www.2-spyware.com Open in urlscan Pro
2606:4700:20::681a:542  Public Scan

Submitted URL: https://lnkd.in/gwChzKSm
Effective URL: https://www.2-spyware.com/remove-have-you-heard-about-pegasus-email-scam.html
Submission Tags: falconsandbox
Submission: On May 10 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://www.2-spyware.com/

<form method="get" id="searchform" action="https://www.2-spyware.com/">
  <input id="s" name="s" value="" type="text" class="s-menu-search-text">
  <label>
    <input title="Search" name="submit" id="searchsubmit" value="&nbsp;" style="display: none" type="submit">
    <svg xmlns="http://www.w3.org/2000/svg" style="background:#434343;padding:2px" width="16" height="16" viewBox="0 0 24 24">
      <path fill="#fff" d="M23.82 20.88l-6.35-6.35A9.48 9.48 0 100 9.47a9.48 9.48 0 0014.3 8.13l6.4 6.4 3.12-3.12zM3.52 9.47a5.95 5.95 0 1111.9.02 5.95 5.95 0 01-11.9-.02z"></path>
    </svg>
  </label>
</form>

POST https://www.paypal.com/cgi-bin/webscr

<form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_top">
  <input type="hidden" name="cmd" value="_donations">
  <input type="hidden" name="business" value="ugnius@kiguolis.com">
  <input type="hidden" name="lc" value="US">
  <input type="hidden" name="item_number" value="2-spyware.com">
  <input type="hidden" name="no_note" value="0">
  <input type="hidden" name="currency_code" value="USD">
  <input type="hidden" name="bn" value="PP-DonationsBF:btn_donate_LG.gif:NonHostedGuest">
  <button type="submit" name="submit" style="width: 92px; height: 26px;border: none;background: none;padding: 0;" title="PayPal - The safer, easier way to pay online!"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 736 208">
      <path fill="#F93" d="M736 120c0 48-40 88-88 88H88c-48 0-88-40-88-88V88C0 40 40 0 88 0h560c48 0 88 40 88 88v32z"></path>
      <linearGradient id="a" x1="368" x2="368" y1="-172" y2="20" gradientTransform="matrix(1 0 0 -1 0 28)" gradientUnits="userSpaceOnUse">
        <stop offset="0" stop-color="#FFEFD2"></stop>
        <stop offset=".2" stop-color="#FFB23C"></stop>
      </linearGradient>
      <path fill="url(#a)" d="M728 116c0 46-38 84-84 84H92c-46 0-84-38-84-84V92C8 46 46 8 92 8h552c46 0 84 38 84 84v24z"></path>
      <linearGradient id="b" x1="368" x2="368" y1="-92" y2="20" gradientTransform="matrix(1 0 0 -1 0 28)" gradientUnits="userSpaceOnUse">
        <stop offset="0" stop-color="#FEDE9E"></stop>
        <stop offset="1" stop-color="#FFF"></stop>
      </linearGradient>
      <path fill="url(#b)" d="M648 120c34 0 63-19 78-47-9-37-42-65-82-65H92C52 8 19 36 10 73c15 28 44 47 78 47h560z"></path>
      <path fill="#036"
        d="M168 144l18-88h37l9 2 8 5c2 2 5 4 6 7l4 10 2 12c0 10-2 18-6 25-3 8-8 13-13 18l-17 7-17 1-31 1zm21-15h9l14-1 9-4 9-13c2-6 3-12 3-20 0-6-1-10-3-14s-4-5-7-6l-11-1h-11l-12 59zm69-12c0-12 3-21 10-28s15-11 26-11c9 0 17 3 22 8s8 12 8 21c0 10-3 19-10 27-7 7-15 11-27 11-6 0-11-1-16-3-4-3-8-6-10-11s-3-9-3-14zm49-12c0-4-1-8-4-10s-5-4-9-4-7 1-10 4-5 5-7 10l-2 12c0 4 1 8 4 11 2 2 5 4 9 4 5 0 9-2 12-6 4-6 7-13 7-21zm36-25h16l-2 8c4-3 8-6 12-7l11-3a16 16 0 0117 16l-2 14-8 36h-17l8-37 1-9c0-2 0-4-2-5-1-2-3-2-5-2l-8 3-8 8-4 15-5 27h-18l14-64zm84 18l-16-2c2-5 5-10 10-13s11-5 19-5 14 2 18 5c4 4 6 8 6 12l-1 7-3 17-3 16 2 9h-17l-2-8-8 7c-3 2-7 2-10 2-5 0-10-2-13-5-4-4-5-8-5-13 0-7 1-11 5-15s11-6 21-7l16-2 1-6-2-5-7-1-7 1-4 6zm17 16l-4 1c-9 1-15 2-17 4l-3 6 2 5 6 2a15 15 0 0012-7c2-2 3-5 3-9l1-2zm31-21l2-13h9l2-10 20-12-5 22h11l-3 13h-11l-5 26-2 9 1 3 5 1 6-1-3 13-9 1c-6 0-11-1-13-3-3-3-5-6-5-10l3-14 5-25h-8zm97 24h-43v2c0 4 1 7 4 10 2 3 5 4 8 4 6 0 11-3 14-9l15 3c-3 6-7 10-12 14s-11 4-17 4c-8 0-15-3-21-8-5-5-8-13-8-21 0-9 3-17 8-24 6-9 16-14 28-14 8 1 14 3 19 8s6 11 6 20l-1 11zm-14-10v-2c0-5-1-8-3-11-2-2-5-3-9-3s-7 1-9 4-5 6-6 12h27z">
      </path>
    </svg></button>
</form>

