{"id":100437,"date":"2024-06-18T06:16:27","date_gmt":"2024-06-18T13:16:27","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100437"},"modified":"2024-12-07T00:22:26","modified_gmt":"2024-12-07T08:22:26","slug":"porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/","title":{"rendered":"Porn blackmail &#8220;sextortion&#8221; emails: Have you been hacked? A new scam"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100786\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>Malicious spam emails claiming that your computer has been hacked\u2014and demanding you pay a ransom to stop them from distributing your browsing history and videos of you engaging in activities that you would like to keep private\u2014are not new.<\/p>\n<p>It&#8217;s a type of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/scam\/\">scam<\/a> that can earn money for the scammers, if victims are convinced that they were hacked. But, in reality, it&#8217;s unlikely that any such hack has taken place.<\/p>\n<p>Let&#8217;s discuss a novel attack that we&#8217;ve seen in the wild recently, so you&#8217;ll know what to look for.<\/p>\n<h3>A new porn blackmail email referencing Pegasus spyware<\/h3>\n<p>A new porn blackmail email has been going around; it has only been spotted in the past several weeks. To understand why these emails are fake, we&#8217;re going to examine the text of this email and explain why its claims are false.<\/p>\n<blockquote><p>Subject: You have been hacked<\/p><\/blockquote>\n<p>That&#8217;s a cleverly deceptive subject line; most people will open and read the email.<\/p>\n<blockquote><p>Hello pervert, I&#8217;ve sent this message from your iCloud mail.<\/p><\/blockquote>\n<p>This strong first sentence grabs the reader&#8217;s attention. The &#8220;From:&#8221; address is spoofed (falsified), so has the appearance of having been sent from the recipient&#8217;s account.<\/p>\n<blockquote><p>I want to inform you about a very bad situation for you. However, you can benefit from it, if you will act wis\u0435ly.<\/p><\/blockquote>\n<p>I&#8217;m not sure how the recipient can benefit, but I&#8217;ll read on.<\/p>\n<blockquote><p>Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, and Windows. I guess, you already figured out where I\u2019m getting at.<\/p><\/blockquote>\n<h3>What is Pegasus spyware? Can hackers use it against me?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/pegasus\/\">Pegasus spyware<\/a> is, indeed, quite powerful. It is used by nation-state level threat actors to target specific individuals, and it usually spreads through highly targeted attacks. (Read <a href=\"https:\/\/www.intego.com\/mac-security-blog\/pegasus-spyware-hacks-iphones-of-prominent-individuals\/\">this article where we explain how Pegasus is used<\/a>. And here&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/i-am-hacker-nso-group-new-email-scam-leverages-controversial-pegasus-malware\/\">another email scam claiming to use Pegasus from 2021<\/a>.) However, this is not a tool that random hackers can access.<\/p>\n<p>In addition, Pegasus, one other similar types of spyware, exploit &#8220;zero-day&#8221; vulnerabilities in operating systems; these are newly discovered vulnerabilities that the developer, such as Apple, hasn&#8217;t yet patched. Apple regularly issues security updates, specifically for the types of vulnerabilities used to infect devices with this type of spyware.<\/p>\n<blockquote><p>It\u2019s been a few months since I installed it on all your devices because you were not quite choosy about what links to click on the int\u0435rn\u0435t. During this period, I\u2019ve learned about all aspects of your private life, but one is of special significance to me.<\/p>\n<p>I\u2019ve recorded many videos of you j**king off to highly controversial \u0440orn videos. Given that the \u201cquestionable\u201d genre is almost always the same, I can conclude that you have sick \u0440\u0435rv\u0435rsi\u043en.<\/p><\/blockquote>\n<p>It&#8217;s extremely unlikely that some hacker or malware has <a href=\"https:\/\/www.intego.com\/mac-security-blog\/your-macs-camera-can-be-hacked\/\">activated your camera<\/a> without your knowledge if you&#8217;re using a Mac or iPhone; if that had happened, you would have seen a circle of green light next to the front-facing camera. And on both platforms, you have to give apps permission to use your camera in the first place.<\/p>\n<h3>Threats of exposing the user&#8217;s activity to friends, family, and coworkers<\/h3>\n<p>Now we get to the heart of the email: an accusation of activities that the recipient might want to hide:<\/p>\n<blockquote><p>I doubt you\u2019d want your friends, family and co-workers to know about it. However, I can do it in a few clicks.<\/p><\/blockquote>\n<p>That&#8217;s the threat. Some people may have engaged in the type of activities the email discusses and may feel that they are at risk. But can the hacker do what they claim?<\/p>\n<p>Pegasus primarily targets and infects smartphones running iOS or Android. The hacker says it works on Windows, but there aren&#8217;t any known variants that infect Windows PCs or Macs. There are other types of spyware, but if you are careful in your Internet use, and you <strong>use antivirus software such as <a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s VirusBarrier X9 for Mac<\/a> or <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\">Intego Antivirus for Windows<\/a><\/strong>, you&#8217;re protected from this type of malware.