00:00
00:00
ShangXian
The more I discover about Newgrounds, the more I see different worlds, flavours and hues.

Laniakea Supercluster

Joined on 12/3/23

Level:
21
Exp Points:
4,830 / 4,900
Exp Rank:
11,145
Vote Power:
6.32 votes
Art Scouts
10+
Rank:
Pvt. First Class
Global Rank:
2,687
Blams:
287
Saves:
3,007
B/P Bonus:
20%
Whistle:
Bronze
Trophies:
26
Medals:
8,956
Supporter:
8m 14d

"Hello Pervert" scam email

Posted by ShangXian - 7 hours ago


Finally, as promised, I will talk about the "Hello Pervert" scam email, but first I have to thank @EwanDoggieNG (sorry if I keep pestering you by mentioning you^^') because he was the one who told me about this scam under the comment section of another important scam I talked about that is more common but not less annoying nor fright-inducing the so-called "I have accidentally reported you" scam. The "Hello pervert" scam is a type of sextortion email where scammers claim to have compromising videos of the recipient and threaten to share them unless a ransom is paid. 


The fear and the spoofing


The two core elements of this type of scam is fear and spoofing, more specifically email spoofing. What is spoofing? Spoofing is a type of attack in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.


what is the goal of spoofing? The goal is to steal data or money, or gain unauthorized access to systems. It can be thought as a short-term form of identity theft. Scammers typically keep their impersonations brief, manipulating an email, text message, phone call, or website to pretend to be a friend, company, government entity, or other reputable source.


Is it always malicious? No, spoofing does also have legitimate uses, such as in cybersecurity testing, or as a form of privacy protection where individuals want to mask their identity or activity. But the regular user who receives a spoofed message/call/email etc. should be wary of it as it's more likely they are a target of such attack.


Types of spoofing:


  • email spoofing
  • DNS spoofing
  • Caller ID spoofing
  • Text spoofing
  • Website spoofing
  • IP spoofing
  • Filename extension spoofing
  • Facial spoofing
  • MAC spoofing
  • GPS spoofing
  • ARP spoofing


If you want to know more about these types this link mentions them: https://us.norton.com/blog/online-scams/what-is-spoofing#id-toc-12-different-types-of-spoofing-with-real-life-examples-2


When used as illegal tool, spoofing can be quite dangerous because if someone spoofs your details, attackers may impersonate you to deceive others, potentially leading to fraudulent activities carried out under your name. It's a form of identity theft with long-term legal and reputational damage and can be also quite hard to prevent.


What matters to us now, for the purposes of this blog, is email spoofing which is part of this scam, but before seeing it a quick technical aspect of sending emails.


When electronic mail transmission occurs a protocol is used: Simple Mail Transfer Protocol (SMTP)


Simple Mail Transfer Protocol


What is it? It is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages. User-level email clients typically use SMTP only for sending messages to a mail server for relaying, and typically submit outgoing email to the mail server on port 465 or 587 per Request for Comments (RFC) 8314. Email is submitted by a mail client (mail user agent, MUA) to a mail server (mail submission agent, MSA) using SMTP on Transmission Control Protocol (TCP) port 465 or 587. Most mailbox providers still allow submission on traditional port 25. The MSA delivers the mail to its mail transfer agent (MTA). Keep in mind that SMTP defines message transport, not the message content. Thus, it defines the mail envelope and its parameters, such as the envelope sender, but not the header (except trace information) nor the body of the message itself (1). Basically this protocol operates by sending lines of text back and forth between the client and the server. The client sends commands and eventually the email message, and the server sends back responses to tell the client if the server accepted the command or if something went wrong.


iu_1448729_20153888.png

SMTP conversation between the client and the server. Do you see those three digits (i.e. 250)? They are a special format made of three digits, a space (or a dash), and then some free-format text (in error messages, this is usually intended for users to read; otherwise it is generally just noise). The real important thing to pay attention when it comes to response it's the first digit:


iu_1448728_20153888.png

So in the example above you see 250, that 2 means that there are no problems or errors.