POST https://www.2-spyware.com/subscribe

<form action="https://www.2-spyware.com/subscribe" method="post" class="subscribe g-form">
  <input type="hidden" name="submit" value="SubscribeConfirm">
  <input type="hidden" name="page_name" value="2-spyware.com">
  <fieldset>
    <input type="email" placeholder="Enter Your Email..." name="email_address" class="g-input g-full-width" value="" required="" maxlength="255">
    <input type="submit" value="Subscribe" class="g-submit-button">
  </fieldset>
  <p class="g-recaptcha" data-sitekey="6LfxmgUTAAAAAP0UUoDYnHSEqCsekuQ5p38II4dR"></p>
</form>

POST https://www.2-spyware.com/ask-a-question

<form method="post" action="https://www.2-spyware.com/ask-a-question" class="ask_question_form">
  <div class="ask_box">
    <textarea id="ask_question_quick_form" minlength="20" name="et_newpost_content" placeholder="How may we help you? Type in your question." cols="45" rows="5"></textarea>
  </div>
  <div class="cb"></div>
  <input type="hidden" name="et_new" value="1">
  <input type="hidden" name="et_add_answer" value="proccess">
  <input type="hidden" name="et_newpost_tags" value="Have you heard about Pegasus email scam,Have you heard about Pegasus email scam,">
  <input type="submit" value="Submit a Question" class="ask_form_button">
  <div class="cb"></div>
</form>

Text Content

2-spyware.com uses cookies to ensure you get the best experience.

Agree

Privacy policy


☰
Search:

News Malware Software Files Ask us Social DAO
AdwareRansomwareBrowser hijackerMac virusesTrojans


HAVE YOU HEARD ABOUT PEGASUS EMAIL SCAM (FAKE) - FREE INSTRUCTIONS

by Linas Kiguolis - - 2024-05-09 | Type: Malware
Special Offer
"Have you heard about Pegasus" is a fake email that you might receive
unexpectedly. Do not communicate with the authors - instead take precautions and
check your system thoroughly.
Remove it now Remove it now
More information about Fortect and Uninstall Instructions. Please review Fortect
EULA and Privacy Policy. Fortect scanner and manual repair option is free. An
advanced version must be purchased.
More information about Intego and Uninstall Instructions. Please review Intego
EULA and Privacy Policy. Intego scanner and manual repair option is free. An
advanced version must be purchased.


