– Nigerian SCAM

You are quietly at your computer while working or chilling and an email arrives from an unknown address.
You open it and read the story of this Nigerian prince in trouble somewhere in Africa or Europe, who ran out of money and is asking you for financial help.
In return, he promises you in the email that he will send you 10 or 20 times the agreed sum once he gets home.
Isn’t it a bit strange as a story?
We also have another variant, that of the Nigerian astronaut.
Abandoned in space by his agency, a super sad guy that just only wants to go home.
From Space.
Probably in the ISS.
Of course, because space agencies spend millions of dollars to send scientists into space to do research and then halfway decide to abandon them, no one knows where, inside some random shuttles.
Or inside the Space Station, which is known to be so large and spacious that it has room for random people.

Another variation we have seen is the story of the prisoner.
Our writer asks us for help because he is being held prisoner in some village in Afrika or Arabia, in the hands of terrorists or criminals.
Our new friend has managed to get his cell phone to work and he promises you that if you send him money to pay the ransom he will give you all his jewels.
In fact,is full of criminals and terrorists who leave you the cell phone with which to write emails around the world, especially to do crowfunding to pay ransoms of people you have never seen.
And they write to you, because they know that you are so much good hearted that you will help them.
Now it is clear that they are scams if you think about it for a moment.
The stories are quite ridiculous and imaginative that with careful analysis they also make you laugh.
Don’t be fooled.
Trash the emails and have a laugh.

– Ramson mail
Ramson mails are emails arriving from unknown addresses in which you are asked for a ransom in bitcoin to prevent your photos or videos in intimate behavior from being spread on the web or sent to your email contacts or social friends.
In the email it is assumed that your PC is infected with a malware that has filmed and stolen your data.
You will find a bitcoin address and an ultimatum, indicating a figure to be sent within a certain amount of time.
The email looks like this:

𝙸 πš”πš—πš˜πš , (your password), πš’πšœ πš’πš˜πšžπš› πš™πšŠπšœπšœπš πš˜πš›πš.

𝙸 πš—πšŽπšŽπš πš’πš˜πšžπš› πšŒπš˜πš–πš™πš•πšŽπšπšŽ πšŠπšπšπšŽπš—πšπš’πš˜πš— πšπš˜πš› πšπš‘πšŽ πš—πšŽπš‘πš πšƒπš πšŽπš—πšπš’-πšπš˜πšžπš› πš‘πš˜πšžπš›πšœ, πš˜πš› 𝙸 πš πš’πš•πš• πš–πšŠπš”πšŽ πšœπšžπš›πšŽ 𝚒𝚘𝚞 πšπš‘πšŠπš 𝚒𝚘𝚞 πš•πš’πšŸπšŽ 𝚘𝚞𝚝 𝚘𝚏 πšπšžπš’πš•πš πšπš˜πš› πšπš‘πšŽ πš›πšŽπšœπš 𝚘𝚏 πš’πš˜πšžπš› πš•πš’πšπšŽ.

π™·πš’, 𝚒𝚘𝚞 𝚍𝚘 πš—πš˜πš πš”πš—πš˜πš  πš–πšŽ πš™πšŽπš›πšœπš˜πš—πšŠπš•πš•πš’. π™±πšžπš 𝙸 πš”πš—πš˜πš  πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš πš›πšŽπšπšŠπš›πšπš’πš—πš 𝚒𝚘𝚞. πšˆπš˜πšžπš› πšπš‹ πšŒπš˜πš—πšπšŠπšŒπš πš•πš’πšœπš, πš™πš‘πš˜πš—πšŽ πšŒπš˜πš—πšπšŠπšŒπšπšœ πš™πš•πšžπšœ πšŠπš•πš• πšπš‘πšŽ πšŸπš’πš›πšπšžπšŠπš• πšŠπšŒπšπš’πšŸπš’πšπš’ πš’πš— πš’πš˜πšžπš› πšŒπš˜πš–πš™πšžπšπšŽπš› πšπš›πš˜πš– πš™πšŠπšœπš 𝟷𝟼𝟺 𝚍𝚊𝚒𝚜.

π™°πš—πš πšπš‘πš’πšœ πš’πš—πšŒπš•πšžπšπšŽπšœ, πš’πš˜πšžπš› πšœπšŽπš•πš πš™πš•πšŽπšŠπšœπšžπš›πšŽ πšŸπš’πšπšŽπš˜, πš πš‘πš’πšŒπš‘ πš‹πš›πš’πš—πšπšœ πš–πšŽ 𝚝𝚘 πšπš‘πšŽ πš–πšŠπš’πš— πš›πšŽπšŠπšœπš˜πš— πš πš‘πš’ 𝙸 πšŠπš– πš πš›πš’πšπš’πš—πš πšπš‘πš’πšœ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› 𝚎-πš–πšŠπš’πš• 𝚝𝚘 𝚒𝚘𝚞.