<\/p>\n<h4><strong>Can a hacker get all your contacts on WhatsApp, Telegram, Instagram, and Facebook?<\/strong><\/h4>\n<p>Next, the email makes claims about being able to contact everyone you know:<\/p>\n<blockquote><p>Every number in your contact list will suddenly receive these vid\u0435\u043es\u2013 on WhatsApp, on Telegram, on Instagram, on Facebook, on email \u2013 everywhere. It is going to be a tsunami that will sweep away everything in its path, and first of all, your f\u043erm\u0435r life.<\/p><\/blockquote>\n<p>While this creative writing may be convincing, the threat isn&#8217;t very plausible. It could hypothetically be possible, if someone had actually installed spyware that can record your keystrokes, or <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">stealer malware<\/a> to exfiltrate your app data. But even then, it&#8217;s hard to sort out all those keystrokes to find your credentials for each of the services they named. And while stealer malware is rampant on Macs and Windows PCs, it&#8217;s less common on Android, and least common on iPhone. Again, the average cybercriminal doesn&#8217;t have access to really powerful mobile phone spyware like Pegasus.<\/p>\n<p>It&#8217;s worth noting that the threat could be a little more plausible if you follow the bad practice of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">reusing the same password across multiple sites<\/a>; this is why it&#8217;s so important to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">use a trusted password manager<\/a> and unique passwords instead.<\/p>\n<blockquote><p>Don\u2019t think of yourself as an innocent victim. No one knows where your \u0440\u0435rv\u0435rsi\u043en might lead in the future, so consider this a kind of deserved \u0440unishm\u0435nt to stop you.<\/p>\n<p>I\u2019m some kind of God who sees everything. However, don\u2019t panic. As we know, God is merciful and forgiving, and so do I. But my mercy is not free.<\/p><\/blockquote>\n<p>Delusions of grandeur, but with the carrot of offering forgiveness. For a price&#8230;<\/p>\n<blockquote><p>Transfer 700 USD to my Litecoin (LTC) wallet: REDACTED<\/p><\/blockquote>\n<h3>The &#8220;sextortion&#8221; blackmail scam<\/h3>\n<p>This is the definition of &#8220;sextortion&#8221;: a form of blackmail in which sexual information, images, or videos are used to extort money from the victim. Sextortion can be a real problem for someone who has ever shared nude images with someone who later abused them. However, this sort of email is a scam; it&#8217;s not claiming to have images that you shared while <a href=\"https:\/\/www.intego.com\/mac-security-blog\/?s=sexting\">sexting<\/a>; it&#8217;s claiming to have monitored your activities.<\/p>\n<p>The average computer user has no idea what Litecoin is. They might have heard of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/bitcoins\/\">Bitcoin<\/a>, and there are hundreds of alternative <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/cryptocurrency\/\">cryptocurrencies<\/a>.<\/p>\n<p>Interestingly, while cryptocurrency transactions are anonymous, blockchain records are public; so by looking up the address in the email, one can see how much this scammer has earned so far:<\/p>\n<p><img class=\"aligncenter size-full wp-image-100436\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/litecoin.png\" alt=\"\" width=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/litecoin.png 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/litecoin-300x61.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/litecoin-150x30.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/litecoin-657x133.png 657w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<blockquote><p>Once I receive confirmation of the transaction, I will permanently delete all videos compromising you, uninst\u0430ll Pegasus from all of your devices, and disappear from your life. You can be sure \u2013 my benefit is only money. Otherwise, I wouldn\u2019t be writing to you, but destroy your life without a word in a second.<\/p><\/blockquote>\n<p>It goes without saying, but it would be unwise to believe that an unethical blackmailer would be completely honest and true to their word.<\/p>\n<blockquote><p>I\u2019ll be notified when you open my email, and from that moment you have exactly 48 hours to send the money. If cryptocurrencies are unchartered waters for you, don\u2019t worry, it\u2019s very simple. Just google \u201ccrypto exchange\u201d or &#8220;buy Litecoin&#8221; and then it will be no harder than buying some useless stuff on Amazon.<\/p><\/blockquote>\n<p>It would be possible in a standard HTML email to include a remotely loaded image, even a hidden one (an invisible pixel); unfortunately, Gmail and most mail apps default to automatically loading all remote images in emails. But in this case, the scam email we observed was sent as plain text, so there would have been no way for a supposed hacker to know when it was opened.<\/p>\n<h3>Don&#8217;t buy cryptocurrency for cybercriminals<\/h3>\n<p>It is relatively easy to buy cryptocurrencies; you can use a credit card. But there&#8217;s the risk of ending up on a scam site that records your credit card number, and, well, you can see where that is going&#8230;<\/p>\n<blockquote><p>I strongly warn you against the following:<br \/>\nDo not reply to this email. I&#8217;ve sent it from your iCloud mail.