HAVE YOU HEARD ABOUT PEGASUS EMAIL SCAM REMOVAL GUIDE

DescriptionQuick solutionPrevention

Understand instantly
 * "Have you heard about Pegasus" is an email scam that attempts to manipulate
   you into paying ransom
 * Why did you receive the Pegasus email scam?
 * How the scam operates and how crooks attempt to manipulate victims
 * What (not) to do after receiving the "Have you heard about Pegasus" email
 * How to prevent from getting malware


WHAT IS HAVE YOU HEARD ABOUT PEGASUS EMAIL SCAM?


“HAVE YOU HEARD ABOUT PEGASUS” IS AN EMAIL SCAM THAT ATTEMPTS TO MANIPULATE YOU
INTO PAYING RANSOM



“Have you heard about Pegasus” email is a typical example of a sextortion scam,
designed to incite fear and prompt hasty payments from victims. The scam email
falsely claims that the recipient’s mobile device has been infected with the
high-profile Pegasus malware, allowing the scammer to record private videos and
threaten their release unless a ransom is paid. This scam cleverly utilizes the
name of a real piece of spyware, which was originally developed for crime
prevention and national security purposes, to lend credibility to the threats
made in the email.

Name “Have you heard about Pegasus” Type Email scam, fraud, fake email,
sextortion Distribution Malspam – the attackers send thousands of emails in bulk
to extort money from unsuspecting users Operation The scam operates by falsely
claiming that the recipient's device has been infected with the Pegasus malware,
using threats of releasing private videos to extort payment Ransom size $1,600
to be sent in Bitcoin to the provided crypto wallet Dangers Financial losses,
malware infections Removal Make sure you scan your system with security software
SpyHunter 5Combo Cleaner to ensure no malicious software is present Other tips
 * Use FortectIntego to clear your browser caches and browsing history
   automatically
 * Change all your passwords
 * Contact your bank and explain the situation – you should be advised on what
   to do next to ensure your security
 * Report the incident to your local cybersecurity authority


Special Offer
Remove it now
Remove it now
We offer Fortect to detect damaged files. Fix them with either free manual
repair or purchase the full version.More information about Fortect, Uninstall,
Terms and Privacy.

We offer Intego to detect damaged files. Fix them with either free manual repair
or purchase the full version.More information about Intego, Uninstall, Terms and
Privacy.



WHY DID YOU RECEIVE THE PEGASUS EMAIL SCAM?

It's rare that a “Have you heard about pegasus?” email appears in your inbox as
a consequence of deliberate action taken against you. Instead, mass email
campaigns are usually the result of fraudsters sending the same intimidating
message to a large number of email addresses in the hopes that a small
percentage of recipients would be intimidated into paying.

Scammers often obtain these email addresses through various means such as
breaches of databases, purchasing lists on the dark web, or using software tools
that scrape the web for contact information.

Email filters that usually catch and quarantine such scam attempts can sometimes
be bypassed. Scammers are continually refining their techniques to evade
detection by using less predictable email formats and engaging subject lines
that provoke curiosity or urgency. This method increases the chances that their
message will land in your primary inbox rather than in spam folders. Here are
some examples of previous naming patterns:

 * I regret to inform you about some sad news for you
 * It’s unpleasant to start the conversation with bad news
 * Your device was compromised

Moreover, the scam leverages a known technique of social engineering by invoking
the name of a sophisticated malware known to the public, thus exploiting a
general lack of detailed technical knowledge among the public.

This scare tactic is designed to create a high-pressure situation where the
recipient feels a compromised sense of privacy and a strong urge to resolve the
issue quickly by complying with the scammer's demands.


HOW THE SCAM OPERATES AND HOW CROOKS ATTEMPT TO MANIPULATE VICTIMS

The email begins with a cold opening that immediately seeks to engage and
unsettle the recipient with mentions of the Pegasus malware, claiming the
recipient’s phone has been compromised with a “zero-click” attack. This type of
attack refers to the capability of some malware to install itself without user
interaction, an assertion that adds a layer of authenticity and immediate threat
to the message.