πš†πšŽπš•πš• πšπš‘πšŽ πš™πš›πšŽπšŸπš’πš˜πšžπšœ πšπš’πš–πšŽ 𝚒𝚘𝚞 πš πšŽπš—πš 𝚝𝚘 πšπš‘πšŽ πš™πš˜πš›πš— πš πšŽπš‹ πšœπš’πšπšŽπšœ, πš–πš’ πš–πšŠπš•πš πšŠπš›πšŽ πšŽπš—πšπšŽπš πšžπš™ πš‹πšŽπš’πš—πš πšπš›πš’πšπšπšŽπš›πšŽπš πš’πš—πšœπš’πšπšŽ πš’πš˜πšžπš› πš™πšŽπš›πšœπš˜πš—πšŠπš• πšŒπš˜πš–πš™πšžπšπšŽπš› πš πš‘πš’πšŒπš‘ πšŽπš—πšπšŽπš πšžπš™ πšœπš‘πš˜πš˜πšπš’πš—πš 𝚊 πš‹πšŽπšŠπšžπšπš’πšπšžπš• πšŸπš’πšπšŽπš˜ πšŒπš•πš’πš™ 𝚘𝚏 πš’πš˜πšžπš› πš–πšŠπšœπšπšžπš›πš‹πšŠπšπš’πš˜πš— 𝚊𝚌𝚝 πš‹πš’ πšπš›πš’πšπšπšŽπš›πš’πš—πš πš’πš˜πšžπš› πšŒπšŠπš–.
(𝚒𝚘𝚞 𝚐𝚘𝚝 𝚊 πšžπš—πššπšžπšŽπšœπšπš’πš˜πš—πšŠπš‹πš•πš’ πšœπšπš›πšŠπš—πšπšŽ 𝚝𝚊𝚜𝚝𝚎 πš‹πšπš  πš•πš–πšπšŠπš˜)

𝙸 πš‘πšŠπšŸπšŽ πšπš‘πšŽ πšŽπš—πšπš’πš›πšŽ πš›πšŽπšŒπš˜πš›πšπš’πš—πš. π™Έπš 𝚒𝚘𝚞 πšπšŽπšŽπš• 𝙸 ‘πš– πš™πš•πšŠπš’πš’πš—πš πšŠπš›πš˜πšžπš—πš, πšœπš’πš–πš™πš•πš’ πš›πšŽπš™πš•πš’ πš™πš›πš˜πš˜πš πšŠπš—πš 𝙸 πš πš’πš•πš• πš‹πšŽ πšπš˜πš›πš πšŠπš›πšπš’πš—πš πšπš‘πšŽ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› πš›πšŽπšŒπš˜πš›πšπš’πš—πš πš›πšŠπš—πšπš˜πš–πš•πš’ 𝚝𝚘 𝟹 πš™πšŽπš˜πš™πš•πšŽ 𝚒𝚘𝚞’πš›πšŽ πšπš›πš’πšŽπš—πšπšœ πš πš’πšπš‘.

π™Έπš πšŒπš˜πšžπš•πš πšŽπš—πš πšžπš™ πš‹πšŽπš’πš—πš πš’πš˜πšžπš› πšπš›πš’πšŽπš—πš, 𝚌𝚘 πš πš˜πš›πš”πšŽπš›πšœ, πš‹πš˜πšœπšœ, πš–πš˜πšπš‘πšŽπš› πšŠπš—πš πšπšŠπšπš‘πšŽπš› (𝙸 πšπš˜πš—’𝚝 πš”πš—πš˜πš ! π™Όπš’ πšœπš˜πšπšπš πšŠπš›πšŽ πš πš’πš•πš• πš›πšŠπš—πšπš˜πš–πš•πš’ πšŒπš‘πš˜πš˜πšœπšŽ πšπš‘πšŽ πšŒπš˜πš—πšπšŠπšŒπš πšπšŽπšπšŠπš’πš•πšœ).

πš†πš˜πšžπš•πš 𝚒𝚘𝚞 πš‹πšŽ πšŒπšŠπš™πšŠπš‹πš•πšŽ 𝚝𝚘 πš•πš˜πš˜πš” πš’πš—πšπš˜ πšŠπš—πš’πš˜πš—πšŽ’𝚜 𝚎𝚒𝚎𝚜 πšŠπšπšŠπš’πš— πšŠπšπšπšŽπš› πš’πš? 𝙸 πšπš˜πšžπš‹πš πšπš‘πšŠπš …

π™·πš˜πš πšŽπšŸπšŽπš›, πš’πš 𝚍𝚘𝚎𝚜 πš—πš˜πš πš‘πšŠπšŸπšŽ 𝚝𝚘 πš‹πšŽ πšπš‘πšŠπš πš™πšŠπšπš‘.

𝙸 πš πšŠπš—πš 𝚝𝚘 πš–πšŠπš”πšŽ 𝚒𝚘𝚞 𝚊 𝟷 πšπš’πš–πšŽ, πš—πš˜ πš—πšŽπšπš˜πšπš’πšŠπš‹πš•πšŽ πš˜πšπšπšŽπš›.