So when a SMTP email is sent, the initial connection provides two pieces of address information called the "envelope" addressing which are:


  • MAIL FROM: it is generally presented to the recipient as the Return-path: header but not normally visible to the end user, and by default no checks are done that the sending system is authorized to send on behalf of that address
  • RCPT TO: it specifies which email address the email is delivered to, and again it is not normally visible to the end user but may be present in the headers as part of the "Received:" header


Unless there are problems signaled by the receiving mail server, the sending system sends the "DATA" command, and typically sends several header items, including: 


  • From: an example is johnsmith-@-exampleemail.com, as always the address visible to the recipient, but again, by default no checks are done that the sending system is authorized to send on behalf of that address
  • Reply-to: example joesmith-@-anotherexample.com, just like "from" no checks are done
  • Sender: example xuxing-@-totallynotchineseemail.com similar to "from" and "sender"


The result is that the email recipient sees the email as having come from the address in the From: header. They may sometimes be able to find the MAIL FROM address, and if they reply to the email, it will go to either the address presented in the From: or Reply-to: header, but none of these addresses are typically reliable, because automated bounce messages may generate backscatter (incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam) (2).


How boring, tell us the spicy stuff!


So how does email spoofing works? It usually works by altering the header information of an email to make it appear as if it is coming from a trusted source. Attackers manipulate fields like the "From" and "Reply-To" addresses, tricking recipients into believing the email is legitimate, which can lead to phishing or other malicious activities. This is why I wanted to talk about the technical aspects because now you can better understand some words used in the next part where I'll talk about the scam itself. So the spoofer creates a fake email address designed to mimic that of a real person or a trusted institution. The attacker then alters email header metadata like the sender’s address and subject line, crafts their message, and sends the spoofed email to their target.


A bogus email address that closely resembles that of the person or organization they’re impersonating is created by the criminal (remember it's a short-term identity theft), then the attacker modifies the email's header information—such as the "From," "Reply-To," and "Sender" fields—to make it look like the email came from a trusted source. This bogus message is crafted to dupe the recipient into believing the email is legitimate and engaging with the scam. Finally the spoofed email is sent and if it’s convincing enough, the target may be tricked into clicking a malicious link or providing their personal details.


So now that you have an overall, very simplistic knowledge of what's behind a spoofed email, let's dive into the "Hello Pervert" scam itself.


"Hello pervert" scam


As I said at the beginning of this blog, this scam is a type of sextortion.


What is sextortion?


It's a non-physical forms of coercion to extort sexual favors from the victim. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coercion, as well as to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion. In the most common type after obtaining naked photographs or videos of the victim, the scammer then threatens the publication of these pictures or to send them to close friends and family members. A demand of money is then made, though usually the scam is either a bluff (e.g. the scammer never intended to publish them) or the pictures/videos are published regardless even if the money is sent. It's also a form of blackmail in which sexual information or images are used to extort money or sexual favors from the victim. Social media and text messages are often the source of the sexual material and the threatened means of sharing it with others.


fun fact: an early use of the term appears in print in 1950 in California in "Sextortion Charges To Come Up Next Week". Los Angeles Times. April 5, 1950.


For more info about it, here a link: https://cyberbullying.org/sextortion


iu_1448730_20153888.jpg

from: https://www.comparitech.com/blog/information-security/what-is-sextortion-examples/


How does this scam works?


The emails claim that the sender has been watching your online behavior and caught you red-handed doing activities that you would like to keep private. The email usually starts with “Hello pervert” and then goes on to claim that you have been watching porn. The sender often says they have footage of what you were watching and what you were doing while watching it. I post here two variants of this scam:


iu_1448731_20153888.webp

from: https://www.pcrisk.com/removal-guides/28629-hello-my-perverted-friend-email-scam


iu_1448732_20153888.jpg

from: https://macsecurity.net/view/625-hello-pervert-scam-email-what-is-it-and-how-to-stay-safe


So as you have noticed, the email usually starts with “Hello pervert” and then goes on to claim that you have been watching porn. The sender often says they have footage of what you were watching and what you were doing while watching it and have installed Pegasus an infamous multi-platform spyware created by the NSO Group based in Israel.


FIRST LIE: PEGASUS


Pegasus is designed to be covertly and remotely installed on mobile phones running iOS and Android, meaning it runs on mobile while the e-mail mentions computers and that's not true. The attacker takes advantage of informatic science illiteracy of the victim to scare them to death and make them more compliant to the "hacker's" request. While NSO Group markets Pegasus as a product for fighting crime and terrorism, governments around the world have routinely used the spyware to surveil journalists, lawyers, political dissidents, and human rights activists; Italy knows this very well since several journalists and NGO people had their phones hacked by this.


