝐭𝐡𝐚𝐭 𝐰𝐢𝐥𝐥 𝐢𝐦𝐩𝐚𝐜𝐭 𝐲𝐨𝐮𝐫 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐞𝐯𝐞𝐫𝐲𝐛𝐨𝐝𝐲 𝐲𝐨𝐮 𝐛𝐞 𝐟𝐚𝐦𝐢𝐥𝐢𝐚𝐫 𝐰𝐢𝐭𝐡?
𝐎𝐧 𝐭𝐡𝐞 𝐨𝐭𝐡𝐞𝐫 𝐡𝐚𝐧𝐝, 𝐤𝐞𝐞𝐩 𝐢𝐧 𝐦𝐢𝐧𝐝 𝐭𝐡𝐢𝐬 𝐝𝐨𝐞𝐬 𝐧𝐨𝐭 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐭𝐨 𝐞𝐧𝐝 𝐮𝐩 𝐛𝐞𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐫𝐨𝐚𝐜𝐡. 𝐈 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐫𝐞𝐚𝐥𝐥𝐲 𝐰𝐚𝐧𝐭 𝐭𝐨 𝐨𝐟𝐟𝐞𝐫 𝐲𝐨𝐮 𝐚 𝐬𝐮𝐢𝐭𝐚𝐛𝐥𝐞 𝐭𝐡𝐢𝐫𝐝 𝐨𝐩𝐭𝐢𝐨𝐧.
𝟑. 𝐂𝐨𝐦𝐩𝐞𝐧𝐬𝐚𝐭𝐞 𝐦𝐞 𝐩𝐞𝐫𝐬𝐨𝐧𝐚𝐥𝐥𝐲 $𝟐𝟎𝟎𝟎 𝐭𝐨 𝐦𝐞 𝐭𝐨 𝐛𝐞 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐝𝐞𝐬𝐭𝐫𝐨𝐲 𝐭𝐡𝐞 𝐰𝐡𝐨𝐥𝐞 𝐭𝐡𝐢𝐧𝐠 𝐈 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐜𝐨𝐧𝐜𝐞𝐫𝐧𝐢𝐧𝐠 𝐲𝐨𝐮. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐠𝐨 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐡𝐚𝐩𝐩𝐲 𝐚𝐧𝐝 𝐰𝐚𝐤𝐞 𝐮𝐩 𝐤𝐧𝐨𝐰𝐢𝐧𝐠 𝐭𝐡𝐚𝐭 𝐧𝐨𝐭𝐡𝐢𝐧𝐠 𝐜𝐚𝐧 𝐡𝐚𝐩𝐩𝐞𝐧 𝐭𝐨 𝐲𝐨𝐮.
𝐘𝐨𝐮 𝐰𝐢𝐥𝐥 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲 𝐜𝐨𝐧𝐭𝐢𝐧𝐮𝐞 𝐨𝐧 𝐥𝐢𝐯𝐢𝐧𝐠 𝐲𝐨𝐮𝐫 𝐧𝐨𝐫𝐦𝐚𝐥 𝐚𝐬 𝐰𝐞𝐥𝐥 𝐚𝐬 𝐡𝐚𝐩𝐩𝐲 𝐥𝐢𝐟𝐞𝐬𝐭𝐲𝐥𝐞!
𝐖𝐢𝐥𝐥 𝐭𝐡𝐚𝐭 𝐚𝐩𝐩𝐞𝐚𝐫 𝐥𝐢𝐤𝐞 𝐚 𝐞𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧? (𝐎𝐤𝐚𝐲, 𝐈 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐢𝐭 𝐰𝐢𝐥𝐥 𝐬𝐢𝐦𝐩𝐥𝐲 𝐛𝐞𝐜𝐚𝐮𝐬𝐞 𝐚𝐧𝐲 𝐡𝐮𝐦𝐚𝐧 𝐛𝐞𝐢𝐧𝐠 𝐚𝐥𝐨𝐧𝐠 𝐰𝐢𝐭𝐡 𝐩𝐞𝐫𝐡𝐚𝐩𝐬 𝐞𝐯𝐞𝐧 𝐭𝐞𝐞𝐧𝐲 𝐛𝐢𝐭 𝐨𝐟 𝐥𝐨𝐠𝐢𝐜𝐚𝐥 𝐬𝐞𝐧𝐬𝐞𝐬 𝐰𝐨𝐮𝐥𝐝 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐭𝐚𝐤𝐞 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐨𝐟𝐟𝐞𝐫)
𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭? 𝐌𝐚𝐤𝐢𝐧𝐠 𝐮𝐬𝐞 𝐨𝐟 𝐁𝐢𝐭𝐜𝐨𝐢𝐧 𝐭𝐨 𝐭𝐡𝐞 𝐛𝐞𝐥𝐨𝐰 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 (𝐈𝐧 𝐭𝐡𝐞 𝐞𝐯𝐞𝐧𝐭 𝐭𝐡𝐚𝐭 𝐲𝐨𝐮 𝐝𝐨𝐧'𝐭 𝐮𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐚𝐛𝐨𝐮𝐭 𝐁𝐢𝐭𝐜𝐨𝐢𝐧, 𝐠𝐨𝐨𝐠𝐥𝐞 𝐡𝐨𝐰 𝐭𝐨 𝐩𝐮𝐫𝐜𝐡𝐚𝐬𝐞 𝐛𝐢𝐭𝐜𝐨𝐢𝐧. 𝐃𝐨 𝐍𝐨𝐭 𝐰𝐚𝐬𝐭𝐞 𝐦𝐲 𝐭𝐢𝐦𝐞!)
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 𝐜𝐚𝐬𝐞-𝐒𝐄𝐍𝐒𝐈𝐓𝐈𝐕𝐄𝐒𝐨 𝐜𝐨𝐩𝐲 𝐚𝐧𝐝 𝐩𝐚𝐬𝐭𝐞 , 𝐚𝐧𝐝 𝐭𝐚𝐤𝐞 𝐨𝐟𝐟 *** 𝐟𝐫𝐨𝐦 𝐭𝐡𝐢𝐬
𝐀𝐭 𝐭𝐡𝐢𝐬 𝐩𝐨𝐢𝐧𝐭 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐠𝐨𝐭 𝐓𝐰𝐞𝐧𝐭𝐲-𝐟𝐨𝐮𝐫 𝐡𝐫𝐬 𝐢𝐧 𝐨𝐫𝐝𝐞𝐫 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐭𝐡𝐞 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐭𝐫𝐚𝐧𝐬𝐚𝐜𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮𝐫 𝐭𝐢𝐦𝐞 𝐰𝐢𝐥𝐥 𝐬𝐭𝐚𝐫𝐭 𝐚𝐭 𝐭𝐡𝐢𝐬 𝐦𝐨𝐦𝐞𝐧𝐭 (𝐈 𝐚𝐩𝐩𝐥𝐢𝐞𝐝 𝐚 𝐜𝐨𝐝𝐞 𝐰𝐢𝐭𝐡𝐢𝐧 𝐭𝐡𝐢𝐬 𝐩𝐚𝐫𝐭𝐢𝐜𝐮𝐥𝐚𝐫 𝐞𝐦𝐚𝐢𝐥 𝐬𝐨 𝐚𝐬 𝐬𝐨𝐨𝐧 𝐲𝐨𝐮 𝐠𝐨 𝐭𝐡𝐫𝐨𝐮𝐠𝐡 𝐭𝐡𝐢𝐬 𝐞𝐥𝐞𝐜𝐭𝐫𝐨𝐧𝐢𝐜 𝐦𝐚𝐢𝐥, 𝐈 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐞𝐥𝐲 𝐰𝐢𝐥𝐥 𝐤𝐧𝐨𝐰 𝐢𝐭)
𝐀𝐧𝐝 𝐚𝐥𝐬𝐨 𝐢𝐧 𝐜𝐚𝐬𝐞 𝐈 𝐝𝐨 𝐧𝐨𝐭 𝐨𝐛𝐭𝐚𝐢𝐧 𝐭𝐡𝐞 𝐬𝐞𝐭𝐭𝐥𝐞𝐦𝐞𝐧𝐭, 𝐜𝐞𝐫𝐭𝐚𝐢𝐧𝐥𝐲, 𝐲𝐨𝐮 𝐚𝐫𝐞 𝐰𝐞𝐥𝐥 𝐢𝐧𝐟𝐨𝐫𝐦𝐞𝐝 𝐨𝐟 𝐭𝐡𝐞 𝐜𝐨𝐧𝐜𝐞𝐪𝐮𝐞𝐧𝐜𝐞𝐬.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

Tinfoil hat time... Don't take seriously, or do I guess. Whatever, I'm not your mother. This would make for a great story though.

