Extortion scam emails
-
The scammers behind extortion attempts are using lists of usernames, passwords, and other personal details that may have been compromised and collected in one of the numerous data leaks that have occurred to major online services.
-
No, it does not. While it is possible for a cybercriminal to obtain your password by compromising your device (this is why a good antivirus protection is so important!), a cybercriminal may also obtain one of your passwords from a breach of a third-party website or online service where you used that password.
-
-
Do not respond or send any payments to the scammer.
-
Change your passwords immediately. This goes for email and all accounts, including bank accounts and PIN numbers. Create strong, complicated, new passwords that feature a confusing slew of numbers and symbols.
-
Run a Full System Scan for viruses and unknown threats on your computer.
-
(US customers only) Find out if your personal information has been compromised.
LifeLock offers a free breach detection tool which you can use to find out if your personal information has been compromised. You may access it here: https://www.lifelock.com/breach-detection. Norton LifeLock also offers tools to help to monitor1 and protect your personal information.
No one can prevent all identity theft or cybercrime.
1LifeLock does not monitor all transactions at all businesses.
The solution made it easy for me to handle my issue.
Yes
No
Help us improve this solution.
Thank you for helping to improve this experience.
DOCID: v131199322
Operating System: Windows, Mac OS X, Android, iOS
Last modified: 11/19/2019