The spyware can be installed on devices running certain versions of iOS—Apple's mobile operating system—as well as some Android devices. Rather than being a specific exploit, Pegasus is a suite of exploits that uses many vulnerabilities in the system. Infection vectors include clicking links, the Photos app, the Apple Music app, and iMessage. Some of the exploits Pegasus uses are zero-clickthat is, they can run without any interaction from the victim. Once installed, Pegasus has been reported to be able to run arbitrary code, extract contacts, call logs, messages, photos, web browsing history, settings, as well as gather information from apps including but not limited to communications apps iMessage, Gmail, Viber, Facebook, WhatsApp, Telegram, and Skype.


https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/


Pegasus hides itself as far as is possible and self-destructs in an attempt to eliminate evidence if unable to communicate with its command-and-control server for more than 60 days, or if on the wrong device. Pegasus can also self-destruct on command. If it is not possible to compromise a target device by simpler means, Pegasus can be installed by setting up a wireless transceiver near a target device, or by gaining physical access to the device (3).


Despite sadly no one is safe from this damn spyware, it's usually used for high-risk targets, such as political activists, government officials, and journalists, and chances a lamer like the person who's trying to steal your money infected your devices (even computers despite the spyware does not infect computers!), are zero. There is essentially no proof that such a closely-guarded spyware has ended up in the hands of everyday scammers.


Common traits of this scam:


  • threats and fear-mongering words: the email goes on to claim that embarrassing videos have been recorded through the victim’s webcam, threatening to send the videos to all of the victim’s contacts unless a ransom payment is made. The message creates a sense of urgency, giving a deadline of usually 48 hours to pay the ransom before the videos are distributed.
  • demand of payment: a payment is demanded in the form of untraceable cryptocurrency, such as Bitcoin or Litecoin. The email provides a specific cryptocurrency wallet address where the funds should be sent. amount of money demanded varies, but is often between $500-$1000 even if I've recently seen prices even higher (+$1,600), probably because they want to test how much a victim is willing to pay for the data to stay private
  • reassurance of video deletion: the attacker promises that if the ransom is paid in full by the deadline, the videos will be permanently deleted and the malware removed from the victim’s devices. There is no guarantee images will be deleted after payment nor they have already been sent.


A new strain and an old tactic: images of your location and old passwords


Just like a fucking virus which evolves fast due to high mutation rates, the large population sizes, short generation times, the lack of proofreading mechanisms inherent in their polymerases (specifically for RNA viruses) and high mutation rates, so this scam evolves rapidly to give a more sense of reliability and truthfulness. Adding the photo of your location gives a more reliable layer to the scam but how did it happen? From data breaches; when scammers have access to such data, it may also include your physical address. With that knowledge, scammers have increased their threats by simply adding a photograph of your personal neighborhood by looking it up online. For most places in inhabited areas, you can grab such pictures from Google Maps or similar apps. This reddit post shows it despite it has been deleted, basically the scammer used an old PO box address. But it’s true that this adds a convincing argument to the claim that the sender has been spying on you:


https://www.reddit.com/r/Scams/comments/1f6gki0/deleted_by_user/


So keep always in mind that popular scam that is doing the rounds right now involves old passwords. These passwords may have been involved in data breaches years ago, so chances are that victims don’t even use them anymore. However, seeing your old password in an email could be enough to make you wonder if the sender does indeed have anything compromising. Fraudsters claim to have intimate images or videos and threaten to share them with contacts or post them online, although they are often bluffing and have nothing to reveal. It's a very profitable tactic.


How did the scammer obtain the old password? It's very likely that the scammers bought your password from other cybercriminals that obtained them during one of the countless data breaches that hit company after company every week.


As an extra threat the email may include something like:


“Or is visiting [your physical address] a more convenient way to contact if you don’t take action. Nice location btw.”


Implying that they know where you live and threatening to stop by and create a scene. Again don't fall for it, don't let fear take over your mind.


What do to if you receive this email?


Disclaimer: once again I will use caps locks, because you must carve this into your minds!


1) DON'T PANICK! IT'S A FUCKING SCAM!


2) DON'T OPEN UNSOLICITED ATTACHMENTS! NEVER!!! AND I REPEAT NEVER!