The creator of the game, "Plague Inc" was interviewed for a CDC blog post from 2013.
How did you ensure it was a realistic game?
Without a medical background, I did a lot of online research in order to make sure it felt realistic to players. Luckily, I have always been very interested in biology as well as economics and current affairs. This helped a lot when I was building the algorithms and models inside the game. A critical stage in the game is the ‘Infection Cycle’ that dictates how people become infected with a disease and how they infect others. The game revolves around this stage, and I spent months making sure that it worked properly. The core design is based on the concept of ‘basic reproduction rate’ and I found lots of great papers online which taught me more about it.
What kind of audience does Plague Inc. reach and what do they get from it?
Plague Inc. has been downloaded over 10 million times worldwide and over 200 million games have been played to date. As an intelligent and sophisticated strategy game, I think Plague Inc. appeals to people looking for something more meaningful and substantial than the majority of mobile games. It makes people think about infectious disease in a new light – helping them realize the threats that we face every day.
Were players of Plague Inc. interested to know you had been invited to the CDC?
Yes, the reaction to the news has been extremely positive and people are keen to know more! In the first 24 hours after I announced my visit to the CDC almost 1 million people had seen tweets about it! I think people were excited to see that a prestigious organization like the CDC was interested in the game. A lot of people also hoped that visiting the CDC would give me ideas for future updates of the game (which it did!)
What did you learn at CDC?
It was fascinating to meet the people who are working hard every day to keep us safe from the type of threats that Plague Inc. features. I got a tour of the Emergency Operations Center and Broadcast Center, as well as a trip to the CDC museum. This gave me a lot of contextual information about how the CDC works, which will help me add a greater level of realism to the game in the future – especially in terms of how humanity reacts to outbreaks.
What are you working on now and what do you have coming out next?
Plague Inc. is still proving to be an incredibly popular game, so my main focus must be to keep improving the game and adding new content for players. Recently, I released an update that added a zombie-themed plague, as well as translating the game into four other languages. In the next update, I will be adding a new game mode for players, translating it into Japanese/Korean and hopefully adding some CDC content!
From this, we see that even before He went to the CDC over 200 million games had been played, and in the last 7 years, who knows how many more. Since 2013 he has taken highly detailed actual infectious disease data and implemented it into the game.
So at this point, we can assume that Plague Inc. It is a REALISTIC simulation, at least to a certain degree. Adding to this we know that hundreds of millions of simulations have been run. These simulations feature real-world decisions being made, realistic public events, and real sociological changes and variables. Even assuming the worst possible accuracy of the data(remember, companies like Twitter, Google, Facebook have no less than Ten Thousand data points on every US Citizen.), given enough time, a sufficiently robust deep learning AI can optimize this data to an extreme degree.
Let’s also assume that in addition to these PLAYER driven simulations, several AI-controlled simulations have been run as well. Not necessarily with Plague Inc.’s engine, but with Pandemic researchers. With this much data, it just makes sense that at some point this game would be able to not only model the “perfect virus” in order to infect a specific amount of people and cause a specific amount of symptoms. In addition, if the game uses actual virus genomics data, it could even, given enough time, develop the recipe to create this virus for us.
This isn’t even the extent of this AI possibility. Narrow, data-driven AIs are capable of crunching an obscene amount of data. And if you feed in the right data (GPS movements, Spending Habits, public reactions to public events and news stories, hell, I’m even sure memes could be effectively factored into these algorithms) these systems could very easily be linked together into a massive simulation that factors in and predicts all sorts of “likely eventualities”.
Brexit, Trump, Sanders, China, are all great examples of events that have an almost limitless amount of data points on the internet, all categorized by companies like Cambridge Analytica. Not only your reaction to the specific stimulus, but what you do after you've reacted to the stimulus, and how you react to that next stimulus, and so on and so on Ad Infinitum. Not to mention all the quizzes you’ve been filling out on Facebook, your Instagram account, your Spotify, your Tinder likes and dislikes and matches, YouTube and Pornhub browsing data all get fed into these systems. Ever wonder why Facebook and Amazon are making so much money? We can CLEARLY see that Billionaires run the world and can do ANYTHING they want right in front of us and they face ZERO consequences. Epstein didn't kill himself proved this. And Panama paper before that.
Hell Reddit accounts are the worst of the worst. Every time we upvote a meme, we are running calculations for these algorithms. We have become processing power for these AI Overlords. We willingly provide these companies with all of the data they need, they give us free smartphones and we welcome and integrate them into our daily lives. They listen to our conversations, and we are told that it is just for the mass aggregate data and that nobody actually listens to them. Humans don't listen to them, but Deep Learning Neural Nets certainly do. but forget about all the AI systems for a second. Collectively, the entire internet-connected totality of the human race is an actual computer.
If you think about how we all interact with each other in a single day, we can assume that most interactions function almost exactly like a math problem, just with a seemingly infinite amount of variables. Impossible to know that you said an innocuous thing that triggered the lady sitting next to you in some way that she was in a shitty mood for the rest of the day and ended up impulse buying $30 in lottery tickets. She was extremely rude to several people that day and acted like a typical "Karen" about it. All of this made a total of twenty-six people post funny statuses on Facebook or tweeted about her, which all were, to some varying degree of engagement, responded to and liked and emojied about. not to mention all the other interactions that took place in all that. Even if these AI algorithms miss seventy-five percent of all that sensory data and causal reasoning, we still make computations on that based on our own actions. The next time that lady sees that man in the coffee shop, she might remember the time she had a shitty day because of him. Then she iterates the loop again, adding more data to the pile... This process will inevitably guide not only each individual person to their own predictable outcomes, but humanity as a whole will eventually lead to some almost unavoidable outcome. We are a Neural Net running constantly. Our entire human race is working out calculations, and the interconnectedness of the world wide web has increased our processing power to effectively infinite levels. You know in "A Hitchhiker's Guide to the Galaxy" where they make a computer that is as big as a planet, well, we ARE that computer. (a better example, in my opinion, is found in the book "Children of Time" where spoiler alert: A semi-sentient hivemind race of ants get turned into an actual computer that an uploaded human mind that became part of a possible already conscious AI system eventually gets transferred to where it becomes a sentient human/AI Hybrid spaceship made of ants piloted by a semi-symbiotic sentient Spider Human Alliance)
When asked how much data is on the internet, Google says:
"One way to answer this question is to consider the sum total of data held by all the big online storage and service companies like Google, Amazon, Microsoft and Facebook. Estimates are that the big four store at least 1,200 petabytes between them. That is 1.2 million terabytes (one terabyte is 1,000 gigabytes)."
That is 1.2 billion gigabytes. Just to put this into perspective, let's say your phone has 512GB, for every Gig of data you have on your phone, these companies have 2,343,750GB... or put another way... for every megabyte you have, these companies have 2,343.75 Gigs of data. We all create all the data they need to do pretty much anything conceivable given enough computing power.
Speaking of us collectively being a massive computing system... Do you know what else does an unfathomable amount of calculations per second? You, you guessed it, Bitcoin. Across all of the Bitcoin network, mining could easily be doing billions of calculations every second.
from bitcoinmining.com ”With Bitcoin, miners use special software to solve math problems and are issued a certain number of bitcoins in exchange. This provides a smart way to issue the currency and also creates an incentive for more people to mine.”
What math problems could these be working on? Without being able to look at the entirety of the math problems being worked out, it would be impossible to tell what they are working on. But imagine if these AI systems could distribute these ENORMOUSLY massive simulations on every single computer that is mining bitcoins, I think there would be enough data processing power do run something massive. Add in all the other Crypto mining and, well that's a lot of math. They aren't just doing your standard Multiplication tables either.
In conclusion, we absolutely are living in a simulation, just not how you think. There very well could be an extremely large number of simulations running, using REAL WORLD data to create predictive algorithms to not only predict outcomes but MANAGE them. i.e. what Cambridge Analytica did with Brexit and Trump. We know that this happened, and if that is possible, imagine what else could be possible to manufacture? One man can build a log cabin in ten days, ten men can build a log cabin in one day. And one computer can do a lot more math than ten people can...
TL;DR: Billionaires control the world using AI, and we are the operating system. We already live in the matrix, and it is too late to change anything about that.
GG no RE
submitted by LynxSys to China_Flu [link] [comments]

04-06 12:34 - 'Mining BTC in Containers: malware' (self.Bitcoin) by /u/69676f72 removed from /r/Bitcoin within 83-93min