<br \/>\nDo not contact the police. I have access to all your devices, and as soon as I find out you ran to the cops, videos will be published.<br \/>\nDon\u2019t try to reset or destroy your devices. As I mentioned above: I\u2019m monitoring all your activity, so you either agree to my terms or the vid\u0435\u043es are published.<br \/>\nAlso, don\u2019t forget that cryptocurrencies are anonymous, so it\u2019s impossible to identify me using the provided address.<\/p><\/blockquote>\n<p>Those are the usual threats of blackmailers and kidnappers: don&#8217;t go to the police, or else.<\/p>\n<p>If you did have Pegasus or other spyware on a device, it would be deleted by resetting the device to factory settings, or erasing a Mac&#8217;s drive.<\/p>\n<h3>Can hackers monitor everything you do online?<\/h3>\n<p>The bit about &#8220;monitoring all your activity&#8221; is overkill; because while it may be possible to install Pegasus on one device, getting it on multiple devices is difficult. And, again, Pegasus in particular is designed to infect phones, not computers.<\/p>\n<p>It would take an extraordinary amount of effort and hacking skills to somehow infect multiple devices, with a separate kind of malware on each. And it&#8217;s very difficult to actually install malware on an iPhone, so such claims are pretty sketchy and implausible.<\/p>\n<blockquote><p>Good luck, my perverted friend. I hope this is the last time we hear from each other.<\/p>\n<p>And some friendly advice: from now on, don\u2019t be so careless about your online security.<\/p><\/blockquote>\n<p>This is the only true statement in the email; you need to take your online security seriously. Even though this is a scam, don&#8217;t click on random links in emails, don&#8217;t visit dodgy websites, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">don&#8217;t reuse passwords<\/a>, which could allow hackers who acquire databases of credentials leaked from websites to access your important accounts.<\/p>\n<h3>Beware of scams, and protect your devices and accounts<\/h3>\n<p>This sort of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-scam-rattles-mac-users-what-you-need-to-know\/\">webcam blackmail<\/a> is not new, and suggesting that Pegasus was used can scare people who may have read about that spyware in the news. You need to know that they are scams, and that they use social engineering to try to convince you that you have been hacked.<\/p>\n<p>Malware that infects smartphones, especially iPhone, is rare. It&#8217;s more realistic that your computer (e.g. a Mac or Windows laptop or desktop) may have been hacked or infected by some malware. It&#8217;s true that some malware can activate a computer&#8217;s camera and microphone. You can scan your Mac or Windows computer with Intego antivirus software to check whether or not it&#8217;s infected.<\/p>\n<h3>4 key tips for protecting your online privacy and security<\/h3>\n<p>Here are four crucial things you should do to ensure that you&#8217;re keeping yourself safe from hackers and spyware.<\/p>\n<h4><strong>1. Keep your operating system and apps updated<\/strong><\/h4>\n<p>The most important thing you can do to protect your online security is to <strong>keep all your devices updated with the latest operating system<\/strong>.<\/p>\n<p>Don&#8217;t use <a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-iphone-become-unsafe-to-use\/\">iPhones<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-mac-become-unsafe-to-use\/\">Macs<\/a>, or <a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-ipad-become-unsafe-to-use\/\">iPads<\/a> that are so old that Apple no longer issues security updates for their operating systems. Using an outdated OS means your device is missing critical security patches; these often include fixes for vulnerabilities that hackers are already exploiting in the wild.<\/p>\n<h4><strong>2. Use unique passwords everywhere<\/strong><\/h4>\n<p>Use a <strong>unique password for every site<\/strong>, and keep track of them using a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">trusted password manager<\/a>. This helps ensure that you can&#8217;t be hacked through <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">credential stuffing attacks<\/a>, where cybercriminals use leaked passwords from data breaches to break into accounts.<\/p>\n<h4><strong>3. Use antivirus software from a company you can trust<\/strong><\/h4>\n<p>Be sure to <strong>install anti-malware protection software<\/strong>, such as <a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">VirusBarrier X9 for Mac<\/a>, or <a href=\"https:\/\/www.intego.com\/lp\/route-podcast-intego\/?channel=Podcast_Intego&amp;lpx=buy\">Intego Antivirus for Windows<\/a>, in case you really do end up with a malware infection (spyware, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/stealer-malware\/\">data stealers<\/a>, or otherwise). Reputable antivirus software can clean existing malware infections, and it can prevent future infections as well.