3) HOW DO I VERIFY IT? BY CHECKING THE EMAIL HEADER. HOW???? CONTROL EMAIL-AUTHENTICATION RESULTS!


iu_1448733_20153888.png

from: https://us.norton.com/blog/online-scams/email-spoofing


4) WTF ARE SPF, DKIM, DMARC????? ARE THEY CODE NAMES? NO! THOSE ARE THE EMAIL AUTHENTICATION HEADERS! THEY ARE YOUR BEST FRIENDS AT DETECTING THE VALIDITY OF AN EMAIL. KEEP THEM CLOSER TO YOUR HEART!


If you look at the raw email, sometimes called “source” or “original”, you can see more information about the email and how it got to you. Specifically, you want to look for headers that indicate the authentication status of the email message. consists of: 


  • SPF
  • DKIM
  • DMARC


By implementing email authentication, you can ensure that anyone — an employee, customer, partner, or prospect — who receives an email that purports to be from your company can determine if the email is legitimate and, if not, flag or discard it. 


Can you explain me like I'm five?


Yes, SPF stands for Sender Policy Framework and answers the question "does the server sending this have the right to use the domain name, or names, listed in the message’s headers?" Basically SPF allows domain owners to decide which IPs can send emails on behalf of their domain. The email will only be delivered if a server matches one of the SPF’s allowed IP addresses.


DKIM stands for DomainKeys Identified Mail and answer the question "if there’s a cryptographic signature attached to the message, does it match the public key on file for the domain it appears to be from?" DKIM uses key cryptography to sign an email message and this signature verifies that your message came from the right domain and wasn’t altered during the sending process.


DMARC stands for Domain-based Message Authentication, Reporting, and Conformance and answers the question "do the headers match one another?" For instance, are the From: and Reply-to: fields the same? If a domain is at DMARC enforcement, the domain in the From: field can be verified by the receiving domain, meaning that you can trust that the person who is sending that email is actually the right person. If the email is not authorized, the DMARC policy will reject or quarantine the message. Basically this email authentication policy and reporting protocol builds on and incorporates the previous two (SPF and DKIM).


Awwww, thank you, but now how the fuck do I see these????


Well, the email headers can be found in a variety of ways, depending on your email application. If you use Gmail:


1) open the email message in Gmail, then select the More menu to display additional options

2) select Show original from the menu

3) Gmail opens a new tab that shows the full message

4) you will see the headers that indicate the authentication status of the email message which are:


4a) SPF

4b) DKIM

4c) DMARC


BUT SPF and DKIM are not sufficient to truly check the validity of the email, the acid test is DMARC. For an email to pass DMARC, it must pass either SPF or DKIM with an aligned identifier. What this typically means is that the domain used for the SPF or DKIM check and the domain publishing the DMARC policy must at least be part of the same DNS namespace. The results are pass/fail.


iu_1448735_20153888.png

from: https://blog.cloudhq.net/what-is-metadata-and-how-do-you-find-email-metadata/


In the link provided above you will find how-to for other main web email providers. If you are using Tuta, go to the three dots of the opened email, click on them, then "Show email headers":


iu_1448734_20153888.png


Authentication results:

iu_1448736_20153888.png


The email is legit and valid. While this is the authentication results for the "Hello pervert" email:


iu_1448737_20153888.png

from: https://www.malwarebytes.com/blog/news/2025/06/sextortion-email-scammers-increase-their-hello-pervert-money-demands


I suggest you to read it as it also talks about the encoding errors that show how the scammer riddles with encoding errors the email, which typically appear when Cyrillic or other non-Latin characters are misinterpreted as UTF-8 or quoted-printable, or when text is generated or processed by automated systems not properly handling character sets.


5) DON'T INTERACT WITH THE ATTACKER! THIS WILL SIGNAL THAT YOUR EMAIL IS ACTIVE AND WILL MAKE IT A TARGET FOR FUTURE AND MORE PHISING/SCAMMING/SPOOFING ATTACKS!


6) REPORT TO AUTHORITIES, BECAUSE THE MORE THEY GET IT, THE MORE TOOLS THEY MAY HAVE TO COUNTERATTACK THEM


7) BLOCK THE SENDER, THROW IN THE BIN THE MESSAGE AND SLEEP SERENE DREAMS


Well, I think that's all for now. I really wanted to cover as much as possible using all the sources that helped me to gain more knowledge on how to better protect me. Stay safe and always check the email headers, even for normal emails. This way you will train your mind to be more wary of everything that arrives in your inbox because billions of spoofed emails are sent every fucking day. Have a nice day and take care!