Following the introduction, the scammer intensifies the threat by claiming to
have used Pegasus’s capabilities to access and record personal moments,
asserting possession of embarrassing or damaging footage. The threat escalates
with a demand for payment in Bitcoin, setting a strict deadline and warning
against seeking help or notifying authorities, which they claim will result in
further violation of privacy.



This email uses specific psychological triggers:

 * fear
 * urgency
 * invasion of privacy.

By convincing victims that their most private moments are in someone else's
hands, scammers manipulate emotions to override rational decision-making. The
mention of real malware like Pegasus adds believability to the claim, leveraging
half-truths to enhance the illusion that the threat is genuine.

Here's the full message you might get (although keep in mind that this may vary
slightly):

> Hello, I'm going to share important information with you.
> 
> Have you heard about Pegasus?
> You have become a collateral victim. It's very important that you read the
> information below.
> 
> Your phone was penetrated with a “zero-click” attack, meaning you didn't even
> need to click on a malicious link for your phone to be infected.
> Pegasus is a malware that infects iPhones and Android devices and enables
> operator of the tool to extract messages, photos and emails,
> record calls and secretly activate cameras or microphones, and read the
> contents of encrypted messaging apps such as WhatsApp, Facebook, Telegram and
> Signal.
> 
> Basically, it can spy on every aspect of your life. That's precisely what it
> did.
> I am a blackhat hacker and do this for a living. Unfortunately you are my
> victim. Please read on.
> 
> As you understand, I have used the malware capabilities to spy on you.
> And by that I mean that I have collected your parts of your private life.
> 
> My only goal is to make money. And I have perfect leverage for this.
> As you can imagine in your worst dream, I have videos of you exposed during
> the most private moments of your life, when you are not expecting it.
> 
> I personally have no interest in them, but there are public websites, that
> have perverts loving that content.
> As I said, I only do this to make money and not trying to destroy your life.
> But if necessary, I will publish the videos.
> If this is not enough for you, I will make sure your contacts, friends and
> everybody you know see those videos as well.
> 
> Here is the deal. I will delete the files after I receive 0.035 Bitcoin (about
> 1600 US Dollars).
> You need to send that amount here 1AXNYLDEG5YEzc2eyUh7SUYYKeRUaRwseu
> 
> I will also clear your device from malware, and you keep living your life.
> Otherwise, shit will happen.
> 
> The fee is non negotiable, to be transferred within 2 business days.
> 
> Obviously do not try to ask for any help from anybody unless you want your
> privacy to be violated.
> I will monitor your every move until I get paid. If you keep your end of the
> agreement, you wont hear from me ever again.
> Take care.


WHAT (NOT) TO DO AFTER RECEIVING THE “HAVE YOU HEARD ABOUT PEGASUS” EMAIL

If you receive an email like this, the first step is to remain calm. Do not
respond to the email or make any payments. Responding or paying the ransom only
confirms to the scammers that they have reached a valid and responsive email
address or even a potential repeat target.

Instead, report the email to your local authorities or a cybercrime agency in
your country to help them track and possibly act against such threats. Provide
as much information as possible, as it will help the investigation.

To ensure your devices are secured, you should scan them with updated security
software – like Malwarebytes or SpyHunter 5Combo Cleaner – to ensure that there
is malware on your device (it is unlikely to be true but you should better be
safe than sorry).

Should you have made a payment, it’s important to contact your bank immediately
to report the fraud and discuss any possible actions to retrieve the funds. As a
preventative measure, you should change your passwords (especially for the email
account and if you have reused passwords before) and enable multi-factor
authentication where possible.



Offer


do it now!
Download
Fortect Happiness
Guarantee Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Compatible with macOS

What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our
support team and provide as much details as possible.


Fortect Intego has a free limited scanner. Fortect Intego offers more through
scan when you purchase its full version. When free scanner detects issues, you
can fix them using free manual repairs or you can decide to purchase the full
version in order to fix them automatically.