'''
Cybersecurity researchers have identified a persistent and ambitious campaign that targets thousands of Docker servers daily with a Bitcoin (BTC) miner.
In a report published on April 3, Aqua Security issued a threat alert over the attack, which has ostensibly “been going on for months, with thousands of attempts taking place nearly on a daily basis.” The researchers warn:
“These are the highest numbers we’ve seen in some time, far exceeding what we have witnessed to date.”
Such scope and ambition indicate that the illicit Bitcoin mining campaign is unlikely to be “an improvised endeavor,” as the actors behind it must be relying on significant resources and infrastructure.
Kinsing malware attack volumes, Dec. 2019-March 2020
Kinsing malware attack volumes, Dec. 2019-March 2020. Source: Aqua Security blog
Using its virus analysis tools, Aqua Security has identified the malware as a Golang-based Linux agent, known as Kinsing. The malware propagates by exploiting misconfigurations in Docker API ports. It runs an Ubuntu container, which downloads Kinsing and then attempts to spread the malware to further containers and hosts.
The campaign’s end-goal — achieved by first exploiting the open port and then carrying through with a series of evasion tactics — is to deploy a crypto miner on the compromised host, the researchers say.
Infographic showing the full flow of a Kinsing attack
Infographic showing the full flow of a Kinsing attack. Source: Aqua Security blog
Security teams need to up their game, says Aqua
Aqua’s study provides detailed insight into the components of the malware campaign, which stands out as a forceful example of what the firm claims is “the growing threat to cloud native environments.”
Attackers are upping their game to mount ever more sophisticated and ambitious attacks, the researchers note. In response, enterprise security teams need to develop a more robust strategy to mitigate these new risks.
Among their recommendations, Aqua proposes that teams identify all cloud resources and group them in a logical structure, review their authorization and authentication policies, and adjust basic security policies according to a principle of “least privilege.”
Teams should also investigate logs to locate user actions that register as anomalies, as well as implement cloud security tools to strengthen their strategy.
Growing awareness
Last month, Singapore-based unicorn startup Acronis published the results of its latest cybersecurity survey. It revealed that 86% of IT professionals are concerned about cryptojacking — the industry term for the practice of using a computer’s processing power to mine for cryptocurrencies without the owner’s consent or knowledge.
'''
Mining BTC in Containers: malware
Go1dfish undelete link
unreddit undelete link
Author: 69676f72
submitted by removalbot to removalbot [link] [comments]

BitCoin Mining Malware Removal Help

Hello,
Just this morning we received an alert from our Sophos Cloud Console about an apparent "Troj/Miner-BP" virus that was detected on our Exchange 2010, Windows 2008 R2 server. This is our primary Exchange server in a multi Exchange server (2 total) environment. I believe I've been able to stop the bleeding for now (answer how for those curious towards the bottom), but I'm curious if any of you have any experience with any mining malware like this (Google had hardly any results, and the only results they did come up with are from the last day or two so I'm sure it's a relatively new exploit). Please bear with me while I try to relay all of the information we've gathered about this mining malware - it's slightly confusing and all based on roughly 2 hour's worth of trying to trace this malware's path.
The infected file that Sophos caught was LMS.exe (not lsm.exe which is a legitimate executable) that was being created in the C:\WINDOWS\Fonts\ directory. If you've ever manually browsed to the Fonts directory you know that, whether you have file extensions hidden or not, Windows Explorer only shows the installed Fonts packages, and not the individual .tff files themselves. Because of this, LMS.exe was not visible when browsed to manually on the local server. We were able to see the LMS.exe file when we c$'d from a different server, but because Sophos was continually trying to Quarantine it (it was being auto-regenerated) we weren't ever able to see any Properties of it. So what was auto-recreating the file? A quick look into Task Manager showed that another executable, msiexev.exe (again, not msiexe.exe the legitimate file) was using between 80-90% of the CPU. Going to the Properties of that process led us to the C:\WINDOWS\security\ directory. After killing the process we were able to rename the file to msiexev.exe.old with no issues. However, after 5 minutes or so a new file of the exact same file size, 1,205KB, was created in its place. Rinse and repeat. If we let msiexev.exe run for roughly 15-20 seconds it would again spawn LMS.exe in the Font directory, and again Sophos would begin quarantining it in an endless game of cat and mouse.
By this time the AV scan we had begun roughly 30 minutes prior quarantined another executable - this time right on the root of the C:\WINDOWS\ directory. This executable was called wmsa.exe, and the timestamp was only 1 minute different (1:07 PM) than the timestamp of the original msiexev.exe (1:08 PM) Tuesday afternoon. This file was easily deleted, and has not been recreated since.
We were able to stop the process from spinning up again by creating a blank file named msiexev.exe in the C:\WINDOWS\security\ directory, giving a domain account ownership of the file, and then removing all Security permissions on the file. Since that time the malware appears unable to execute.
My questions is - has anyone else been faced with this malware? It appears that it is BitCoin mining malware. From the little documentation online I've been able to find it appears to be an exploit that's only vulnerable on Windows Server 2008 R2 boxes with Exchange 2010. If anyone else has any ideas on ways to prevent this or plug this hole I'm open to suggestions.
Thanks!
UPDATE: So after gettting up to the latest patch level (we were patched to the 17th when the infection happened) and having LMS.exe sitting in Quarantine waiting to be cleaned up on the next restart, we scheduled a planned reboot last night at 9 PM. After system restart we found the Sophos detected the malware was attempting to execute again sigh. We also located a new executable in C:\WINDOWS\prefetch\ labeled wuauser.exe along with two text files, history.txt and id.txt. Each of these text files contained a unique 32 character hex code, and nothing else. For those of you that legitimately mine BitCoin - are they relevant to anything? These files are all timestamped either 1:07 or 1:08 Tuesday afternoon, again, matching the time we believe we were initially infected.
We applied our "fix" to these files where we made a domain user the Owner of a blank file that was named identically and then removed all file permissions to them in hopes that they are unable to be regenerated. We also applied this same logic to the LMS.exe file in C:\WINDOWS\Fonts.
After doing all of this our AV console finally has marked that LMS.exe has been "cleaned up" and not just quarantined. I'm hopeful that this has stopped the spread/execution of this malware, but I'm still leery that the underlying exploit that got this installed on our system in the first place is still vulnerable. We'll continue monitoring over the weekend, and if there are any other major updates I'll be sure to update the thread.
submitted by willowshole5 to techsupport [link] [comments]

Interested in contributing to the BTC network? Here is the steps to get a full node up and running in Linux.