Last but not least just to laugh a bit: reply to a hello pervert email only if it comes from your boyfriend, girlfriend, husband or wife like someone on Reddit said XD


EDIT: I added "-" to those email examples to avoid making people think those are legitimate email addresses. Those are just example.


References and footnotes:

https://us.norton.com/blog/online-scams/what-is-spoofing

https://www.rfc-editor.org/rfc/rfc8314

(1) https://web.archive.org/web/20190403055256/http://utcc.utoronto.ca/usg/technotes/smtp-intro.html

(2) https://slate.com/technology/2002/03/e-mail-impersonator.html

https://cyberbullying.org/sextortion

https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/

(3) https://web.archive.org/web/20210719225916/https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones

https://www.forbes.com/sites/daveywinder/2025/05/11/new-hello-pervert-email-attack-warning---i-know-where-you-live/

https://www.reddit.com/r/cybersecurity_help/comments/1joloku/pegasus_spyware_scam_how_did_they_send_from_my/?chainedPosts=t3_1e3bql0

https://www.forbes.com/sites/thomasbrewster/2018/07/31/sextortion-scam-with-hacked-passwords-scores-250000-dollars-for-cybercriminals/#301678f3df16


Tags:

20

Comments

Pretty informative on this

I had this scam email before but I didn't do anything with it and just ignored it and deleted it,definitely felt like a scam

Definitely living in a scary time with the rise of doxxing and leaks occuring as often

Your doing the world a favour informing the community on this

Interesting. You did the right and only thing to do when encountering this scam: do nothing, report, block and ignore. Did the scammer mention Pegasus? Before it, they usually mentioned Trojans but they never explicitly said the name to stay as generic as possible to avoid a tech-savy might catch them red-handed.

And now with AI, machine learning and deepfakes (both visual and acoustic) this scam can become more scary, because they can fabricate videos of you while having fun with yourself. But again the strategy is doing what you did, never interact with them and check the email authentication headers.

Thanks, glad you liked my blog^^ have a nice day!

Scammer: "Hello pervert [long diatribe of perverted stuff]"

Me, using a decoy email service: "I acknowledge my perversions... nay, I revel in it! You are the dishonest one! Hiding your shame in shadows, you fabricate justifications, rationales, excuses!"

Scammer: 404 an error has occurred.

Scammer.exe has stopped working XD

We used to get the pervert one at work all the time- "Which of you pedos is this aimed at!?" lolol

Lol, they are very stubborn. I hope none of you at work falls for this, but I assume you are already prepared.

I've actually received this kind of e-Mail in April I think.......
Ya know what I did? I replied with " Bite my shiny metal ass!! "

..And they never dared 2 come back.

Lol, best way to tell them to fuck off is quoting Futurama XD

I get this email every now and then and I just flag it as spam. And it delete it.

Good! That's who you do it, sadly not everyone might know this scam and fall for it especially now with new technologies such as deepfakes and machine learning that can make it more subtle. Still the general rule applies: do not interact, check the email metadata, flag/report it, delete it and ignore it.

@ShangXian peagus was mentioned yes, I knew it was a scam mainly from a email that I never used and only have for accounts

Their tactic is to use personal bribery and blackmail

As always do not respond to these emails and delete them

Totally agree. If you respond, your email results active to them and it will fall prey of more scam and phishing attacks.

@ShangXian Also uhh, forgot to mention - some of them like to attach your old , unused passkeys they've snagged off a data breach to seem more " tough " xD

Yeah, I've mentioned that in the blog. This is done to add more credibility to their scam and make the victim more willing to cooperate since losing your reputation is not something a sane person would want. They hope to take advantage of people's ignorance and illiteracy since fear feeds on ignorance. The very moment you acquire knowledge, everything is not that scary anymore.

In short: He who owes nothing fears nothing, so one can ignore those warnings.

Even in the case someone owns something that is not illegal ofc, these types of threats are just empty-threats, void in actual damage. But if the person engages with them and follows the procedure out of fear and solving as quick as possible the problem, then real damage occurs: money loss and target for future scams.

Gonna start handing out "fell for it" awards because this scam is just so obvious man.

The worst thing about this scam is fighting off the urge to hit them with a funny quip

LMAO true, but reading across many articles this type of sextortion, which is the easiest type very easy to recognize compared to the more dangerous ones: https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/sextortion , is increasing, meaning many people still fall for this obvious one. I would like to find statistics for this specific sextortion scam, but I haven't found anything so far. I hope to find something, I'm very intrigued by the statistics of this specific scam.

thank u so much

You are welcome^^

It's important to inform as many people as possible.