Fortect review | Terms of Use | Privacy policy | Refund Policy | Uninstall guide


Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing
corrupted files with Fortect, try running SpyHunter 5.
Download SpyHunter 5 Review »
Privacy policy | Terms of Use | Product Refund Policy | Uninstall Instructions


Malwarebytes
Download | Review | Privacy policy | Terms of Use | Product Refund
Policy | Uninstall Instructions


Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing
corrupted files with Intego, try running Combo Cleaner.
Download Combo Cleaner Review »
Privacy policy | Terms of Use | Product Refund Policy | Uninstall Instructions





HOW TO PREVENT FROM GETTING MALWARE


STREAM VIDEOS WITHOUT LIMITATIONS, NO MATTER WHERE YOU ARE

There are multiple parties that could find out almost anything about you by
checking your online activity. While this is highly unlikely, advertisers and
tech companies are constantly tracking you online. The first step to privacy
should be a secure browser that focuses on tracker reduction to a minimum.

Even if you employ a secure browser, you will not be able to access websites
that are restricted due to local government laws or other reasons. In other
words, you may not be able to stream Disney+ or US-based Netflix in some
countries. To bypass these restrictions, you can employ a powerful Private
Internet Access VPN, which provides dedicated servers for torrenting and
streaming, not slowing you down in the process.


DATA BACKUPS ARE IMPORTANT – RECOVER YOUR LOST FILES

Ransomware is one of the biggest threats to personal data. Once it is executed
on a machine, it launches a sophisticated encryption algorithm that locks all
your files, although it does not destroy them. The most common misconception is
that anti-malware software can return files to their previous states. This is
not true, however, and data remains locked after the malicious payload is
deleted.

While regular data backups are the only secure method to recover your files
after a ransomware attack, tools such as Data Recovery Pro can also be effective
and restore at least some of your lost data.


 * Ask us a question
 * Post a comment


About the author

Linas Kiguolis - Expert in social media

If this free guide helped you and you are satisfied with our service, please
consider making a donation to keep this service alive. Even a smallest amount
will be appreciated.

Contact Linas Kiguolis
About the company Esolutions



×
It all starts with knowledge

Get the latest security news, full analysis of the newest computer threats, and
easy-to-use prevention tips. Subscribe to 2-spyware.com newsletter!




● now online



Virus Activity Level
Virus Activity

Virus Activity
2024-05-10
Low
Discovered/Renewed Today:
 * Browser Assistant
 * FocusStill Mac virus
 * Bi.epilreoffer.com ads
 * AdClean (works on Youtube) adware
 * Fatp ransomware

Most Dangerous Today: Jigsaw ransomware virus
Get this widget »

News
 * Visited porn sites? You are infected! (Top most dangerous sites) 2020-08-21
   
 * Covid-19. Online safety issues during the quarantine: how to manage your
   privacy 2020-03-31
   


Malware
 * VersionTrust Mac virus 10/05/24
 * Have you heard about Pegasus email scam 09/05/24
 * Qepi ransomware 07/05/24
 * Baaa ransomware 06/05/24
 * WebCoordinator Mac virus 06/05/24
 * Anehortensia.com ads 30/04/24
 * “Security Status not satisfied” email scam 09/05/24
 * Weatherly browser hijacker 26/04/24


Offer

do it now!
Download
Fortect Happiness
Guarantee Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Compatible with macOS

What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our
support team and provide as much details as possible.


Fortect Intego has a free limited scanner. Fortect Intego offers more through
scan when you purchase its full version. When free scanner detects issues, you
can fix them using free manual repairs or you can decide to purchase the full
version in order to fix them automatically.



Fortect review | Terms of Use | Privacy policy | Refund Policy | Uninstall guide


About us | Terms of Use | Privacy Information Notice | Disclaimer | Disclosure |
Contact us | Webmasters | Rss feed | Like us

--------------------------------------------------------------------------------

© 2001-2024  2-spyware.com.  All Rights Reserved. Reproduction in part or whole
without written permission is prohibited. Powered by esolutions.lt