The Pegasus Spyware Email – Report

The Pegasus Spyware is a very real piece of malware that’s been around for many years. It’s one of the most famous forms of spyware in the cybersecurity circles. However, if you’ve received a scary email that tells you Pegasus is currently in your device and it has allowed the email’s sender to capture embarrassing images and videos of you, know that this is nothing but a scam!

Do not click any links in the email and do not send money to its sender, who’s now trying to blackmail you. Instead, read the following lines to learn more about this scam and how to protect yourself from it.

pegasus spyware scam

What is the Pegasus Spyware Email Scam?

The Pegasus Spyware email is a classic example of a “sextortion” scam that relies on the fact that many Internet users visit adult sites. It’s similar to scams like the “I Managed To Install A Spyware” or the classic Sextortion Email Scam.

The scammers want you to think you’ve been monitored and recorded when on such sites so they can then blackmail you if you don’t want the footage to become public. It’s a simple, yet effective scheme that leverages people’s fear of embarrassment that causes them to panic and not think rationally.

The message in this particular case claims all your devices—your phone, tablet, and computer—have been hacked with spyware called Pegasus. According to the email, this spyware lets the sender monitor everything you do. They say they’ve gained access to your webcam, call logs, messages, and even your contacts.

The tone shifts quickly. They accuse you of visiting “questionable” adult websites and claim to have video recordings of your private activities. To drive the threat home, they say they’ll send these recordings to your friends, family, and coworkers through platforms like WhatsApp, Telegram, Facebook, and email.

The sender then gives you an ultimatum. Pay $1,350 in Litecoin (LTC) to their cryptocurrency wallet address (ltc1qk8g670vuqrvq6d4g8apanp7h7cc0kz5msdpkd9) within 48 hours. If you comply, they promise to delete the videos and uninstall the spyware. If you don’t, they claim to have the power to ruin your reputation in one click. Their message is chilling but, as you’ll see, built entirely on lies.

If you want to read the full letter, you can do so below:


Hello pervert, I’ve sent this message from your Microsoft account.

I want to inform you about a very bad situation for you. However, you can benefit from it, if you will act wisеly.

Have you heard of Pegasus? This is a spyware program that installs on computers and smartphones and allows hackers to monitor the activity of device owners. It provides access to your webcam, messengers, emails, call records, etc. It works well on Android, iOS, macOS and Windows. I guess, you already figured out where I’m getting at.

It’s been a few months since I installed it on all your dеviсеs because you were not quite choosy about what links to click on the intеrnеt. During this period, I’ve learned about all aspects of your private life, but оnе is of special significance to me.

I’ve recorded many videos of you jerking off to highly controversial роrn videos. Given that the “questionable” genre is almost always the same, I can conclude that you have sick реrvеrsiоn.

I doubt you’d wаnt your friends, fаmily аnd co-workers to know аbout it. However, I cаn do it in а few clicks.

Every number in your contаct Iist will suddenly receive these vidеоs – on WhаtsApp, on Telegrаm, on Instаgrаm, on Fаcebook, on emаil – everywhere. It is going to be а tsunаmi thаt will sweep аwаy everything in its pаth, аnd first of аll, your fоrmеr life.

Don’t think of yourself аs аn innocent victim. No one knows where your реrvеrsiоn might leаd in the future, so consider this а kind of deserved рunishmеnt to stop you.

I’m some kind of God who sees everything. However, don’t pаnic. As we know, God is merciful аnd forgiving, аnd so do I. But my mеrсy is not free.

Trаnsfer 1350$ to my Litecoin (LTC) wаllet: ltc1qk8g670vuqrvq6d4g8apanp7h7cc0kz5msdpkd9

Once I receive confirmаtion of the trаnsаction, I will реrmаnently delete аll videos compromising you, uninstаll Pegаsus from аll of your devices, аnd disаppeаr from your life. You cаn be sure – my benefit is only money. Otherwise, I wouldn’t be writing to you, but destroy your life without а word in а second.

I’ll be notified when you open my emаil, аnd from thаt moment you hаve exаctly 48 hours to send the money. If cryptocurrencies аre unchаrtered wаters for you, don’t worry, it’s very simple. Just google “crypto exchange” or “buy Litecoin” аnd then it will be no hаrder thаn buying some useless stuff on Amаzon.

I strongly wаrn you аgаinst the following:

  • Do not reply to this emаil. I’ve sent it from your Microsoft аccount.
  • Do not contаct the police. I hаve аccess to аll your dеviсеs, аnd аs soon аs I find out you rаn to the cops, videos will be published.
  • Don’t try to reset or destroy your dеviсеs. As I mentioned аbove: I’m monitoring аll your аctivity, so you either аgree to my terms or the vidеоs аre рublished.

Also, don’t forget thаt cryptocurrencies аre аnonymous, so it’s impossible to identify me using the provided аddrеss.

