What is “Hacker Who Has Access To Your Operating System” spam

The Hacker Who Has Access To Your Operating System email scam is a type of deceptive communication that can be classified as “sextortion”. Cybercriminals send out a large volume of these emails, claiming that they have gained control over the recipient’s computer and recorded a compromising video. However, it is crucial to recognize that this is nothing more than a scam, and these emails should be disregarded. In this email scam, the message alleges that the recipient’s computer has been infected with a trojan while supposedly visiting an adult website. The criminals further claim that they have utilized the computer’s webcam and microphone to record a video of the recipient engaged in explicit activities, as well as stolen their contact information. Following these assertions, the scammers issue a threat and demand a ransom. They threaten to send the recorded video, along with an alleged video that the recipient had watched, to all of their contacts unless a payment of $500 is made. The recipients are given a deadline of 50 hours to pay the ransom, and they are instructed to use Bitcoin cryptocurrency for the transaction.

Possible harm from spam campaigns, like “Hacker Who Has Access To Your Operating System”

Spam campaigns like the “Hacker Who Has Access To Your Operating System” can be dangerous for several reasons:

  • Psychological Manipulation: These spam campaigns often employ fear and intimidation tactics to manipulate recipients into believing that their personal information or embarrassing activities have been compromised. The goal is to create a sense of urgency and fear, pushing individuals to act hastily without thinking critically.
  • Financial Loss: The scammers behind these campaigns typically demand a ransom to prevent the release of the alleged compromising materials. If victims succumb to the pressure and pay the ransom, they not only lose their money but also perpetuate the profitability of these criminal activities.
  • Identity Theft: In some cases, these spam campaigns may request personal information or login credentials under the guise of verifying identities or protecting against further exposure. Providing such sensitive data can lead to identity theft, which can have serious long-term consequences for individuals, including financial loss and damage to their reputation.
  • Malware Infections: Although the email itself may be a scam, it’s important to be cautious of any attachments or links contained within the message. Clicking on malicious links or downloading attachments can result in malware infections, which can compromise the security of your computer, steal personal information, or grant unauthorized access to your system.

Examples of spam e-mail letters in differen languages:

EnglishSpanishFrenchPortugueseItalianRussianPolish
Subject: Security Alert. Your accounts were hacked by a criminal group.
Hello!
I am a hacker who has access to your operating system.
I also have full access to your account.
I've been watching you for a few months now.
The fact is that you were infected with malware through an adult site that you visited.
If you are not familiar with this, I will explain.
Trojan Virus gives me full access and control over a computer or other device.
This means that I can see everything on your screen, turn on the camera and microphone, but you do not know about it.
I also have access to all your contacts and all your correspondence.
Why your antivirus did not detect malware?
Answer: My malware uses the driver, I update its signatures every 4 hours so that your antivirus is silent.
I made a video showing how you satisfy yourself in the left half of the screen, and in the right half you see the video that you watched.
With one click of the mouse, I can send this video to all your emails and contacts on social networks.
I can also post access to all your e-mail correspondence and messengers that you use.
If you want to prevent this,
transfer the amount of $500 to my bitcoin address (if you do not know how to do this, write to Google: "Buy Bitcoin").
My bitcoin address (BTC Wallet) is: 3AvVjgoYfrtbbG2repDCdcLLMcjJ73jLqm, 395wdUpmkEG6iPdCguKCqYJR5UkpdWm5Wk, 3HnDpvc9mXTcmAePPCaU3q82egxP8p5P6G, 3JgjbyQJcymqApzph5EWDQdH8cNphXFZKu, 3NmUUGnYGkMn2hAi9L8sd5J4okWjq3mZNe, 1ELKdWgfedTJ9FV4U5W2JVXFzTpKSqcCjM, 3HxqrQmEffcMZo5cgNqRXwD3dw5LCYSx7K, 1ANFoTP6ETjBfL6o3ZhJm1jag1x1KAbAxZ, 37yLxF7mM7h3KiDvqWh88wm1VjFvemDYpf, 358MfWU8MctxPJhFBiNpsdGtxDtHixTi8r, 3AVitbSbsDWRyda9JNs8avrjhq2ZN7uCMy, 15Q5a6gHDaAtqFE3uEhfAhY8PqJiaw94vT, 3FL1txfM4knPnySJHiXAsK91cnmEXHGemv, 1CMBC1Mj86GHmbwzcMMP8xUe1hQTwk4Ds7, 1Ji2K8EVzxDRnpuXts1kKAjMwTrV2LTnRS, 3QikbxiTy7cWH7ZGZbLQYANxZA2MZHmmDs, 3JPdsEkcxv715Th7hN7fgoUYds22xBaPno, 1Niyhcqd8MNT8tpRs8gK6Ho3V8fJy2wbF, 1FErgudo2nCpuu9XSLJkSiqQBy62N1weiy, 1NvwQchudHai3KcqDkwTGgNzHK9YrWHzV6, 1AfwxZ8nYzwEzME39PuqVZU7Mn73XxQTqq, 17nhAbZGm4UmSVj5Zx8amwAbjVXcxGtEAz, 1ipEif9Roe3DjboppZ99mswU6r7Y1puUi, 1Dg5UsxMEG41TC3i9ugxcFV6cVtz8cpfXE, 1DpfAYoWGpTprX3cRg6mnUuYqNm3eXiR4F, 1BcpAGfamAy81enJtHahKedaWx1yATTXT7, 1KUknkh9bC4TPUoPXv4SnKdib8RAnUXDGw, 1G3UXmDBoeRvU3D2tGmGGU7fpCAEY1dBQV, 18Jro9LNFqBQarcc63WYGf3w7PdDAiwXpk, 13WVfQkbqdsSUNBDPDWTLqSXeaYX1tZ6UD, 1MS638iFfpruXbiLA43GVuoPEBLpKQDTjd, 1EUj48o3UnZvCjZEvYX9CHYbuL7rkhnB8s
After receiving the payment, I will delete the video and you will never hear me again.
I give you 50 hours (more than 2 days) to pay.
I have a notice reading this letter, and the timer will work when you see this letter.
Filing a complaint somewhere does not make sense because this email cannot be tracked like my bitcoin address.
I do not make any mistakes.
If I find that you have shared this message with someone else, the video will be immediately distributed.
Best regards!
Subject: Tu dispositivo fue hackeado por hackers. ¡Lee el manual ahora!
Hola.
Soy el programador que hackeó el 0C de su dispositivo.
Te he estado observando durante meses.
El asunto es que fuiste infectado con P0 malicioso a través del sitio para adultos que visitaste.
Si no lo conoces, te lo explicaré.
El virus troyano me da acceso y control total sobre un ordenador o cualquier otro dispositivo.
Esto significa que puedo ver todo en su pantalla, encender mi cámara y el micrófono, pero usted no es consciente de esto.
También tengo acceso a todos sus contactos, datos de redes sociales y toda su correspondencia.
Como puedes ver, te envié un correo electrónico desde tu propio buzón (tengo acceso total a tu sistema).
¿Por qué su antivirus no detectó ningún malware? 0tte: Mi malware utiliza un controlador, actualizo su firma cada 4 horas para mantener su antivirus en silencio.