<\/p>\n<h4><strong>4. Stay informed via e-mail and social media<\/strong><\/h4>\n<p>Last but not least, stay informed by subscribing to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>free e-mail newsletter<\/strong><\/a>. You&#8217;ll also want to <strong><a href=\"https:\/\/www.intego.com\/mac-security-blog\/follow-intego\/\">follow Intego on social media<\/a> <\/strong>and enabling notifications. Staying up to date about the latest scams and threats will help you be prepared when facing dangerous situations online.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Porn blackmail emails aren&#8217;t new, but this one referencing Pegasus is worth examining. Learn how to tell whether such messages are a scam or not; they probably are.<\/p>\n","protected":false},"author":46,"featured_media":100784,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[53,1834,4039,3070,4264,116,3364,3370],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Porn blackmail emails aren&#039;t new, but this one referencing Pegasus is worth examining. Learn how to tell whether such messages are a scam or not; they probably are.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Porn blackmail &quot;sextortion&quot; emails: Have you been hacked? A new scam - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Porn blackmail emails aren&#039;t new, but this one referencing Pegasus is worth examining. Learn how to tell whether such messages are a scam or not; they probably are.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-18T13:16:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-07T08:22:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Woman with concerned, worried, upset face, looking at her iPhone (after receiving a porn blackmail or sextortion email)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/\",\"name\":\"Porn blackmail \\\"sextortion\\\" emails: Have you been hacked? A new scam - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#primaryimage\"},\"datePublished\":\"2024-06-18T13:16:27+00:00\",\"dateModified\":\"2024-12-07T08:22:26+00:00\",\"description\":\"Porn blackmail emails aren't new, but this one referencing Pegasus is worth examining. Learn how to tell whether such messages are a scam or not; they probably are.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Porn blackmail &#8220;sextortion&#8221; emails: Have you been hacked? A new scam\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Porn blackmail &#8220;sextortion&#8221; emails: Have you been hacked? A new scam\",\"datePublished\":\"2024-06-18T13:16:27+00:00\",\"dateModified\":\"2024-12-07T08:22:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#webpage\"},\"wordCount\":2181,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg\",\"keywords\":[\"Facebook\",\"Instagram\",\"Online Scams\",\"Pegasus\",\"Porn Blackmail\",\"Scam\",\"Telegram Messenger\",\"WhatsApp\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Porn blackmail emails aren't new, but this one referencing Pegasus is worth examining. Learn how to tell whether such messages are a scam or not; they probably are.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/","og_locale":"en_US","og_type":"article","og_title":"Porn blackmail \"sextortion\" emails: Have you been hacked? A new scam - The Mac Security Blog","og_description":"Porn blackmail emails aren't new, but this one referencing Pegasus is worth examining. Learn how to tell whether such messages are a scam or not; they probably are.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/","og_site_name":"The Mac Security Blog","article_published_time":"2024-06-18T13:16:27+00:00","article_modified_time":"2024-12-07T08:22:26+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg","width":400,"height":260,"caption":"Woman with concerned, worried, upset face, looking at her iPhone (after receiving a porn blackmail or sextortion email)"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/","name":"Porn blackmail \"sextortion\" emails: Have you been hacked? A new scam - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#primaryimage"},"datePublished":"2024-06-18T13:16:27+00:00","dateModified":"2024-12-07T08:22:26+00:00","description":"Porn blackmail emails aren't new, but this one referencing Pegasus is worth examining. Learn how to tell whether such messages are a scam or not; they probably are.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Porn blackmail &#8220;sextortion&#8221; emails: Have you been hacked? A new scam"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Porn blackmail &#8220;sextortion&#8221; emails: Have you been hacked? A new scam","datePublished":"2024-06-18T13:16:27+00:00","dateModified":"2024-12-07T08:22:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#webpage"},"wordCount":2181,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg","keywords":["Facebook","Instagram","Online Scams","Pegasus","Porn Blackmail","Scam","Telegram Messenger","WhatsApp"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/05\/woman-with-worried-concerned-upset-face-looking-at-her-iPhone-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-q7X","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100437"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100437"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100437\/revisions"}],"predecessor-version":[{"id":101313,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100437\/revisions\/101313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/100784"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}