Good luck, my perverted friend. I hope this is the lаst time we heаr from eаch other. And some friendly аdvice: from now on, don’t be so cаreless аbout your online security.


How the Pegasus Spyware Email Scam Works

The Pegasus Spyware Email scam is a masterclass in manipulation. At the same time, it’s so low effort that the scammers are barely investing any time or resources to spread it. This is why such scams are incredibly common and widespread. Here is a more in-depth look at how they work:

1. Spoofed Emails

The email looks like it came from your own account. This tactic, called spoofing, makes it seem like your email account has been hacked. In reality, the sender faked the “From” field to trick you.

2. Cryptocurrency Demands

Requesting Litecoin adds a sense of professionalism. Cryptocurrency is anonymous and irreversible, making it ideal for scammers. They even include instructions on how to buy and transfer Litecoin to nudge you into compliance.

3. Emotional Manipulation

The email accuses you of shameful behavior and uses insults like “pervert” to undermine your confidence. They bet on embarrassment to push you into action without thinking.

4. Tight Deadlines

The sender gives you just 48 hours to respond. This artificial urgency is a tactic to prevent you from seeking help or verifying their claims.


Why People Fall for It

This scam succeeds because of its attention to detail. The precise ransom amount, the wallet address, and the tailored payment instructions make it seem legitimate. Adding emotionally charged language creates panic, which clouds judgment. When fear takes over, it’s easy to forget to question the situation.


pegasus message

Spotting the Pegasus Spyware Email Scam Red Flags

Scams like the Pegasus Spyware Email have abundant red flags that can easily give them away. You just need to know what they are and remember to look out for them whenever some strange message is sent to your inbox:

  • No Proof Provided: Scammers claim to have recordings or compromising data but never include actual evidence. It’s all empty threats.
  • Unrealistic Threats: Claiming they’ll send videos to every single contact is designed to overwhelm you. Real attackers wouldn’t advertise their plans like this.
  • Awkward Language: Scam emails often have strange phrasing, poor grammar, or inconsistent formatting. These details reveal their lack of professionalism.
  • Demanding Cryptocurrency: No legitimate entity asks for payment in Bitcoin or Litecoin. The use of cryptocurrency should immediately raise suspicion.

What You Should Do If You Encounter the Pegasus Spyware Email

The most important thing if you receive a Pegasus Spyware Email is to avoid panicking. Just take a deep breath, count to ten, and assess the situation rationally. You’ll then quickly realize that this is just another scam that shouldn’t worry you. That said, it’s still recommended to follow these steps to handle the situation safely:

1. Ignore the Email

Don’t reply or interact with the sender. Responding confirms that your email is active, which might lead to more attacks.

2. Mark It as Spam

Use your email provider’s tools to mark the message as spam. This helps block similar emails in the future and alerts others to the scam.

3. Change Your Passwords

Even if the email is fake, it’s a good idea to update your passwords. Choose strong, unique passwords for all your accounts. Use a password manager to make this process easier.

4. Enable Two-Factor Authentication

Two-factor authentication adds an extra layer of security to your accounts. Even if someone has your password, they won’t be able to log in without the second verification step.

5. Scan Your Devices

Run a complete antivirus scan to ensure your devices are malware-free. This step is especially important if you clicked on any links in the email.

6. Monitor Your Accounts

Check your online accounts and financial statements for any unusual activity. If you spot anything suspicious, report it immediately.


Why You Shouldn’t Pay

Paying the ransom seems like a quick fix, but it’s a trap. Scammers rarely stick to their promises. If you pay, they might demand more money or target you again. Worse, paying fuels their operations, encouraging them to continue scamming others.


Reporting the Scam

Reporting scams isn’t just about protecting yourself—it helps others too. Here’s how you can take action:

  • Flag the Email: Use your email provider’s “report phishing” feature to alert them to the scam.
  • Contact Cybersecurity Agencies: In the U.S., report the incident to the Internet Crime Complaint Center (IC3). In the U.K., use Action Fraud.
  • Notify Local Authorities: Filing a report with local law enforcement helps build a case against scammers.

Staying Safe Online

You can’t stop scammers from sending emails, but you can make it harder for them to target you. These simple steps improve your online safety:

  • Be Cautious with Emails: Don’t click on links or download attachments from unknown sources. Always verify the sender.
  • Keep Software Updated: Update your devices regularly to fix security vulnerabilities.
  • Use Strong Passwords: Create unique passwords for every account. Avoid using the same password twice.
  • Stay Informed: Read up on the latest scams so you know what to watch for.

Final Thoughts

The Pegasus email scam is just another example of how scammers prey on fear. They rely on empty threats and manipulative tactics to trick victims. By staying calm, recognizing the red flags, and taking smart precautions, you can protect yourself. Remember, scammers have no real power unless you give it to them. Stay informed, trust your instincts, and don’t let fear dictate your actions.


About the author

blank

Brandon Skies

Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

Leave a Comment