Hice un video que muestra cómo te satisfaces a ti mismo en el lado izquierdo de la pantalla, y en el lado derecho ves el video que estabas viendo.
Con un solo clic, puedo enviar este video a todos tus contactos en el correo y las redes sociales.
También puedo publicar el acceso a todos tus correos y mensajeros que uses.
Si quieres prevenir esto, entonces:
Transfiere 1000 dólares a mi cartera de bitcoin (si no sabes cómo hacerlo, escribe a Google: "Comprar bitcoin").
Mi billetera de monedas de bits (BTC Wallet): 16ycKePyftmgJggJibv4E2L7ecZLaJw1pK
Después de recibir el pago, borraré el video y no volverás a saber de mí.
Le daré 50 horas (más de dos días) para pagar.
Tengo un aviso para leer este correo electrónico y el temporizador funcionará cuando vea este correo electrónico.
No intente responderme. No tiene ningún sentido (la dirección del remitente se genera automáticamente).
Presentar una queja en algún lugar no tiene sentido, porque este correo electrónico no puede ser rastreado, y tampoco mi dirección bitcoin.
No cometo errores.
Si descubro que compartiste este mensaje con alguien más, el video será distribuido inmediatamente.
¡Mis mejores deseos!
Subject: MESSAGE URGENT: RÉPONSE MAINTENANT
salut!
Je suis un hacker qui a accès à votre système d'exploitation.
J'ai également un accès complet à votre compte.
Je vous surveille depuis quelques mois maintenant.
Le fait est que vous avez été infecté par un logiciel malveillant via un site pour adultes que vous avez visité.
Si vous n'êtes pas familier avec cela, je vais vous expliquer.
Trojan Virus me donne un accès et un contrôle complets sur un ordinateur ou un autre appareil.
Cela signifie que je peux tout voir sur votre écran, allumer l'appareil photo et le microphone, mais vous ne le savez pas.
J'ai également accès à tous vos contacts et à toute votre correspondance.
Pourquoi votre antivirus n'a pas détecté de malware?
Réponse: Mon malware utilise le pilote, je mets à jour ses signatures toutes les 4 heures pour que votre antivirus soit silencieux.
J'ai fait une vidéo montrant comment vous vous contentez dans la moitié gauche de l'écran, et dans la moitié droite vous voyez la vidéo que vous avez regardée.
En un clic de souris, je peux envoyer cette vidéo à tous vos emails et contacts sur les réseaux sociaux.
Je peux également publier l'accès à tous vos courriers électroniques et messagers que vous utilisez.
Mais ne vous inquiétez pas trop, nous pouvons résoudre ce problème de confidentialité. Tout ce dont nous avons besoin, c'est d'un paiement Bitcoin de £3,960.00 GBP, ce qui, à mon avis, est un juste prix compte tenu des circonstances.
L'adresse Bitcoin pour effectuer le paiement est: 17MjmyNpSeyUfC88wYtHduMLgZ4Yy34A8A
REMARQUE: N'OUBLIEZ PAS DE RECONFIRMER L'ADRESSE BITCOIN AVEC NOUS AVANT DE FAIRE LE PAIEMENT POUR ÉVITER DE FAIRE LE PAIEMENT DEUX FOIS.
Si vous ne comprenez pas le bitcoin, allez sur YouTube et recherchez «comment acheter du bitcoin» ou google pour des «bitcoins locaux», c'est assez facile à faire.
Après avoir reçu le paiement, je supprimerai la vidéo et vous n'entendrez plus jamais parler de nous.
Je vous donne 48 heures pour payer. J'ai un avis de lecture de cette lettre, et la minuterie fonctionnera lorsque vous verrez cette lettre.
Déposer une plainte quelque part n'a pas de sens car cet e-mail ne peut pas être suivi comme mon adresse bitcoin.
Je ne fais aucune erreur.
Si je trouve que vous avez partagé ce message avec quelqu'un d'autre, la vidéo sera immédiatement distribuée.
Répondez uniquement pour reconfirmer l'adresse Bitcoin pour le paiement ou vous avez des questions sur le paiement, puis cliquez sur répondre. N'essayez pas de me contacter car j'utilise un e-mail de victime piraté et exposé.
Subject: De acordo com nosso serviço de segurança, sua conta foi invadida. Mude sua senha imediatamente.
Olá!
Eu sou um hacker que tem acesso ao seu sistema operacional.