Yeah I got one of these sent to me by my own email address a few months back, really really strange. Thanks for making this post

Yeah, they use the spoofed email to make it appear it comes from your own address. It's a tactic aimed at making it look more legitimate. While there has been research into improving email security, little emphasis has been placed on informing users whose email addresses have been used for spoofing. Currently, only the email recipient can identify a fake email, and users whose addresses are spoofed remain unaware unless the recipient manually scrutinizes the message or DMARC reporting is enabled.

This is why I wanted to insist on the more technical aspect of emails, but I didn't want to be too technical because I know many concepts are not clear nor known to people. I blame educational system which still fails at truly educating people aka making them more pro-active when it comes to online and IT security. No need to become a real hacker, just some basic to intermediate knowledge is start.

As I am not particularly attack-able by scams, I have not read the entire post - only the 2 example emails.
As with most of these scams, this one disassembles pretty swiftly:
There is just no realism in the claim that somebody could even _afford_ that kind of setup. With their 'shotgun approach' their fictional software would require them to store several thousands of hours of streamed video as well as "mostly gibberish" data from the devices to confirm what urls had been opened. Doing that for just a handful of people _every_single_day_ would be a job in its own right. And if they could reliably automate that kind of job, they would not have to rely on blackmail - a _crime_, by the way...

The logistics behind such an operation would just be too tiring, legally risky, and expensive. Not to mention: Said software always "phones home", so sooner or later, somebody with a friend in IT and a gun would track their ass and steal their ill-gotten gains from the thief - if not worse.
If this was "real", the organized crime would pay them a visit sooner rather than later.

That being said: "Somebody" could feasibly hijack the camera of a device without the owner's knowledge. There are little "shove latch-thingies" (not the real name) available online. Or you just use a post-it note with a bit of paper so you don't accidentally smudge a lens.

·
Viewed on a more fundamental level, this is just the kind of scare-tactic that religions use. Particularly Christianity comes to mind: "Have you done anything wrong and thought you've gotten away with it? Wrong! The 'eye in the sky' knows everything you did. Repent now. Join our cult today, work hard, pay our taxes on top of your regular taxes..."
'Fun times...'

·
@ShangXian While I appreciate all the work you put into your posts, this must be super tiring. Rather than trying to laboriously explain every single scam in great detail, "vaccinating" your audience would seem like a more fruitful and long-lasting approach. A short article with a few examples of "successful" scams of the past would probably be a better use of your time.
( Wikipedia has a long list of various scams and hoaxes, like the ones listed in the various boxes under this article: https://en.wikipedia.org/wiki/Advance-fee_scam#External_links . But there are also non-profit websites that collect all the common and uncommon scams. )

The main issue is that most of the people who read articles such as this one will do so _after_ they got scammed or when they already evaded it. Realistically speaking there is only so much one can do - and driving yourself crazy by reading up on every recent scam is nothing anyone would do for long.

Most scams are aimed to destabilize the target - you cannot "always prepare to be surprised".

'But what you can do' is to be weary of criminals. Somebody just revealed themselves to be a criminal (or other kind of 'rule breaker'). Your next move should not be to trust them, but rather to disassemble what they just told you and _get_a_second_opinion_!

·
And if that article never comes to be, to anybody who has fallen victim to one of these or is worried them might get scammed in the future:
Buy and read 'The Art of Deception' by Kevin Mitnick. It's essentially a book on self-defense against social engineering:
https://en.wikipedia.org/wiki/The_Art_of_Deception
I read it 'once' over a decade ago and I still get "chances" to apply what I learned from that book several times a year (in 'actual' real life).

Defense against 'getting tricked' is a skill one can learn - like learning to ride a bicycle. But instead of training your muscle memory, you need to train your mind. And that it was this book does. You just need to retain what you learned and apply some abstraction.
Like a "skill book" in a video games. ;)

I do appreciate your concerns regarding the length and the nature of these types of blog, but keep in mind I don't plan to talk about every single scam, even the less known ones, I come across because:

1) my blogs are not meant to be IT-themed blogs especially because I'm not as tech savvy as I might sound with these posts. I still have a lot to learn especially now with the current Chat Control bs that's happening right now.