π™Ώπšžπš›πšŒπš‘πšŠπšœπšŽ πš„πš‚π™³ 𝟸𝟢𝟢𝟢 πš’πš— πš‹πš’πšπšŒπš˜πš’πš— πšŠπš—πš πšœπšŽπš—πš πš’πš 𝚝𝚘 πšπš‘πšŽ πš‹πšŽπš•πš˜πš  πšŠπšπšπš›πšŽπšœπšœ:

1EGynC8hJMzXXXXXXX3NRD4AZK * V5Wsu28jdGB
[𝚌𝚊𝚜𝚎 πšœπšŽπš—πšœπš’πšπš’πšŸπšŽ, πšŒπš˜πš™πš’ πšŠπš—πš πš™πšŠπšœπšπšŽ πš’πš, πšŠπš—πš πš›πšŽπš–πš˜πšŸπšŽ * πšπš›πš˜πš– πš’πš]

(π™Έπš 𝚒𝚘𝚞 𝚍𝚘 πš—πš˜πš πš”πš—πš˜πš  πš‘πš˜πš , πš•πš˜πš˜πš”πšžπš™ πš‘πš˜πš  𝚝𝚘 πš‹πšžπš’ πš‹πš’πšπšŒπš˜πš’πš—. π™³πš˜ πš—πš˜πš 𝚠𝚊𝚜𝚝𝚎 πš–πš’ πš’πš–πš™πš˜πš›πšπšŠπš—πš πšπš’πš–πšŽ)

π™Έπš 𝚒𝚘𝚞 πšœπšŽπš—πš πšπš‘πš’πšœ ‘πšπš˜πš—πšŠπšπš’πš˜πš—’ (𝚠𝚎 πš πš’πš•πš• πšŒπšŠπš•πš• πš’πš πšπš‘πšŠπš?). πšπš’πšπš‘πš πšŠπšπšπšŽπš› πšπš‘πšŠπš, 𝙸 πš πš’πš•πš• 𝚐𝚘 𝚊𝚠𝚊𝚒 πšŠπš—πš πš—πšŽπšŸπšŽπš› πšŒπš˜πš—πšπšŠπšŒπš 𝚒𝚘𝚞 πšŠπšπšŠπš’πš—. 𝙸 πš πš’πš•πš• πšŽπš›πšŠπšœπšŽ πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš 𝙸’𝚟𝚎 𝚐𝚘𝚝 πšŠπš‹πš˜πšžπš 𝚒𝚘𝚞. 𝚈𝚘𝚞 πš–πšŠπš’ πšŸπšŽπš›πš’ πš πšŽπš•πš• πš”πšŽπšŽπš™ πš˜πš— πš•πš’πšŸπš’πš—πš πš’πš˜πšžπš› πš—πš˜πš›πš–πšŠπš• 𝚍𝚊𝚒 𝚝𝚘 𝚍𝚊𝚒 πš•πš’πšπšŽ πš πš’πšπš‘ πš£πšŽπš›πš˜ πšπšŽπšŠπš›.

𝚈𝚘𝚞 πš‘πšŠπšŸπšŽ 𝟸𝟺 πš‘πš˜πšžπš›πšœ πš’πš— πš˜πš›πšπšŽπš› 𝚝𝚘 𝚍𝚘 𝚜𝚘. πšˆπš˜πšžπš› πšπš’πš–πšŽ πšœπšπšŠπš›πšπšœ 𝚊𝚜 πšœπš˜πš˜πš— 𝚒𝚘𝚞 πšŒπš‘πšŽπšŒπš” 𝚘𝚞𝚝 πšπš‘πš’πšœ 𝚎 πš–πšŠπš’πš•. 𝙸 πš‘πšŠπšŸπšŽ 𝚐𝚘𝚝 πšŠπš— πšœπš™πšŽπšŒπš’πšŠπš• 𝚌𝚘𝚍𝚎 πšπš‘πšŠπš πš πš’πš•πš• πšπšŽπš•πš• πš–πšŽ 𝚊𝚜 πšœπš˜πš˜πš— 𝚊𝚜 𝚒𝚘𝚞 πš›πšŽπšŠπš πšπš‘πš’πšœ πšŽπš–πšŠπš’πš• πšπš‘πšŽπš›πšŽπšπš˜πš›πšŽ πšπš˜πš—’𝚝 πšŠπšπšπšŽπš–πš™πš 𝚝𝚘 𝚊𝚌𝚝 πšœπš–πšŠπš›πš.

As you can see, they claim that they know your password, which makes many people panicking.
But let’s stay calm.
What do we have to do?
Exclusively trash the email with a big laugh.
In most cases this is a classic phishing email sent to thousands of people, taking some stolen database containing your email and password.
No one has pierced your pc, no one has taken your data and no one has your email contacts.
You can even have a laugh by going to see on the bitcoin blockchain explorer how the address you were given is totally empty and without transactions.
To be on the safe side, do a check of your pc with a good antimalware and avoid certain “happy” sites to spend time.
And if you really have to, stick a piece of tape over your laptop’s webcam.
Follow our cybersecurity guide to avoid this unpleasant kind of thing.

 

Check next Scam HERE!