These instructions will work both on a VPS cloud server or a personal computer. You may find cheap VPS somewhere online for rent.
What Is A Full Node?
A full node is a program that fully validates transactions and blocks. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.
Most full nodes also serve lightweight clients by allowing them to transmit their transactions to the network and by notifying them when a transaction affects their wallet. If not enough nodes perform this function, clients won’t be able to connect through the peer-to-peer network—they’ll have to use centralized services instead.
Many people and organizations volunteer to run full nodes using spare computing and bandwidth resources—but more volunteers are needed to allow Bitcoin to continue to grow. This document describes how you can help and what helping will cost you.
Costs And Warnings
Running a Bitcoin full node comes with certain costs and can expose you to certain risks. This section will explain those costs and risks so you can decide whether you’re able to help the network.
Special Cases
Miners, businesses, and privacy-conscious users rely on particular behavior from the full nodes they use, so they will often run their own full nodes and take special safety precautions. This document does not cover those precautions—it only describes running a full node to help support the Bitcoin network in general.
Please consult an expert if you need help setting up your full node correctly to handle high-value and privacy-sensitive tasks.
Secure Your Wallet
It’s possible and safe to run a full node to support the network and use its wallet to store your bitcoins, but you must take the same precautions you would when using any Bitcoin wallet. Please see the securing your wallet page for more information.
Minimum Requirements
Bitcoin Core full nodes have certain requirements. If you try running a node on weak hardware, it may work—but you’ll likely spend more time dealing with issues. If you can meet the following requirements, you’ll have an easy-to-use node.
Note: many operating systems today (Windows, Mac, and Linux) enter a low-power mode after the screensaver activates, slowing or halting network traffic. This is often the default setting on laptops and on all Mac OS X laptops and desktops. Check your screensaver settings and disable automatic “sleep” or “suspend” options to ensure you support the network whenever your computer is running.
Possible Problems
Legal: Bitcoin use is prohibited or restricted in some areas.
Bandwidth limits: Some Internet plans will charge an additional amount for any excess upload bandwidth used that isn’t included in the plan. Worse, some providers may terminate your connection without warning because of overuse. We advise that you check whether your Internet connection is subjected to such limitations and monitor your bandwidth use so that you can stop Bitcoin Core before you reach your upload limit.
Anti-virus: Several people have placed parts of known computer viruses in the Bitcoin block chain. This block chain data can’t infect your computer, but some anti-virus programs quarantine the data anyway, making it more difficult to run a full node. This problem mostly affects computers running Windows.
Attack target: People who want to disrupt the Bitcoin network may attack full nodes in ways that will affect other things you do with your computer, such as an attack that limits your available download bandwidth or an attack that prevents you from using your full node’s wallet for sending transactions.
Linux Instructions
The following instructions describe installing Bitcoin Core on Linux systems.
Ubuntu 14.10 Instructions for Bitcoin Core 0.10.0.
If you use Ubuntu Desktop, click the Ubuntu swirl icon to start the Dash and type “term” into the input box. Choose any one of the terminals listed:
Alternatively, access a console or terminal emulator using another method, such as SSH on Ubuntu Server or a terminal launcher in an alternative desktop environment.
Type the following line to add the Bitcoin Personal Package Archive (PPA) to your system:
sudo apt-add-repository ppa:bitcoin/bitcoin
You will be prompted for your user password. Provide it to continue. Afterwards, the following text will be displayed:
Stable Channel of bitcoin-qt and bitcoind for Ubuntu, and their dependencies
More info: https://launchpad.net/~bitcoin/+archive/ubuntu/bitcoin
Press [ENTER] to continue or ctrl-c to cancel adding it
Press enter to continue. The following text (with some variations) will be displayed and you will be returned to the command line prompt:
gpg: keyring /tmp/tmpixuqu73x/secring.gpg' created gpg: keyring/tmp/tmpixuqu73x/pubring.gpg' created gpg: requesting key 8842CE5E from hkp server > > > >keyserver.ubuntu.com gpg: /tmp/tmpixuqu73x/trustdb.gpg: trustdb created gpg: key 8842CE5E: public key "Launchpad PPA for Bitcoin" imported gpg: no ultimately trusted keys found gpg: Total number processed: 1 pg: imported: 1 (RSA: 1) OK
Type the following line to get the most recent list of packages:
sudo apt-get update
A large number of lines will be displayed as different update files are downloaded. This step may take several minutes on a slow Internet connection.
To continue, choose one of the following options
sudo apt-get install bitcoin-qt
sudo apt-get install bitcoind
sudo apt-get install bitcoin-qt bitcoind
After choosing what packages to install, you will be asked whether you want to proceed. Press enter to continue.
If you’re logged in as an administrative user with sudo access, you may log out. The steps in this section should be performed as the user you want to run Bitcoin Core. (If you’re an expert administrator, you can make this a locked account used only by Bitcoin Core.)
Before using the Bitcoin Core daemon, bitcoind, you need to create its configuration file with a user name and password. First create the .bitcoin directory, create (touch) the file, and set the file’s permissions so that only your user account can read it. From the terminal, type:
mkdir ~/.bitcoin touch ~/.bitcoin/bitcoin.conf chmod 600 ~/.bitcoin/bitcoin.conf
Then you can run the command bitcoind. It will print output similar to this:
bitcoind Error: To use the "-server" option, you must set a rpcpassword in the configuration file: /home/bitcoinorg/.bitcoin/bitcoin.conf It is recommended you use the following random password: rpcuser=bitcoinrpc rpcpassword=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX (you do not need to remember this password)
The username and password MUST NOT be the same.
If the file does not exist, create it with owner-readable-only file permissions. It is also recommended to set alertnotify so you are notified of problems; for example: alertnotify=echo %s | mail -s "Bitcoin Alert" [email protected] The “rpcpassword” displayed will be unique for your system. You can copy the rpcuser and rpcpassword lines into your configuration file using the following commands. Note that in most Ubuntu terminals, you need to press Ctrl-Shift-C to copy and Ctrl-Shift-V to paste because Ctrl-C and Ctrl-V have different meanings in a Unix-style terminal.
echo rpcuser=bitcoinrpc >> ~/.bitcoin/bitcoin.conf echo rpcpassword=XXXXXX >> ~/.bitcoin/bitcoin.conf (Warning: Don’t use XXXXXX as your RPC password. Copy the rpcpassword displayed by bitcoind for your system.)
Now you can start Bitcoin Core daemon for real. Type the following command:
bitcoind -daemon
It will print a message that Bitcoin Core is starting. To interact with Bitcoin Core daemon, you will use the command bitcoin-cli (Bitcoin command line interface). Note: it may take up to several minutes for Bitcoin Core to start, during which it will display the following message whenever you use bitcoin-cli:
error: {"code":-28,"message":"Verifying blocks..."}
After it starts, you may find the following commands useful for basic interaction with your node:
to safely stop your node, run the following command:
bitcoin-cli stop
A complete list of commands is available in the Bitcoin.org developer reference.
When Bitcoin Core daemon first starts, it will begin to download the block chain. This step will take at least several hours, and it may take a day or more on a slow Internet connection or with a slow computer. During the download, Bitcoin Core will use a significant part of your connection bandwidth. You can stop Bitcoin Core at any time using the stop command; it will resume from the point where it stopped the next time you start it.
Optional: Start Your Node At Boot
Starting your node automatically each time your computer boots makes it easy for you to contribute to the network. The easiest way to do this is to start Bitcoin Core daemon from your crontab. To edit your crontab, run the following command:
crontab -e
@reboot bitcoind -daemon Save the file and exit; the updated crontab file will be installed for you. Now Bitcoin Core daemon will be automatically started each time your reboot your computer.
If you’re an Ubuntu expert and want to use an init script instead, see this Upstart script.
You have now completed installing Bitcoin Core. If you have any questions, please ask in one of Bitcoin’s many communities, such as Bitcoin StackExchange, BitcoinTalk technical support, or the #bitcoin IRC chatroom on Freenode.
To support the Bitcoin network, you also need to allow incoming connections. Please read the Network Configuration section for details.
Network Configuration
If you want to support the Bitcoin network, you must allow inbound connections.
When Bitcoin Core starts, it establishes 8 outbound connections to other full nodes so it can download the latest blocks and transactions. If you just want to use your full node as a wallet, you don’t need more than these 8 connections—but if you want to support lightweight clients and other full nodes on the network, you must allow inbound connections.
Servers connected directly to the Internet usually don’t require any special configuration. You can use the testing instructions below to confirm your server-based node accepts inbound connections.
Home connections are usually filtered by a router or modem. Bitcoin Core will request your router automatically configure itself to allow inbound connections to Bitcoin’s port, port 8333. Unfortunately many routers don’t allow automatic configuration, so you must manually configure your router. You may also need to configure your firewall to allow inbound connections to port 8333. Please see the following subsections for details.
Testing Connections
The BitNodes project provides an online tool to let you test whether your node accepts inbound connections. To use it, start Bitcoin Core (either the GUI or the daemon), wait 10 minutes, and then visit the GetAddr page (https://getaddr.bitnodes.io/). The tool will attempt to guess your IP address—if the address is wrong (or blank), you will need to enter your address manually.
For more instruction and reviews based off BTC please follow my subreddit /BTC_Reviews
all material from this post was found here --> https://bitcoin.org/en/full-node
submitted by Mattjhagen to Bitcoin [link] [comments]

BitCoin Mining Malware Removal Help (X-Post from /r/Techsupport)