2) this blog can be seen a continuation of the first blog I made two weeks ago about the "I have accidentally reported you" where a person mentioned in the comments this scam which I personally wasn't aware of its existence. And at that time I didn't even know the more technical aspects of emails, notably the header or better I knew some of them theoretically but I didn't know the more metadata aspect. This is why I wanted to share that part. It's a way to educate people on how to be more effective at checking emails when they fill their inboxes or spam folders. I bet most people don't even take a look at the headers and check email authentication.
And to make it a bit more bearable as information denseness I wanted to add a silly tone during the caps locks part. It's also important

3) I want to maintain variety in the types of blogs I write. I hope to focus on more laid-back and silly stuff because frankly every time I focus on these type of themes my faith in humanity shrinks even more.

The only critique I feel to give to the second part of this message that I appreciate is the fact I tend to be a person not happy with simple and short stuff. I know it's probably a flaw of mine, but I can't help. This is a trait of mine since I was little^^'

I like and want to go in depth with things but at the same time I tried not to be too technical, I actually refrained myself from entering full nerd-mode for several reasons:

1) not to tire potential readers with information denseness
2) not to diverge the topic of the blog because I had a mental map where I knew all points I wanted to touch
3) character limits that force me to choose what to put and what not

Plus this blog is not meant to be fully read, one can always stop and just go directly for the links I put in the "Reference and footnotes" part which I provide because I was educated during University courses to provide them every time I post something that is not mine. Everyone is free to approach these blogs the way they want. And frankly I feel satisfied and happy after writing it, because it was a duty of mine to write (I promised it to myself after EwanDoggieNG talked about it, he was very kind to give me some articles about it and I've included them in the blog).

On Internet you find lots of guides that warn you about these types of scams and are more effective than me at getting to the point, but I didn't want to be clone of these guides (they are linked in the blog, so if someone doesn't want to go through it, can always visit these links). Once I got all knowledge I wanted (trust me I've spent an entire afternoon the same day Ewan told me about it), my mind just went "hey, is there a more pro-active/efficient way to detect it without the usual don't interact, it's a scam thingy?"

and this is when I discovered the email authentication headers thanks to some Reddit users' comments, a new world opened and I wanted to share it to people who might come across this blog (fans, passerby users alike). I wanted to combine in a condensed blog where both the scam and how to check validity of an email without being too technical go hand in hand.

--------------------------------------------------------------------------------------------

Totally agree with the last part of the comment, these are skills not that different from the ones we develop in a video game and I pretty know that book, it's also mentioned in my blog about that previous scam in that Reddit link I posted. In that link you will find every type of book when it comes to social engineering.

@Chdonga It's always easier saying "Yeah, that was obvious..." when you weren't the one who had been approached. Those scams are aimed to destabilize the target - which, admittedly, is sometimes hard to see for others.

I've met intelligent people who 'almost' got scammed. And oftentimes the ting that saved them was that they were physically unable to react immediately or went to the toilet as a first order of business and once they had a quiet moment to think about it went "Wait a minute...!"

This might interest you in this regard: The kind of legitimate solicitors/lawyers who send out "By the way, we have evidence that you torrented Bambi" also use wording that is aimed to scare and destabilize, so the recipient signs an admission of guilt immediately - saving them the trouble to allocate hours at court. (But they also include the actual file names, IPs used, and dates. Something a scammer couldn't.)

The majority of these attacks fail if you’ve set up your server spf policy correctly.

See Whois lookup for Yendor.space ;) (sure send me a hello)

Yeah, but many people don't even know what spf is. Although their use is increasing, estimates vary widely as to what percentage of emails have no form of domain authentication: from 8.6% to "almost half" and this is quite worrisome. For this reason, receiving mail systems typically have a range of settings to configure how they treat poorly-configured domains or email.

Here a list of links with interesting statistics:

https://dmarc.org/press/release-20130206/

https://web.archive.org/web/20180822084116/https://eggert.org/meter/dkim

https://web.archive.org/web/20160402102130/https://eggert.org/meter/spf

Reminds me of that "ILOVEYOU" email virus

Under the common element of interacting with you via social engineering yes, but it wasn't sextortion in nature. I find fascinating the story behind this worm. It was created by Onel De Guzman, a 24-year-old then a student at AMA Computer College of the Philippines. He was poor and was struggling to pay for internet access. This worm was able to steal the password of others which would let him use the internet services by logging into other user accounts.

