Blockpliance reposted this
𝐃𝐚𝐲 3 𝐨𝐟 "12 𝑺𝒄𝒂𝒎𝒔 𝒐𝒇 𝑪𝒓𝒚𝒑𝒕𝒐-𝒎𝒂𝒔" 𝐬𝐞𝐫𝐢𝐞𝐬 🎄 🎅 For the third day of this series we have address "1Cyo5UCBtxpiUCVrXmagT9f7siVqqkVg4k" on the Bitcoin Network. This address was found to be part of an extortion network. The network sends cold emails, posing as different services online and alerting the user to having inadvertently downloaded Pegasus (a well known spying software for iPhones and computers - the CIA and the Israeli intelligence have been using it for years and there were lots of news about it a couple of years ago). Then, the perpetuator warns that via Pegasus they have caught the victim visiting adult websites and doing things you share don't want others to see. The scammer warns that if you don't pay tot he address provided the videos will be sent to all your contacts on WhatsApp, telegram and Skype. To add urgency to this email, the scammer states that they'll be notified when you ope the email and that you have 48 hours to pay. The scammer uses unique Bitcoin addresses per batch of emails, but consolidates all successful payments downstream and then cashes our at KuCoin Exchange. Our team has made attempts to notify the exchange, but we've never received a response. Attached a screenshot from the email received by one of our synthetic accounts directly from the scammer. This is a direct attribution collected by our team. Whenever the attribution is flagged as direct, it means we have proof of where we obtained the information from and it was not generated using any AI tagging, Address Clustering or machine learning inferences.