Hello,
Just this morning we received an alert from our Sophos Cloud Console about an apparent "Troj/Miner-BP" virus that was detected on our Exchange 2010, Windows 2008 R2 server. This is our primary Exchange server in a multi Exchange server (2 total) environment. I believe I've been able to stop the bleeding for now (answer how for those curious towards the bottom), but I'm curious if any of you have any experience with any mining malware like this (Google had hardly any results, and the only results they did come up with are from the last day or two so I'm sure it's a relatively new exploit). Please bear with me while I try to relay all of the information we've gathered about this mining malware - it's slightly confusing and all based on roughly 2 hour's worth of trying to trace this malware's path.
The infected file that Sophos caught was LMS.exe (not lsm.exe which is a legitimate executable) that was being created in the C:\WINDOWS\Fonts\ directory. If you've ever manually browsed to the Fonts directory you know that, whether you have file extensions hidden or not, Windows Explorer only shows the installed Fonts packages, and not the individual .tff files themselves. Because of this, LMS.exe was not visible when browsed to manually on the local server. We were able to see the LMS.exe file when we c$'d from a different server, but because Sophos was continually trying to Quarantine it (it was being auto-regenerated) we weren't ever able to see any Properties of it. So what was auto-recreating the file? A quick look into Task Manager showed that another executable, msiexev.exe (again, not msiexe.exe the legitimate file) was using between 80-90% of the CPU. Going to the Properties of that process led us to the C:\WINDOWS\security\ directory. After killing the process we were able to rename the file to msiexev.exe.old with no issues. However, after 5 minutes or so a new file of the exact same file size, 1,205KB, was created in its place. Rinse and repeat. If we let msiexev.exe run for roughly 15-20 seconds it would again spawn LMS.exe in the Font directory, and again Sophos would begin quarantining it in an endless game of cat and mouse. By this time the AV scan we had begun roughly 30 minutes prior quarantined another executable - this time right on the root of the C:\WINDOWS\ directory. This executable was called wmsa.exe, and the timestamp was only 1 minute different (1:07 PM) than the timestamp of the original msiexev.exe (1:08 PM) Tuesday afternoon. This file was easily deleted, and has not been recreated since.
We were able to stop the process from spinning up again by creating a blank file named msiexev.exe in the C:\WINDOWS\security\ directory, giving a domain account ownership of the file, and then removing all Security permissions on the file. Since that time the malware appears unable to execute.
My questions is - has anyone else been faced with this malware? It appears that it is BitCoin mining malware. From the little documentation online I've been able to find it appears to be an exploit that's only vulnerable on Windows Server 2008 R2 boxes with Exchange 2010. If anyone else has any ideas on ways to prevent this or plug this hole I'm open to suggestions.
Thanks!
Edit: Formatting
submitted by willowshole5 to sysadmin [link] [comments]

An Enormous List of Thing I'd Like to See in Watch Dogs 2 (if it happens)

These aren't in order of importance, just sorted by categories. Some ideas just have a few examples and can be expanded upon. This list is mostly gameplay changes; the story, characters, graphics, etc. aren't covered here. This list is massive, so if a category is boring the hell out of you, feel free to skip it but please check out the next one; not all of them contain huge changes.
HACKING
ADDITIONS:
CHANGES:
WEAPONS
ADDITIONS:
CHANGES:
As for the player's inventory:
COMBAT
ADDITIONS:
CHANGES:
SIDE MISSIONS
This is a big change, likely the biggest so far. Remove the current crime, gang hideout, and convoy systems entirely. Introduce the CtOS Alert. The CtOS Alert presents itself like a crime, giving only a location on the map. This location isn't preset like crimes; it can be in a ton of places, be different sizes, and move around. Arriving at the location, you will have to use your eyes and cameras to find out what kind of alert it is.
CRIME:
-A few people in the area have crime/victim probabilities. This is Chicago (or whatever city the sequel is in), more than one person per-block has a grudge for or from another person. The probabilities react to their proximity to a victim, if they pull out a firearm, or if they start shit-talking someone. The player will have to keep track of 2-3 people to see which one the perpetrator is. This one is inspired by Person of Interest.
HIDEOUTS:
CONVOYS:
And that's that. CtOS Alerts would be rarer than crimes are now, but not too rare, and there may be a few available at one time.
POLICE
ADDITIONS:
CHANGES:
NPCS
ADDITIONS:
CHANGES:
AIDEN PEARCE
HIGH REPUTATION:
LOW REPUTATION:
Neutral or volatile reputation could lead to a a mix of these, or they just won't occur.
GENERAL:
Coffee Shops: Coffee (Focus and sprint speed boost until you drain the focus or sprint for a total minute), Bagel (Damage threshold boost until damage is taken)
Fast Food: Soda (Same as coffee but diminished effect), Burger (Damage threshold boost until damage is taken, sprint speed nerf until you sprint for a total of 1 minute)
I'm not trying to turn this into a survival game here, there's no (No) [NO] {NO} need for some stupid hunger system. But the ability to sit down and eat would be appreciated.
CRAFTABLES
Add. More. Craftables. Seriously, 3 explosives, some pills, and a radio? How about:
MULTIPLAYER
By multiplayer, I mean invasions, not the other gametypes.
These changes, in my opinion, would reward players for hiding in plain sight and staying on the move instead of hiding behind dumpsters, since that would be a dead giveaway.
AND THAT'S IT
These are a few things, large and small, that I would be pleased to see in a sequel to Watch_Dogs. Of course more changes could and should be made, but overall I think these are pretty good. Let me know in the comments if these ideas are excellent, could be tweaked, or if I should never impose my horrible opinions on this forum for the remainder of my life. Also, please point out any typos, since I probably missed a few and I may elect to x-post this to /gaming or /games after reviewing their post guidelines.
Thanks for reading!
submitted by cdawgtv2 to watch_dogs [link] [comments]

Interested in contributing to the BTC community? Here is a exhaustive manual to get you up and running. (Only takes about 20-30 minutes if you are fluent in command prompt on linux).