He believed that internet access was a human right, and submitted an undergraduate thesis to the college which proposed the development of a trojan to steal internet login details. He claimed that this would allow users to be able to afford an internet connection, arguing that those affected by it would experience no loss. The proposal was rejected by the college, which remarked that his proposal was "illegal" and that "they did not produce burglars". This led De Guzman to claim that his professors were closed-minded, and he ultimately dropped out of the college and began development of the worm.

Some mail messages sent by ILOVEYOU include:

VIRUS ALERT!!
Important! Read Carefully!

And another fun fact about this worm: originally designing the worm to only work in Manila, De Guzman removed this geographic restriction out of curiosity, which allowed the worm to spread worldwide. De Guzman did not expect this worldwide spread.

It originated in the Pandacan neighborhood of Manila in the Philippines on 4 May 2000, thereafter moving westward through corporate email systems as employees began their workday that Friday morning – moving first to Hong Kong, then to Europe, and finally the United States. Because the worm used mailing lists as its source of targets, the messages often appeared to come from acquaintances and were therefore often regarded as "safe" by their victims, providing further incentive to open them.

In just about 10 days, ILOVEYOU reached an estimated 45 million users and caused about $10 billion in damages. It spread so quickly that many major enterprises like the Ford Motor Company, AT&T and Microsoft, as well as government organizations like the Pentagon, CIA, U.S. Army, and parliaments in Denmark and the U.K., had to completely shut down their email services as they tried to bring the virus under control and mitigate its damage.

I will be frank, despite having caused so much damage and one shall be extremely cautious I have mixed feelings towards the history behind it and a bit of respect for De Guzman in his attempt to make Internet more accessible to people of his country despite I acknowledge the illegal nature, I repeat. But still...

This is not a virus, but a worm. A worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. The duplication occurs by exploiting parts of an operating system that are automatic and invisible to the user. Typically, a user only notices a worm when its uncontrolled replication consumes system resources and slows or halts other tasks.

Vulnerabilities in networking protocols, such as File Transfer Protocol, are the main tools used by the worm to replicate itself. After infection occurs, it will typically follow its prime directive: to remain active on an infected system for as long as possible and spread to as many other vulnerable systems as possible.

@Yatsufusa I worked in IT for six years. I've been approached by scammers online and irl. I've taken so many security and risk control courses at work that it's downright exhausting. Then when people get their computers locked for clicking a scam email that has a big ol' "CAUTION: THIS EMAIL ISN'T FROM THE OFFICE OR ANY SENDER AFFILIATED WITH THE OFFICE. DO NOT CLICK ANY LINKS" header up too, I'm one of the first people they ask to fix it. It's one thing if English isn't the recipient's first language, but sometimes it's like weaponized incompetence.

Knowing to not give in to someone trying to press you for personal information is something they need to teach kids in school.

@Chdonga First of all: My deepest sympathy! I have some basic computer knowledge myself and oftentimes that makes me some kind of 'expert' in the eyes of acquaintances and strangers alike. I will not pretend I feel the full depth of your pain but I am no total stranger to the kinds of situations where they just read the answer to you out loud and then ask you what to do in the very next sentence. And you're supposed to keep a straight face and say that could have happened to anyone - because it's 'rude' otherwise.

Also: Ignoring 'that kind of header' is... Wow! It makes me think that those are the kind of people who do not use seatbelts because they are 'inconvenient' to them or something...

But I do stand by what I said about 'destabilizing the target'.
I'm no psychologist, but I suspect that, if somebody does not deal with liars on a semi-regular basis (or does not realize it) or is used to make other deductions, a certain naivity settles in - accepting things more readily. If somebody is unfamiliar with a situation and is emotional on top of that, often enough their emotions will overrule their logic. They want to "escape" the situation they are in and they have already been shown a well-lit path back to their normal life.
The way I heard these situations play out, often enough it was either a familiarity with a comparable 'trick' or that they took a mere moment to think about the situation.

I'm not defending the link-clickers in the example you provided above, though. From how I understand it, that header should have given them the aforementioned "moment to think about the situation".

And I do agree that personal information should be kept private on the internet. I often advocated against* making "It's my birthday today"-posts, but eventually, I gave up. Sometimes I think it won't matter in the grand scheme of things, other times I feel like I should plant 'giant warning signs' about 'everything' all over Newgrounds. Usually, the inertia (and the hope that most users don't use unified branding) wins.

* You can search for "It's my birthday/cake day!" here, if you're so inclined:
Yatsufusa's Frequently Given Replies
https://yatsufusa.newgrounds.com/news/post/1487260