Some of our readers reported an email written in Hungarian that they have received, with the following message:
Olá! Tenho más notícias para si. Há dois meses atrás, recebi acesso a todos os dispositivos eletrónicos que utiliza para navegar na internet. Após esse momento comecei a rastrear toda a sua atividade na internet. Recentemente, percebi que é um grande fã de porno e que gosta de assistir a “filmes XXX”. Penso que percebe o que quero dizer com isto. Consegui editar alguns vídeos onde se masturba e incluí os filmes a que estava a assistir enquanto o fazia. Pode estar certo de que posso enviar facilmente este vídeo interessante para todos os seus contactos, amigos, familiares ou simplesmente publicá-lo na internet com apenas um clique do rato. Penso que não gostaria que tal acontecesse. Será verdadeiramente vergonhoso e trágico para si. Bem, não quero pô-lo numa situação como essa, dado que vejo que é uma pessoa honesta e decente. Como tal, faço-lhe uma proposta: Transfere o equivalente a 850$ USD em Bitcoin para mim e assim que o pagamento for recebido, irei imediatamente remover todas as provas que tenho contra si. Tenho estado a trabalhar no que faz e nos seus ficheiros há dois meses e acredite, isto foi pura diversão para mim! Se não sabe como comprar e enviar Bitcoins, então pode simplesmente utilizar qualquer motor de pesquisa (Google é suficiente) para obter ajuda. Portanto, aqui está a minha carteira Bitcoin:1HzAhrYkdioFXbLLkmbNThhnDgBqnrHhJh. Dou-lhe 48 horas para me enviar dinheiro. Por favor, não responda a este e-mail, visto que não faz qualquer sentido.
There are many different kinds of Trojan Horse viruses – some target your system data, some try to spy on you, some seek to steal sensitive info from your computer and online accounts and some might even be used to silently download other harmful programs the likes of Ransomware and Rootkits on the infected computer. Here, however, we will be focusing on a specific type of e-mail Trojans that are used in phishing e-mail campaigns, which have recently become quite widespread and currently there are a lot of users who have fallen victims to these threats. One example of such a phishing e-mail Trojan Horse virus is 1HzAhrYkdioFXbLLkmbNThhnDgBqnrHhJh, which will be the main topic of this article. If you have recently noticed some obscure e-mails in your inbox that claim you need to pay a certain amount of BitCoins or something bad would happen, then you likely have 1HzAhrYkdioFXbLLkmbNThhnDgBqnrHhJh, “Drive by exploit” or “Save Yourself” inside your computer. In order to increase the chances of the scam being successful and make their e-mails be more threatening, the criminals behind this scheme usually claim that your PC has been hacked and that if you do not pay, something bad will happen to the machine. In their e-mails, the scammers might claim that some sensitive information about the user has been acquired by them and that it would be made publicly available online in order to scare the user into paying. This is somewhat similar to the way Ransomware cryptoviruses try to intimidate users into sending money to the hackers by claiming that the user’s files would stay locked if the money isn’t paid. However, the difference here is that the scammers are only bluffing and they don’t actually have any actual leverage over you.
Some more words about 1HzAhrYkdioFXbLLkmbNThhnDgBqnrHhJh
The problem with having this Trojan which might potentially be inside your computer isn’t solely related to the phishing e-mails you are likely to receive if the infection has reached you. A more experienced and discerning user would easily spot the scam and ignore and delete the phishing letter. However, since the Trojan is still in the PC and because this type of malware is actually highly versatile, the malicious program might still be used to carry out some other insidious and harmful task inside the targeted machine. We already mentioned some of the common uses of a typical Trojan Horse virus at the start of this article. Note that some Trojans could get remotely repurposed to do something different from their initial task after they have already attacked a certain computer. This means that even if you do not fall for the e-mail scam, your PC and your virtual security and privacy are still not going to be safe if the malware doesn’t get removed. The sooner you ensure that all malicious data has been removed from your computer, the less time the malware would have to do some other nasty thing to your computer. Therefore, we advise you to act quickly and use the guide from this page and/or the removal tool attached to it and get rid of 1HzAhrYkdioFXbLLkmbNThhnDgBqnrHhJh ASAP!
Remove 1HzAhrYkdioFXbLLkmbNThhnDgBqnrHhJh Bitcoin Email Virus
You are dealing with a malware infection that can restore itself unless you remove its core files. We are sending you to another page with a removal guide that gets regularly updated. It covers in-depth instructions on how to:
1. Locate and scan malicious processes in your task manager.
2. Identify in your Control panel any programs installed with the malware, and how to remove them. Search Marquis is a high-profile hijacker that gets installed with a lot of malware.
3. How to clean up and reset your browser to its original settings without the malware returning. You can find the removal guide here.