Eu também tenho acesso total à sua conta.
Estou observando você há alguns meses agora.
O fato é que você foi infectado por malware através de um site adulto que você visitou.
Se você não está familiarizado com isso, vou explicar.
O Trojan Virus me dá acesso total e controle sobre um computador ou outro dispositivo.
Isso significa que eu posso ver tudo em sua tela, ligue a câmera e microfone, mas você não sabe sobre isso.
Eu também tenho acesso a todos os seus contatos e toda a sua correspondência.
Por que seu antivírus não detectou malware?
Responda: Meu malware usa o driver, eu atualizo suas assinaturas a cada 4 horas para que seu antivírus seja silencioso.
Eu fiz um vídeo mostrando como você se masturba na metade esquerda da tela, e na metade direita você vê o vídeo que estava assistindo.
Com um clique do mouse, posso enviar este vídeo para todos os seus e-mails e contatos em redes sociais.
Eu também posso postar acesso a toda a sua correspondência de e-mail e mensageiros que você usa.
Se você quiser evitar isso,
transferir o montante de $650 para o meu endereço bitcoin (se você não sabe como fazer isso, escreva para o Google: "Buy Bitcoin").
O meu endereço bitcoin (carteira BTC) é: 1993DD32oRbnfqJjUVm2xvkdw1g28bBjnz
Depois de receber o pagamento, eu vou apagar o vídeo e você nunca mais vai me ouvir novamente.
Dou-lhe 50 horas (mais de 2 dias) para pagar.
Eu tenho um aviso lendo esta carta, e o temporizador vai funcionar quando você vir esta carta.
Arquivar uma reclamação em algum lugar não faz sentido porque este e-mail não pode ser rastreado como meu endereço bitcoin.
Eu não cometo nenhum erro.
Se eu descobrir que você compartilhou esta mensagem com outra pessoa, o vídeo será imediatamente distribuído.
Com os melhores cumprimentos!
Subject: Alto livello di rischio. Il tuo account è stato violato. Cambia la tua password.
Ciao!
Sono un hacker che ha accesso al tuo sistema operativo.
Ho anche pieno accesso al tuo account.
Ciò significa che ho pieno accesso al tuo dispositivo!
Ti sto guardando da alcuni mesi.
Il fatto è che sei stato infettato da malware attraverso un sito per adulti che hai visitato.
Se non hai familiarità con questo, ti spiegherò.
Virus Trojan mi dà pieno accesso e controllo su un computer o altro dispositivo.
Ciò significa che posso vedere tutto sullo schermo, accendere la videocamera e il microfono, ma non ne sai nulla.
Ho anche accesso a tutti i tuoi contatti e tutta la tua corrispondenza.
Perché il tuo antivirus non ha rilevato il malware?
Risposta: il mio malware utilizza il driver, aggiorno le sue firme ogni 4 ore in modo che Il tuo antivirus era silenzioso.
Ho fatto un video che mostra come ti accontenti nella metà sinistra dello schermo, e nella metà destra vedi il video che hai guardato.
Con un clic del mouse, posso inviare questo video a tutte le tue e-mail e contatti sui social network.
Posso anche postare l'accesso a tutta la corrispondenza e ai messaggi di posta elettronica che usi.
Se vuoi impedirlo, trasferisci l'importo di 729€ al mio indirizzo bitcoin (se non sai come fare, scrivi a Google: "Compra Bitcoin").
Il mio indirizzo bitcoin (BTC Wallet) è: 19pVBQWzH6HBC6WazvsoYujwAFsNEZQJro
Dopo aver ricevuto il pagamento, eliminerò il video e non mi sentirai mai più.
Ti do 48 ore per pagare.
Non appena apri questa lettera, il timer funzionerà e riceverò una notifica.
Presentare un reclamo da qualche parte non ha senso perché questa email non può essere tracciata come e il mio indirizzo bitcoin.
Non commetto errori!
Se scopro di aver condiviso questo messaggio con qualcun altro, il video verrà immediatamente distribuito.
Auguri!
Subject: Срочное обращение службы безопасности. Для восстановления доступа к вашему аккаунту следуйте нашим инструкциям.
3дрaвcтвуйте!
Я прогрaмми́cт, кoторый взломaл 0С вaшeго уcтройcтвa.
Я нaблюдaю зa вaми́ ужe неcколько мecяцев.