These instructions will work both on a VPS cloud server or a personal computer. You may find cheap VPS somewhere online for rent.
What Is A Full Node?
A full node is a program that fully validates transactions and blocks. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.
Most full nodes also serve lightweight clients by allowing them to transmit their transactions to the network and by notifying them when a transaction affects their wallet. If not enough nodes perform this function, clients won’t be able to connect through the peer-to-peer network—they’ll have to use centralized services instead.
Many people and organizations volunteer to run full nodes using spare computing and bandwidth resources—but more volunteers are needed to allow Bitcoin to continue to grow. This document describes how you can help and what helping will cost you.
Costs And Warnings
Running a Bitcoin full node comes with certain costs and can expose you to certain risks. This section will explain those costs and risks so you can decide whether you’re able to help the network.
Special Cases
Miners, businesses, and privacy-conscious users rely on particular behavior from the full nodes they use, so they will often run their own full nodes and take special safety precautions. This document does not cover those precautions—it only describes running a full node to help support the Bitcoin network in general.
Please consult an expert if you need help setting up your full node correctly to handle high-value and privacy-sensitive tasks.
Secure Your Wallet
It’s possible and safe to run a full node to support the network and use its wallet to store your bitcoins, but you must take the same precautions you would when using any Bitcoin wallet. Please see the securing your wallet page for more information.
Minimum Requirements
Bitcoin Core full nodes have certain requirements. If you try running a node on weak hardware, it may work—but you’ll likely spend more time dealing with issues. If you can meet the following requirements, you’ll have an easy-to-use node.
Note: many operating systems today (Windows, Mac, and Linux) enter a low-power mode after the screensaver activates, slowing or halting network traffic. This is often the default setting on laptops and on all Mac OS X laptops and desktops. Check your screensaver settings and disable automatic “sleep” or “suspend” options to ensure you support the network whenever your computer is running.
Possible Problems
Legal: Bitcoin use is prohibited or restricted in some areas.
Bandwidth limits: Some Internet plans will charge an additional amount for any excess upload bandwidth used that isn’t included in the plan. Worse, some providers may terminate your connection without warning because of overuse. We advise that you check whether your Internet connection is subjected to such limitations and monitor your bandwidth use so that you can stop Bitcoin Core before you reach your upload limit.
Anti-virus: Several people have placed parts of known computer viruses in the Bitcoin block chain. This block chain data can’t infect your computer, but some anti-virus programs quarantine the data anyway, making it more difficult to run a full node. This problem mostly affects computers running Windows.
Attack target: People who want to disrupt the Bitcoin network may attack full nodes in ways that will affect other things you do with your computer, such as an attack that limits your available download bandwidth or an attack that prevents you from using your full node’s wallet for sending transactions.
Linux Instructions
The following instructions describe installing Bitcoin Core on Linux systems.
Ubuntu 14.10 Instructions for Bitcoin Core 0.10.0.
If you use Ubuntu Desktop, click the Ubuntu swirl icon to start the Dash and type “term” into the input box. Choose any one of the terminals listed:
Alternatively, access a console or terminal emulator using another method, such as SSH on Ubuntu Server or a terminal launcher in an alternative desktop environment.
Type the following line to add the Bitcoin Personal Package Archive (PPA) to your system:
sudo apt-add-repository ppa:bitcoin/bitcoin
You will be prompted for your user password. Provide it to continue. Afterwards, the following text will be displayed:
Stable Channel of bitcoin-qt and bitcoind for Ubuntu, and their dependencies
More info: https://launchpad.net/~bitcoin/+archive/ubuntu/bitcoin
Press [ENTER] to continue or ctrl-c to cancel adding it
Press enter to continue. The following text (with some variations) will be displayed and you will be returned to the command line prompt:
gpg: keyring /tmp/tmpixuqu73x/secring.gpg' created gpg: keyring/tmp/tmpixuqu73x/pubring.gpg' created gpg: requesting key 8842CE5E from hkp server > > > >keyserver.ubuntu.com gpg: /tmp/tmpixuqu73x/trustdb.gpg: trustdb created gpg: key 8842CE5E: public key "Launchpad PPA for Bitcoin" imported gpg: no ultimately trusted keys found gpg: Total number processed: 1 pg: imported: 1 (RSA: 1) OK
Type the following line to get the most recent list of packages:
sudo apt-get update
A large number of lines will be displayed as different update files are downloaded. This step may take several minutes on a slow Internet connection.
To continue, choose one of the following options
sudo apt-get install bitcoin-qt
sudo apt-get install bitcoind
sudo apt-get install bitcoin-qt bitcoind
After choosing what packages to install, you will be asked whether you want to proceed. Press enter to continue.
If you’re logged in as an administrative user with sudo access, you may log out. The steps in this section should be performed as the user you want to run Bitcoin Core. (If you’re an expert administrator, you can make this a locked account used only by Bitcoin Core.)
Before using the Bitcoin Core daemon, bitcoind, you need to create its configuration file with a user name and password. First create the .bitcoin directory, create (touch) the file, and set the file’s permissions so that only your user account can read it. From the terminal, type:
mkdir ~/.bitcoin touch ~/.bitcoin/bitcoin.conf chmod 600 ~/.bitcoin/bitcoin.conf
Then you can run the command bitcoind. It will print output similar to this:
bitcoind Error: To use the "-server" option, you must set a rpcpassword in the configuration file: /home/bitcoinorg/.bitcoin/bitcoin.conf It is recommended you use the following random password: rpcuser=bitcoinrpc rpcpassword=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX (you do not need to remember this password)
The username and password MUST NOT be the same.
If the file does not exist, create it with owner-readable-only file permissions. It is also recommended to set alertnotify so you are notified of problems; for example: alertnotify=echo %s | mail -s "Bitcoin Alert" [email protected] The “rpcpassword” displayed will be unique for your system. You can copy the rpcuser and rpcpassword lines into your configuration file using the following commands. Note that in most Ubuntu terminals, you need to press Ctrl-Shift-C to copy and Ctrl-Shift-V to paste because Ctrl-C and Ctrl-V have different meanings in a Unix-style terminal.
echo rpcuser=bitcoinrpc >> ~/.bitcoin/bitcoin.conf echo rpcpassword=XXXXXX >> ~/.bitcoin/bitcoin.conf (Warning: Don’t use XXXXXX as your RPC password. Copy the rpcpassword displayed by bitcoind for your system.)
Now you can start Bitcoin Core daemon for real. Type the following command:
bitcoind -daemon
It will print a message that Bitcoin Core is starting. To interact with Bitcoin Core daemon, you will use the command bitcoin-cli (Bitcoin command line interface). Note: it may take up to several minutes for Bitcoin Core to start, during which it will display the following message whenever you use bitcoin-cli:
error: {"code":-28,"message":"Verifying blocks..."}
After it starts, you may find the following commands useful for basic interaction with your node:
to safely stop your node, run the following command:
bitcoin-cli stop
A complete list of commands is available in the Bitcoin.org developer reference.
When Bitcoin Core daemon first starts, it will begin to download the block chain. This step will take at least several hours, and it may take a day or more on a slow Internet connection or with a slow computer. During the download, Bitcoin Core will use a significant part of your connection bandwidth. You can stop Bitcoin Core at any time using the stop command; it will resume from the point where it stopped the next time you start it.
Optional: Start Your Node At Boot
Starting your node automatically each time your computer boots makes it easy for you to contribute to the network. The easiest way to do this is to start Bitcoin Core daemon from your crontab. To edit your crontab, run the following command:
crontab -e
@reboot bitcoind -daemon Save the file and exit; the updated crontab file will be installed for you. Now Bitcoin Core daemon will be automatically started each time your reboot your computer.
If you’re an Ubuntu expert and want to use an init script instead, see this Upstart script.
You have now completed installing Bitcoin Core. If you have any questions, please ask in one of Bitcoin’s many communities, such as Bitcoin StackExchange, BitcoinTalk technical support, or the #bitcoin IRC chatroom on Freenode.
To support the Bitcoin network, you also need to allow incoming connections. Please read the Network Configuration section for details.
Network Configuration
If you want to support the Bitcoin network, you must allow inbound connections.
When Bitcoin Core starts, it establishes 8 outbound connections to other full nodes so it can download the latest blocks and transactions. If you just want to use your full node as a wallet, you don’t need more than these 8 connections—but if you want to support lightweight clients and other full nodes on the network, you must allow inbound connections.
Servers connected directly to the Internet usually don’t require any special configuration. You can use the testing instructions below to confirm your server-based node accepts inbound connections.
Home connections are usually filtered by a router or modem. Bitcoin Core will request your router automatically configure itself to allow inbound connections to Bitcoin’s port, port 8333. Unfortunately many routers don’t allow automatic configuration, so you must manually configure your router. You may also need to configure your firewall to allow inbound connections to port 8333. Please see the following subsections for details.
Testing Connections
The BitNodes project provides an online tool to let you test whether your node accepts inbound connections. To use it, start Bitcoin Core (either the GUI or the daemon), wait 10 minutes, and then visit the GetAddr page (https://getaddr.bitnodes.io/). The tool will attempt to guess your IP address—if the address is wrong (or blank), you will need to enter your address manually.
For more instruction and reviews based off BTC please follow my subreddit /BTC_Reviews
all material from this post was found here --> https://bitcoin.org/en/full-node
submitted by Mattjhagen to rBitcoin [link] [comments]

Running a full node using Bitcoin-daemon. Instructions for Linux.

