News Articles
March, 2026

Don’t Panic: How to Beat the “Hello Pervert” Sextortion Scam

thumbnail

You’re scrolling through your inbox, perhaps winding down for the night, when a subject line grabs your attention and sends a jolt of ice through your veins. It’s not just a random spam email. It’s your own email address, or even worse, an old password you recognize instantly. Sometimes, it’s both. The email starts with two chilling words: “Hello, pervert.”

The message that follows is designed to make your heart pound. The sender claims they’ve hacked your webcam, recorded embarrassing private moments, and are now demanding a Bitcoin payment of hundreds or thousands of dollars. Pay up in 48 hours, or they’ll send the footage to everyone in your contact list.

If you’ve received an email like this, you’re not alone. This is the infamous “Sextortion” scam, and it preys on fear, shame, and a clever understanding of how data breaches work. At CJ Network Systems, we’re here to tell you: Don’t panic. This is almost certainly a bluff.

The “Magic Trick”: Old Data, New Fear

The reason this scam is so effective lies in its primary “proof”—that recognizable password or your email address in the subject line. This isn’t a sign of a live, active hack on your current system. Instead, it’s the result of:

  • Old Data Breaches: Years ago, a company you once used (like LinkedIn, Adobe, or even a smaller online service) suffered a data breach. Your email and an associated password were stolen and compiled into “combo lists.” According to investigative reports from Krebs on Security, these lists are sold cheaply on the dark web for exactly this purpose.

  • Automated Campaigns: The scammers don’t individually hack you. They run an automated script that “mail merges” these old email-password pairs into a threat message. The Federal Trade Commission (FTC) classifies this as a classic phishing tactic designed to create artificial urgency.

  • Email Spoofing: To heighten the illusion, some scammers “spoof” the sender’s address to make it appear as if the email came from your own account. This manipulates email headers to trick your brain, but as noted by the FBI’s IC3 (Internet Crime Complaint Center), it does not mean they have access to your actual inbox.


Debunking the Technical Lies

The scammers’ claims often sound sophisticated, but they unravel under scrutiny:

  • The “Split-Screen Video” Claim: They claim to have synced your webcam with your screen recording. This would require massive processing power and bandwidth to upload without detection—something experts at the Electronic Frontier Foundation (EFF) confirm is nearly impossible for this type of mass-automated attack.

  • The Missing Proof: If they truly had compromising footage, they would send a screenshot. They don’t, because the video doesn’t exist. Their entire strategy relies on your fear.

  • Untraceable Bitcoin & VPNs: While they mention Bitcoin to sound like masterminds, it is used because it is difficult to reverse, not because they are “untraceable” geniuses.

Your Tactical Defense: Action Over Anxiety

If you receive one of these emails, here is your verified playbook:

  1. Do Not Panic: Fear is the only way this works.

  2. Do Not Respond or Pay: Engaging confirms your email is active.

  3. Audit Your Access: If the password in the email is one you still use, change it immediately.

  4. Deploy MFA (Multi-Factor Authentication): This is your strongest defense. Enable MFA on every account. Even with a password, a scammer cannot enter without that second physical code.

  5. Check the Leaks: Use Have I Been Pwned, a trusted industry tool, to see exactly which old breach leaked your data.

  6. Physical Protection: Use a physical webcam cover. As the saying goes, “You can’t hack a piece of plastic.”

Secure Your Digital Perimeter with CJ Network Systems

While these emails are often bluffs, they are a reminder that the digital world is a battlefield. Protecting your business requires more than just ignoring spam; it requires a hardened infrastructure.

At CJ Network Systems, we don’t just talk about cybersecurity; we build it. We specialize in:

  • Secure Web Development: High-performance, secure-first websites.

  • Digital Transformation: Modernizing your tech stack safely.

  • SEO & Strategic Recovery: Protecting your visibility and recovering from security incidents.

  • Cybersecurity Consulting: Implementing firewalls, MFA, and secure infrastructure.

Don’t let old data breaches jeopardize your peace of mind. Visit us at cjnetworksystems.com to start a conversation about securing your digital future.