Дело в том, что вы были́ зaрaжены вредоноcным П0 черeз caйт для взроcлых, который вы поcети́ли́.
Еcли́ вы не знaкомы c эти́м, я объяcню.
Троянcки́й ви́руc дaет мне полный доcтуп и́ контроль нaд компьютером и́ли́ любым други́м уcтройcтвом.
Это ознaчaет, что я могу ви́деть вcе нa вaшем экрaне, включи́ть кaмеру и́ ми́крoфон, но вы нe знaетe oб этом.
У меня тaкже еcть доcтуп ко вcем вaши́м контaктaм, дaнным по cоци́aльным cетям и́ вcей вaшей пeрепи́cке.
Почему вaш aнти́ви́руc не обнaружи́л вредоноcное ПO?
Ответ: Моя вредоноcнaя прогрaммa и́cпользует дрaйвер, я обновляю его cи́гнaтуры кaждые 4 чaca, чтобы вaш aнти́ви́руc молчaл.
Я cделaл ви́део, покaзывaющее, кaк вы удовлетвoряeте cебя в левой полови́не экрaнa, a в прaвой полoви́не вы ви́ди́те ви́део, которое вы cмотрели́.
одни́м щелчком мыши́ я могу отпрaви́ть это ви́део нa вcе вaши́ контaкты и́з почты и́ cоци́aльных ceтей.
Я тaкже могу oпубли́ковaть доcтуп ко вcей вaшей электронной почте и́ меccенджерaм, которые вы и́cпользуете.
еcли́ вы хoти́те предoтврaти́ть это, тo:
Перeвeди́те 500$(USD) нa мой би́ткoи́н-кошeлек (еcли́ вы не знaете кaк это cделaть, то нaпи́ши́те в Google: "Купи́ть би́ткойн").
Мой би́ткойн-кошелек (BTC Wallet): 13Wz36TzbjskL6VohwCPpCFqRJBps2YpHC, 1P2so3re9QMi1L2nrMdncvYDe4jRYQL2cV
Пocле пoлучени́я оплaты я удaлю ви́деo, и́ вы ни́когдa меня бoльше не уcлыши́те.
Я дaю вaм 50 чacов (более двух дней) для оплaты.
У меня еcть уведомлени́е о прочтени́и́ этого пи́cьмa, и́ тaймер cрaботaет, когдa вы уви́ди́те это пи́cьмо.
Не пытaйтеcь мне отвечaть. Это беccмыcленно (aдреc отпрaви́теля генери́руетcя aвтомaти́чеcки́).
Подaчa жaлобы кудa-ли́бо не и́меет cмыcлa, потому что это пи́cьмо не может быть отcлежено, кaк и́ мой би́ткойн-aдреc.
Я не делaю оши́бок.
Еcли́ я обнaружу, что вы подели́ли́cь эти́м coобщени́eм c кем-то eще, ви́дeо будет нeмедленно рacпроcтрaнeно.
Удачи́!
Uwaga dotycząca bezpieczeństwa. **** został zhakowany!
Pozdrowienia!
Kilka miesięcy temu dostałem dostęp do systemu operacyjnego na twoim urządzeniu.
Patrzyłem na ciebie od miesięcy.
Faktem jest, że zostałeś zainfekowany złośliwym oprogramowaniem podczas odwiedzania witryny dla dorosłych.
Jeśli nie jesteś z tym zaznajomiony, wyjaśnię ci to.
Wirus trojański daje mi pełny dostęp i kontrolę nad komputerem lub innym urządzeniem.
Oznacza to, że widzę wszystko na ekranie, włączam kamerę i mikrofon, ale nie wiesz o tym.
Mam również dostęp do wszystkich Twoich kontaktów.
Dlaczego Twój program antywirusowy nie wykrył złośliwego oprogramowania?
Odpowiedź: Mój trojan ma sterownik i aktualizuję jego sygnatury co cztery godziny. Dlatego twój program antywirusowy milczy.
Zrobiłem film wideo pokazujący, jak grasz ze sobą w lewej połowie ekranu, a w prawej połowie widzisz film, który oglądałeś.
Za pomocą jednego kliknięcia mogę wysłać ten film wideo do wszystkich Twoich e-maili i kontaktów w sieciach społecznościowych.
Aby temu zapobiec, przenieś 500€ na mój adres adres Bitcoin (jeśli nie wiesz jak to zrobić, napisz do Google: "Kup Bitcoin").
Adres Bitcoin: 1J4XkC8gRdNQE7MQQpWPwnvYwH1c6hdQit, bc1qwqf09f5whud09mka83ea59yrpzm20dpcwc780e, 1DdxARZgnbVvUcwFF125cM5usubeLCZnit
Po otrzymaniu płatności usunę wideo i nigdy mnie nie usłyszysz.
Dam ci dwa dni (48 godzin) na zapłatę.
Gdy zobaczysz ten e-mail, otrzymam
zawiadomienie. Czasomierz rozpoczyna się zaraz po tym.
Składanie skarg gdzieś nie ma sensu, ponieważ ten e-mail nie może być śledzony jako mój i adres Bitcoin.
Nie popełniam żadnych błędów.
Jeśli dowiem się, że udostępniłeś tę wiadomość innej osobie lub organizacji, film zostanie natychmiast rozprowadzony!
Nie próbuj się ze mną kontaktować (nie jest to możliwe, adres nadawcy jest generowany automatycznie).
Cześć!
  1. Download Anti-Spam and Anti-Malware Tools
  2. Mark unwanted e-mail messages as Spam
  3. Delete Spam letters
  4. Unsubscribe from e-mail campaigns
  5. Change your e-mail address and forward it
  6. Final tips

