Dirty App Removal: “Have you heard about Pegasus” Email Scam
The “Have you heard about Pegasus?” email phishing scam is part of a large-scale spam campaign designed to deceive recipients into believing their devices are compromised with malicious software. These emails claim that the recipient’s phone has been infected with the notorious Pegasus malware, and that hackers have recorded sensitive and private information. However, this is nothing more than a sextortion scam, attempting to scare recipients into paying a ransom.
In reality, none of the claims made in the email are true. Your device has not been infected, and no explicit videos exist. The email relies on psychological manipulation to convince users that they must act quickly to avoid embarrassment. Let’s break down how this scam works and how you can protect yourself from such attacks.
Automatically Detect and Remove Phishing Scam Threats from Your Computer with SpyHunter
Is Your Computer Infected with a Phishing Scam? Automatically Remove Phishing Scam Threats for FREE and Protect Your Computer with SpyHunter.
Breaking Down the Scam
The emails are structured to mimic a serious security threat, falsely claiming your iPhone or Android device has been infiltrated by Pegasus malware. This malware, the scammers claim, can record your calls, access your messages, capture images, and even control your camera and microphone without your knowledge. To avoid the release of supposedly explicit content, the scammer demands payment—usually around 0.035 Bitcoin (BTC), which is approximately $1,000.
While the scammers may succeed in scaring some individuals into paying the ransom, it’s crucial to remember that all of these claims are false. No such malware has been installed on your device, and the hackers do not possess any compromising content.
The scam phishing email reads like the following:
Hello, I’m going to share important information with you.
Have you heard about Pegasus?
You have become a collateral victim. It’s very important that you read the information below.Your phone was penetrated with a “zero-click” attack, meaning you didn’t even need to click on a malicious link for your phone to be infected.
Pegasus is a malware that infects iPhones and Android devices and enables operator of the tool to extract messages, photos and emails,
record calls and secretly activate cameras or microphones, and read the contents of encrypted messaging apps such as WhatsApp, Facebook, Telegram and Signal.Basically, it can spy on every aspect of your life. That’s precisely what it did.
I am a blackhat hacker and do this for a living. Unfortunately you are my victim. Please read on.As you understand, I have used the malware capabilities to spy on you.
And by that I mean that I have collected your parts of your private life.My only goal is to make money. And I have perfect leverage for this.
As you can imagine in your worst dream, I have videos of you exposed during the most private moments of your life, when you are not expecting it.I personally have no interest in them, but there are public websites, that have perverts loving that content.
As I said, I only do this to make money and not trying to destroy your life. But if necessary, I will publish the videos.
If this is not enough for you, I will make sure your contacts, friends and everybody you know see those videos as well.Here is the deal. I will delete the files after I receive 0.035 Bitcoin (about 1600 US Dollars).
You need to send that amount here 1AXNYLDEG5YEzc2eyUh7SUYYKeRUaRwseuI will also clear your device from malware, and you keep living your life.
Otherwise, shit will happen.The fee is non negotiable, to be transferred within 2 business days.
Obviously do not try to ask for any help from anybody unless you want your privacy to be violated.
I will monitor your every move until I get paid. If you keep your end of the agreement, you wont hear from me ever again.
Take care.
How These Spam Emails Infect Devices
Though the “Have you heard about Pegasus?” scam doesn’t actually infect your system, it’s essential to understand how such spam campaigns typically spread malware. Many of these emails contain malicious attachments or links that trigger infections when opened. Common malicious file types include:
- Microsoft Office documents
- PDF files
- Executable files (.exe)
- JavaScript files
- Archives (.zip, .rar)
Once these files are opened, they can execute malicious code, especially in older versions of Microsoft Office, which do not have the protections modern versions do. Infections can also happen via dubious download sites, cracked software, or fake software updates.
How to Avoid Email-Based Malware Infections
To stay safe from malicious emails, follow these tips:
- Be cautious with emails: Avoid opening suspicious or unsolicited emails, especially those containing attachments or links.
- Update software: Use the latest versions of Microsoft Office, which have protected view modes to prevent malicious macros from running automatically.
- Avoid unofficial download channels: Only download software from trusted sources, and avoid using peer-to-peer networks, cracked tools, or sites that offer free downloads without verification.
- Use strong antivirus protection: Make sure you have a reliable antivirus or anti-malware program installed, such as SpyHunter, to scan for and remove threats.
How to Automatically Remove Malware
If you have opened a suspicious attachment or clicked on a malicious link, it’s essential to act quickly to prevent further damage. An automatic malware removal tool can be your best defense against infections. Programs like SpyHunter can automatically scan your system, detect malware, and safely remove it.
Here’s how to easily stop and remove malware:
- Download and install SpyHunter or another reputable anti-malware program.
- Run a full system scan to detect any malicious files or programs.
- Quarantine and remove any identified threats. SpyHunter’s advanced features make this process quick and easy, giving you peace of mind that your system is clean.
The “Have you heard about Pegasus?” email scam is just another tactic used by cybercriminals to trick unsuspecting users into handing over their money. By staying informed, exercising caution when handling suspicious emails, and using an effective anti-malware tool like SpyHunter, you can protect yourself from these threats and ensure that your system stays secure.
Make sure to take immediate action if you suspect your device has been compromised, and rely on trusted tools to automatically stop and remove any malware.
HOW TO REMOVE PHISHING SCAMS
Automatically Detect & Remove Phishing Scam Threats for FREE with SpyHunter.