These instructions will work both on a VPS cloud server or a personal computer. You may find cheap VPS somewhere online for rent.
What Is A Full Node?
A full node is a program that fully validates transactions and blocks. Almost all full nodes also help the network by accepting transactions and blocks from other full nodes, validating those transactions and blocks, and then relaying them to further full nodes.
Most full nodes also serve lightweight clients by allowing them to transmit their transactions to the network and by notifying them when a transaction affects their wallet. If not enough nodes perform this function, clients won’t be able to connect through the peer-to-peer network—they’ll have to use centralized services instead.
Many people and organizations volunteer to run full nodes using spare computing and bandwidth resources—but more volunteers are needed to allow Bitcoin to continue to grow. This document describes how you can help and what helping will cost you.
Costs And Warnings
Running a Bitcoin full node comes with certain costs and can expose you to certain risks. This section will explain those costs and risks so you can decide whether you’re able to help the network.
Special Cases
Miners, businesses, and privacy-conscious users rely on particular behavior from the full nodes they use, so they will often run their own full nodes and take special safety precautions. This document does not cover those precautions—it only describes running a full node to help support the Bitcoin network in general.
Please consult an expert if you need help setting up your full node correctly to handle high-value and privacy-sensitive tasks.
Secure Your Wallet
It’s possible and safe to run a full node to support the network and use its wallet to store your bitcoins, but you must take the same precautions you would when using any Bitcoin wallet. Please see the securing your wallet page for more information.
Minimum Requirements
Bitcoin Core full nodes have certain requirements. If you try running a node on weak hardware, it may work—but you’ll likely spend more time dealing with issues. If you can meet the following requirements, you’ll have an easy-to-use node.
Note: many operating systems today (Windows, Mac, and Linux) enter a low-power mode after the screensaver activates, slowing or halting network traffic. This is often the default setting on laptops and on all Mac OS X laptops and desktops. Check your screensaver settings and disable automatic “sleep” or “suspend” options to ensure you support the network whenever your computer is running.
Possible Problems
Legal: Bitcoin use is prohibited or restricted in some areas.
Bandwidth limits: Some Internet plans will charge an additional amount for any excess upload bandwidth used that isn’t included in the plan. Worse, some providers may terminate your connection without warning because of overuse. We advise that you check whether your Internet connection is subjected to such limitations and monitor your bandwidth use so that you can stop Bitcoin Core before you reach your upload limit.
Anti-virus: Several people have placed parts of known computer viruses in the Bitcoin block chain. This block chain data can’t infect your computer, but some anti-virus programs quarantine the data anyway, making it more difficult to run a full node. This problem mostly affects computers running Windows.
Attack target: People who want to disrupt the Bitcoin network may attack full nodes in ways that will affect other things you do with your computer, such as an attack that limits your available download bandwidth or an attack that prevents you from using your full node’s wallet for sending transactions.
Linux Instructions
The following instructions describe installing Bitcoin Core on Linux systems.
Ubuntu 14.10 Instructions for Bitcoin Core 0.10.0.
If you use Ubuntu Desktop, click the Ubuntu swirl icon to start the Dash and type “term” into the input box. Choose any one of the terminals listed:
Alternatively, access a console or terminal emulator using another method, such as SSH on Ubuntu Server or a terminal launcher in an alternative desktop environment.
Type the following line to add the Bitcoin Personal Package Archive (PPA) to your system:
sudo apt-add-repository ppa:bitcoin/bitcoin
You will be prompted for your user password. Provide it to continue. Afterwards, the following text will be displayed:
Stable Channel of bitcoin-qt and bitcoind for Ubuntu, and their dependencies
More info: https://launchpad.net/~bitcoin/+archive/ubuntu/bitcoin
Press [ENTER] to continue or ctrl-c to cancel adding it
Press enter to continue. The following text (with some variations) will be displayed and you will be returned to the command line prompt:
gpg: keyring /tmp/tmpixuqu73x/secring.gpg' created gpg: keyring/tmp/tmpixuqu73x/pubring.gpg' created gpg: requesting key 8842CE5E from hkp server > > > >keyserver.ubuntu.com gpg: /tmp/tmpixuqu73x/trustdb.gpg: trustdb created gpg: key 8842CE5E: public key "Launchpad PPA for Bitcoin" imported gpg: no ultimately trusted keys found gpg: Total number processed: 1 pg: imported: 1 (RSA: 1) OK
Type the following line to get the most recent list of packages:
sudo apt-get update
A large number of lines will be displayed as different update files are downloaded. This step may take several minutes on a slow Internet connection.
To continue, choose one of the following options
sudo apt-get install bitcoin-qt
sudo apt-get install bitcoind
sudo apt-get install bitcoin-qt bitcoind
After choosing what packages to install, you will be asked whether you want to proceed. Press enter to continue.
If you’re logged in as an administrative user with sudo access, you may log out. The steps in this section should be performed as the user you want to run Bitcoin Core. (If you’re an expert administrator, you can make this a locked account used only by Bitcoin Core.)
Before using the Bitcoin Core daemon, bitcoind, you need to create its configuration file with a user name and password. First create the .bitcoin directory, create (touch) the file, and set the file’s permissions so that only your user account can read it. From the terminal, type:
mkdir ~/.bitcoin touch ~/.bitcoin/bitcoin.conf chmod 600 ~/.bitcoin/bitcoin.conf
Then you can run the command bitcoind. It will print output similar to this:
bitcoind Error: To use the "-server" option, you must set a rpcpassword in the configuration file: /home/bitcoinorg/.bitcoin/bitcoin.conf It is recommended you use the following random password: rpcuser=bitcoinrpc rpcpassword=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX (you do not need to remember this password)
The username and password MUST NOT be the same.
If the file does not exist, create it with owner-readable-only file permissions. It is also recommended to set alertnotify so you are notified of problems; for example: alertnotify=echo %s | mail -s "Bitcoin Alert" [email protected] The “rpcpassword” displayed will be unique for your system. You can copy the rpcuser and rpcpassword lines into your configuration file using the following commands. Note that in most Ubuntu terminals, you need to press Ctrl-Shift-C to copy and Ctrl-Shift-V to paste because Ctrl-C and Ctrl-V have different meanings in a Unix-style terminal.
echo rpcuser=bitcoinrpc >> ~/.bitcoin/bitcoin.conf echo rpcpassword=XXXXXX >> ~/.bitcoin/bitcoin.conf (Warning: Don’t use XXXXXX as your RPC password. Copy the rpcpassword displayed by bitcoind for your system.)
Now you can start Bitcoin Core daemon for real. Type the following command:
bitcoind -daemon
It will print a message that Bitcoin Core is starting. To interact with Bitcoin Core daemon, you will use the command bitcoin-cli (Bitcoin command line interface). Note: it may take up to several minutes for Bitcoin Core to start, during which it will display the following message whenever you use bitcoin-cli:
error: {"code":-28,"message":"Verifying blocks..."}
After it starts, you may find the following commands useful for basic interaction with your node:
to safely stop your node, run the following command:
bitcoin-cli stop
A complete list of commands is available in the Bitcoin.org developer reference.
When Bitcoin Core daemon first starts, it will begin to download the block chain. This step will take at least several hours, and it may take a day or more on a slow Internet connection or with a slow computer. During the download, Bitcoin Core will use a significant part of your connection bandwidth. You can stop Bitcoin Core at any time using the stop command; it will resume from the point where it stopped the next time you start it.
Optional: Start Your Node At Boot
Starting your node automatically each time your computer boots makes it easy for you to contribute to the network. The easiest way to do this is to start Bitcoin Core daemon from your crontab. To edit your crontab, run the following command:
crontab -e
@reboot bitcoind -daemon Save the file and exit; the updated crontab file will be installed for you. Now Bitcoin Core daemon will be automatically started each time your reboot your computer.
If you’re an Ubuntu expert and want to use an init script instead, see this Upstart script.
You have now completed installing Bitcoin Core. If you have any questions, please ask in one of Bitcoin’s many communities, such as Bitcoin StackExchange, BitcoinTalk technical support, or the #bitcoin IRC chatroom on Freenode.
To support the Bitcoin network, you also need to allow incoming connections. Please read the Network Configuration section for details.
Network Configuration
If you want to support the Bitcoin network, you must allow inbound connections.
When Bitcoin Core starts, it establishes 8 outbound connections to other full nodes so it can download the latest blocks and transactions. If you just want to use your full node as a wallet, you don’t need more than these 8 connections—but if you want to support lightweight clients and other full nodes on the network, you must allow inbound connections.
Servers connected directly to the Internet usually don’t require any special configuration. You can use the testing instructions below to confirm your server-based node accepts inbound connections.
Home connections are usually filtered by a router or modem. Bitcoin Core will request your router automatically configure itself to allow inbound connections to Bitcoin’s port, port 8333. Unfortunately many routers don’t allow automatic configuration, so you must manually configure your router. You may also need to configure your firewall to allow inbound connections to port 8333. Please see the following subsections for details.
Testing Connections
The BitNodes project provides an online tool to let you test whether your node accepts inbound connections. To use it, start Bitcoin Core (either the GUI or the daemon), wait 10 minutes, and then visit the GetAddr page (https://getaddr.bitnodes.io/). The tool will attempt to guess your IP address—if the address is wrong (or blank), you will need to enter your address manually.
For more instruction and reviews based off BTC please follow my subreddit /BTC_Reviews
all material from this post was found here --> https://bitcoin.org/en/full-node
submitted by Mattjhagen to BTC_Reviews [link] [comments]