1. Download Anti-Spam Tool

There are special programs designed to protect yourself against various threats arriving at e-mail. Third-party software providing advanced anti-spam algorithms and filtering tools will be good and more reliable protection in addition to the standard capabilities of many e-mail services. One of the world leaders in anti-spam protection is MailWasher Pro. It works with various desktop applications and provides a very high level of anti-spam protection and can stop “Hacker Who Has Access To Your Operating System” e-mail scam.

Download MailWasher Pro

2. Download Anti-Malware Tool

To make sure there are no malware already installed on your PC you should check it with advanced antimalware. Even if you have standard anti-virus protection, scan with quality anti-malware can be helpful as it has different database and algorithms designed to find and remove viruses and bloatware wide-spread among regular users. We recommend Malwarebytes Anti-Malware:

Download Malwarebytes

1. Mark e-mail as Spam

If an e-mail message has not been put to the “spam” or “junk” folder itself, then users can do it themselves in just a couple of steps. Marking e-mail as spam will let your e-mail service know how to treat the unwanted sender next time. All further messages received from the spam-marked address will be located in the appropriate folder already without your help. Here is how:

Gmail:

  1. Open your Gmail and find a message you want to classify as “spam”.
  2. Select this message by clicking on the square box next to it.
  3. Then, click on the stop sign icon (the one with an exclamation mark) on top.

Yahoo! Mail:

  1. Open your Yahoo! Mail and find a message you want to classify as “spam”.
  2. Select this message by clicking on the square box next to it.
  3. Then, click on the Spam icon on top.

Microsoft Outlook:

  1. Open your Microsoft Outlook and find a message you want to classify as “spam”.
  2. Select this message by clicking on the square box next to it.
  3. Then, click on Junk and Block afterward.

Apple Mail:

  1. Open your Apple Mail and find a message you want to classify as “spam”.
  2. Click on it and choose the Junk Mail (trash can with “X”) icon.

2. Delete Spam letters

You can also clear your “spam” or “junk” folder from all the collected such letters. It is always good to maintain your e-mail clean and without trash that clutters even your spam folders. This is how you can wipe it:

Gmail:

  1. Open your Gmail and go to Spam on sidebar.
  2. If you want to wipe all the spam letters at once, click Delete All Spam Messages Now.
  3. If you want to do it selectively, click on the message you need and choose Delete forever.

