Remove David Ghost Email Blackmail Scam

How irritating is this problem? (5 votes, average: 5.00)


This page aims to help you remove David Ghost Email Blackmail Scam. Our removal instructions work for every version of Windows.

David Ghost Email is a brand new addition to the Trojan Horse bitcoin email malware category and if you are reading this, then you most probably are in need of some instructions on how to deal with it. This is an email scam almost identical to other examples like 1DZNohaDckSxJu6YxfeGkqCtxDAhtFP3Jq . Please note that this is not a real issue (a trojan virus per se) but may be indicative of malware problems inside your system.And you are definitely right to seek assistance with the removal of this malware because David Ghost Email is a very malicious computer program that can perform numerous harmful activities inside your PC. Hackers with malicious intentions have created this threat with the idea to use it for various criminal deeds and that’s why you have to remove it immediately in order to prevent it from executing its criminal agenda and damaging your system fatally. Unfortunately, the most challenging task is to detect David Ghost Email because, as every Trojan, this one hardly shows any visible symptoms of its presence and tries to remain hidden for as long as possible. It takes more than just being observant to correctly identify it, and, in most of the cases, you may need professional removal software in order to do that. Alternatively, you may use a removal instructions, such as the ones below, which can guide you through the process of finding the Trojan and help you manually delete the harmful code from your OS. Before doing so, however, make sure you are well acquainted with the danger that you are about to face.

David Ghost Malware

David Ghost Emails Used for the sextortion scam

The specifics of Trojans like David Ghost Email

Trojans are very versatile pieces of malware. This means that the criminals can use them in a number of ways to cause harm to you and your PC. David Ghost Email, in particular, is a specific Trojan Horse version which can sneak inside your system silently and launch a bunch of harmful processes in the background without your knowledge. The infection is quite nasty and, as per the latest reports, it looks that it has managed to infect quite a number of web users and cause different issues to their computers. Some of the most common problems which may follow from the potential attack of this infection may include theft of personal information and sensitive details, system corruption, data destruction, unauthorized access in the computer, espionage and more. An extremely malicious ability of the infections from the Trojan type is that they can serve as a backdoors for other nasty viruses and malware. More often than not, such threats can introduce Ransomware or Spyware inside the computer and provide cover for it until it completes its malicious agenda. Unfortunately, it’s terribly difficult to predict what precisely David Ghost Email may do inside your PC because each and every Trojan may have a different tasked and may even get reprogrammed to do something else once its initial goal gets completed.

One thing is sure, the longer the infection remains on the system, the greater the damage it may cause. That’s why, in the removal guide below, we have provided instructions on how to safely and effectively detect the harmful files related to David Ghost Email, and remove them. There is also a professional removal tool for automatic assistance for those of you who are not very confident in their ability to handle the Trojan manually.

An example of a David Ghost Email Blackmail:

Same as others have reported. Claims to have a video of me masturbating. He claims to know my password but the one he showcases was never used by me, wth?! part of the message: —————— Hey! I know your pass is: *********** I infected you with my private malware, (RAT) / (Remote Administration Tool), a few months back when you visited some website where my iframe was placed and since then, I have been observing your actions. The malware gave me full access and control over your system, meaning, I can see everything on your screen, turn on your camera or microphone and you won’t even notice about it. I have also access to all your contacts, private pictures, videos, everything! I MADE A VIDEO showing you (through your webcam) STATISFYING YOURSELF! You got a very good taste! Hahaha… I can send this video to all your contacts (email, social network) and publish all your private data everywhere! Only you can prevent me from doing this!


Name David Ghost Email
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  Trojans rarely show visible symptoms and hardly can be detected without a professional security tool.
Distribution Method  Software bundles, torrents, fake ads, infected links, malicious emails and attachments, pirated materials.
Detection Tool

Remove David Ghost Email Blackmail Scam

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


Hold together the Start Key and R. Type appwiz.cpl –> OK.


You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



Type msconfig in the search field and hit enter. A window will pop-up:


Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.


Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

Leave a Comment