ESEA client basically a virus

So the ESEA client would mine bitcoins on computers without the owners consent. http://play.esea.net/index.php?s=forums&d=topic&id=492102 ESEA admins even admitted it.... I don't trust esea after this. renalucario 's post in /games http://www.reddit.com/Games/comments/1dglil/popular_competitive_gaming_league_esea_admins/ Note that this story is still developing: ESEA Statement has been released! Full post at the bottom of this post or click here to read on esea.net ESEA Member unisolsz discovered that the client required to play on ESEA was running a bitcoin miner. After players were complaining about virus alerts being set off from the client and unusually high GPU usage and BSOD errors. The thread he made regarding this can be found here ESEA admin, lpkane admits that it was an "April Fools joke" that was mistakenly left in the client that ran for only 2 days. He claims only 2 bitcoins were mined in total (Roughly around $280 USD) and that it would go towards a prize pool. Source He later corrects that it was running for 2+ weeks and actually raised 29~ bitcoins (around $3,602.21 USD) and to apologize awarded all current ESEA premium members a free month of service and that all the money raised will go into the prize pool. He also claims that all bitcoin mining code was removed from the client. Source #2 Bitcoin miners use up 100% of GPU processes and lead to a lowered hardware lifespan, and can actually damage it permanently. Link to /GlobalOffensive discussion: http://www.reddit.com/GlobalOffensive/comments/1dgad2/esea_client_basically_a_virus/ UPDATE: Someone has pointed out that the bitcoin address that lpkane posted a picture of in his first post is different compared to the address he lists in his second post. Very strange... UPDATE #2: I should clarify that no one that was affected lost any money of their own. It was a poor choice of words for me to say that he 'stole' the money. I was referring to the fact that people that were affected most likely saw an increase in electricity usage, and could possibly have had their computer's hardware damaged. Their computers were used without their consent to 'mine' currency, all of which went to the ESEA admins. UPDATE #3: I was contacted by GGTY886 that informed me that he had posted a thread regarding the mining two hours before unisolsz had posted his that was locked by an admin. Located here There is also a thread located here by a user that discusses the symptoms of the miner. He also sent me a recording of a conversation with an ESEA admin discussing the issue which can be listened to here: The Recording His PM in full in case you're interested: I actually posted a thread before unisolz that actually exposed the bitcoin mining. http://play.esea.net/index.php?s=forums&d=topic&id=492064 I posted 2 hours before his thread, and my thread was locked. Also, one day prior, this guy posted about the symptoms of the mining: http://play.esea.net/index.php?s=forums&d=topic&id=491845 recording with ESEA Admin: http://play.esea.net/index.php?s=forums&d=topic&id=492190 UPDATE #4: Others have pointed out that this isn't the first time lpkane has mentioned mining bitcoins through the ESEA client: http://i.imgur.com/yvMX2DY.png Source UPDATE #5: In a thread dated 4/9/2013, lpkane posts in a thread discussing bitcoins: and you wonder what the client does when you're not in a server.. Source post #23 UPDATE #6: If you've been affected by this, you can file a complaint to the Internet Crime Complaint Center (IC3): https://www.ic3.gov With this information: E-Sports Entertainment, LLC 62 Rensselaer Drive, Commack, New York, 11725, 631-804-5253 UPDATE #7: Another image that was requested to be added to the OP showing lpkane's comments on bitcoin mining on September 18th, 2012. http://i.imgur.com/SrhyF8d.png UPDATE #8: Craig Levine "Torbull" (owner of ESEA) has posted this statement on the forums regarding the situation: The first I learned about any of this was last night (on any scale). I had no idea any of this was going on. Needless to say I am completely embarrassed, disgusted, and ashamed. For the past ten years, I've tried to do nothing more than to act honestly and be an upstanding leader in the gaming community and with some bad decisions by some trusted people it has been thrown out the window. I'm wrapping my mind around this whole thing and we'll release a formal response, but for the time being just know that this wasn't some ESEA / company wide scam. I'm committed to doing whatever possible to rebuild the trust we lost through this whole fiasco. Source Post #608 Some more information from Craig: Post #632: It's a failure on my part to have the proper oversight to have prevented this from happening and it will be addressed. My primary concern at this point is community trust and how that was destroyed. We need to understand the situation, take the appropriate action with those responsible for it, ensure we have things in place to prevent this from happening, and address anyone who incurred physical damages. How we rebuild the trust of the community in the immediate aftermath and long term future is going to be a different discussion that we need to have as I walk through this all. Post #710: Standby for a more formal response with information about the situation and recourse for those impacted. Post #742: the facts of the situation are beyond what has been shared to this point. We're going to do everything in our power to address the issue of what happened, the broken trust with the community, and any physical hardware damage. Information coming soon, but this is obviously something we take incredibly serious. Post #802: the money will be going somewhere much more righteous than the prize purse in addition to the prize purse Post #810: why would we risk our business and livelihood on making some inconsequential amount of money on Bitcoins I assure you that I and the larger ESEA entity had no knowledge of this. We're working to figure out what happened to respond accordingly. Post #829: His (lpkane's) response there was done more playfully than seriously. We would never knowingly allow this to be done to our community and I'm looking into all of the details for how this happened. Post #886: We will be setting up a mechanism to address anyone who's computer parts were damaged through this process UPDATE #9: PrincessChoadzilla has posted a analysis of the three bitcoin addresses ESEA admins used to collect the bitcoins here and found that there has been 1 bitcoin that is still not accounted for by lpkane. IMPORTANT UPDATE: ESEA Statement has been released: Throughout the history of gaming and e-sports, there have been scams and straight up theft by players, teams, event organizers, and even “sponsors.” Over the past ten years ESEA has prided itself on being an upstanding member of the gaming community by providing a high quality service, paying out prize money, and being upfront and transparent with you, the community. We worked hard to build your trust and often took the longer, slower, and more meticulous road than others. That approach has paid off as we had success with our premium service and league. Over the two weeks we failed our community. ESEA’s goal is to provide our community with cutting edge technology and tools. Whenever possible, the management and owners at ESEA initiate private tests on potential new products and tools that might interest our community. With the whole fervor around Bitcoin, we did conduct some internal tests with the Client on only two of our own, consenting administrators’ accounts to see how the mining process worked and determine whether it was a feature that we might want to add in the future. We thought this might be an exciting new tool that we could provide to our community. Ultimately, we decided that it was not. On April 13, 2013, after the initial tests, ESEA informed those involved in the test that we were killing the project and they should stop using the beta test. It came to our attention last night, however, that an employee who was involved in the test has been using the test code for his own personal gain since April 13, 2013. What transpired the past two weeks is a case of an employee acting on his own and without authorization to access our community through our company’s resources. We are extremely disappointed and concerned by the unauthorized actions of this unauthorized individual. As of this morning, ESEA has made sure that all Bitcoin mining has stopped. ESEA is also in the process of taking all necessary steps internally to ensure that nothing like this ever happens again. The owners and management at ESEA all apologize to each of you that were impacted by the recent events and intend to make things right. ESEA has issued a free month of ESEA Premium to all of our community members who were enrolled in Premium for the month of April. We also ask anyone who has experienced any physical damage to their computers to open an ESEA support ticket. In an effort to maintain complete transparency, we have released all of the Bitcoin wallet addresses as well as data dumps of the wallets themselves. The value of the mined Bitcoins was $3,713.50 and ESEA will be donating 100% of the $3,713.55 to the American Cancer Society. ESEA will also match 100% of this amount for a total of $7,427.10 donated. ESEA is also increasing the Season 14 League prize pot by $3,713.50. As a team, we work hard to create cool things and we’ve worked even harder to consistently do things the right way. While it’s incredibly disturbing and disappointing that this happened, we’re committed to improving ourselves and rebuilding trust with our community.
submitted by sheepgobeep to csgojerk [link] [comments]

How to diagnose and remove a bitcoin miner trojan - YouTube How to Remove a Trojan/Virus/Miner (Windows) March 2020 ... Btc Gives  Cpu Mining  SCAM ALERT! S9 Bitcoin Miner Scam Alert- Bitmain-alliance.com - YouTube BTConline.io Reviews - MINING BITCOIN SCAM ALERT - YouTube

Upup.exe BitCoin Miner. This malware has the one and only purpose to use the CPU and GPU resources of your computer via it’s fake Upup.exe process, which it runs as a trusted process in the background of your computer via your Windows Task Manager. The malware also aims to modify the Windows Registry Sub-keys and keys in order to automatically run, even if you stop the process and the real ... Manual Bitcoin miner virus removal is out of question, unless you are a computer expert and know how to deal with registry entries. Even so, it is a complicated process, which, if handled incorrectly, could lead to serious system issues. The recommended course of action is implementing a powerful anti-malware utility. If you use the malware remover presented on our website, it will identify ... A Trojan.BitCoinMiner is a computer infection that silently runs on your computer while using your CPU or GPU resources to mine for digital currencies. As the value of cryptocurrencies, such as ... Generate bitcoin with Bitcoin miner pro 2018 V 3.2 generate has been published after epic three weeks beta testing, which ended with great success. This tool will NOT let you down. All features are included and described in notes.txt file which you will get with installation file. Generate bitcoin with Bitcoin miner p Beachten Sie, dass Bitcoin-Mining-Programme zusammen mit Würmern, Trojanern und anderen Bedrohungen aus dem PC. Auch wenn es Ihnen gelungen ist, schädliche BitCoinMiner Anwendungen aus dem System zu löschen, müssen Sie daher wahrscheinlich andere illegalen Windows-Infektionen sowie zu entfernen.

[index] [3325] [10461] [27260] [43665] [50639] [45512] [14215] [44810] [40549] [50417]

How to diagnose and remove a bitcoin miner trojan - YouTube

This video aims to show you how to remove the following types of malware step-by-step: -Trojans. -Viruses. -Miners. -Spyware. -Rootkits. -Wipers. -Most malwa... Start making money online: https://www.beermoneyforum.com/ Follow our social channels: Youtube: https://www.youtube.com/channel/UCLjuoEeCf_lsKyNgq-JOGhQ Tele... bitcoin miner, bitcoin gpu, cuda bitcoin miner, python opencl bitcoin miner, bitcoin miner software, bitcoin miner virus, bitcoin miner download, bitcoin miner windows, online bitcoin miner, Please don't get scammed by Bitmain-alliance.com. They are not a real distributor of any cryptocurrency mining equipment. They request payment via Bitcoin af... Bitcoin mining is still profitable in 2019, thanks to the recent rally in BTC price. Todays video will show you how to not only increase your Bitcoin miners ...

#