Yahoo! Mail:

  1. Open your Yahoo! Mail and navigate to Spam on the sidebar.
  2. Choose e-mails you want to remove and click Delete on top.

Microsoft Outlook:

  1. Open your Microsoft Outlook and navigate to Junk Email on the sidebar.
  2. Then, click on Empty folder to clear all spam messages.

Apple Mail:

  1. Open your Apple Mail and navigate to Spam on the sidebar.
  2. Choose e-mails you want to remove and click the Trash can icon on top.

3. Unsubscribe from e-mail campaigns

Many websites offer users to enter their e-mail address in exchange for exclusive content notifications, and tons of other marketing stuff. Over some time, regular users can subscribe to multiple resources that bombard your inbox and spam folder with continuous messages. This can be stopped by unsubscribing to them. Many messages, if opened, have a small gray hyperlink or button “Unsubscribe”. Clicking on it should unsubscribe you from letters you have been receiving for some time. Note that some intentionally malicious letters may use fake “Unsubscribe” buttons to deceive users into downloading malware or visiting suspicious pages. Therefore, remember to always stay on alert!

You can also do the following to unsubscribe to multiple newsletters in Gmail at once:

  1. Open your Gmail and type Unsubscribe into the search box on top.
  2. Then, click on the Show search options icon on the right end of the search box.
  3. Click on Create filter and select checkboxes next to Delete it and Apply filter to matching conversations.
  4. After selecting, finish by clicking on Create filter.

This will lead to all previously subscribed messages evaporating from your flood list in seconds. No more letters of such will appear in your Inbox or other folders again.

4. Change your e-mail address and forward it

It is sometimes hard to get rid of all spam in case of an e-mail breach. Receiving unreasonably high numbers of spam could mean your e-mail was leaked to large masses of spamming campaigns grateful to use it. Victims of this can quite easily avoid it by creating a new e-mail address and forwarding incoming e-mails from their old address. Don’t worry, this will not redirect abnormal streams of spam to this new address, but only normal messages you received on your behalf. It is also worth notifying people you had close contact with that you changed your e-mail address, so they do not get scared after receiving a message from an unknown address.

  1. First, you should begin with creating a new account for the e-mail service you use (Gmail, Yahoo, Outlook, or Apple Mail).
  2. Then, log back into your old account, go to Settings and Add a forwarding address. In Gmail, these settings can be found in the Forwarding POP/IMAP tab. Something similar should be in other services as well.
  3. Enter the newly created e-mail address and click Next > Proceed > OK.
  4. You will then receive a verification message in that newly created address. Make sure you click on it.

If you also want to forward a copy of already existing e-mails, do the following:

  1. Go back to the settings page for the Gmail account you want to forward messages from, and refresh your browser.
  2. Navigate to Forwarding and POP/IMAP and select Forward a copy of incoming mail to.
  3. Choose what you want to happen with the Gmail copy of your emails. It is recommended to choose Keep Gmail’s copy in the Inbox. Click Save changes at the end.

All done and dusted! Now, all new messages tied to the previous e-mail will be sent to your new address.

Final tips

There is always a good practice to have personal and business e-mail accounts separately. If you are active on forums, Q&A sites, participate in link building you will probably need another account for that. Major e-mail services and applications like Gmail, Yahoo! Mail, Apple Mail and Outlook already have strong built-in anti-spam technologies, however, we recommend special software like MailWasher Pro to fight spam campaigns like “Hacker Who Has Access To Your Operating System”.

Previous articleHow to remove Gatq Ransomware and decrypt .gatq files
Next articleHow to remove Bestsearch.live
James Kramer
Hello, I'm James. My website Bugsfighter.com, a culmination of a decade's journey in the realms of computer troubleshooting, software testing, and development. My mission here is to offer you comprehensive, yet user-friendly guides across a spectrum of topics in this niche. Should you encounter any challenges with the software or the methodologies I endorse, please know that I am readily accessible for assistance. For any inquiries or further communication, feel free to reach out through the 'Contacts' page. Your journey towards seamless computing starts here