The Pulse On Cyber

"Hello Pervert": Deconstructing the World's Most Terrifying Email Scam

CJ

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 4:23

Send us Fan Mail

Show Notes:

Imagine opening your inbox to find your own password staring back at you in the subject line. The email starts with two chilling words: "Hello, pervert." The sender claims they’ve hacked your webcam, recorded your most private moments, and are prepared to leak the footage to everyone you know unless you pay a Bitcoin ransom. It’s a high-stakes psychological attack that feels incredibly personal—but is it actually real?

In this episode of The Pulse On Cyber, CJ deconstructs the anatomy of the "Sextortion" scam. We peel back the curtain on how scammers use "Combo Lists" from old data breaches and "Email Spoofing" to make it look like the threat is coming from inside your own account.

In this episode, you’ll learn:

  • The Magic Trick: Why seeing your password in a subject line isn't a sign of a live hack.
  • The Technical Reality Check: Why the "split-screen" video claim is almost always a bluff.
  • The Tactical Defense: Five immediate steps to take if you receive one of these emails.
  • Locking the Perimeter: How to use password managers and MFA to make yourself an impossible target.

Don’t let fear be the exploit. Tune in to learn how to spot the bluff and take back control of your digital life.

Support the show

Thanks for tuning in! If today’s episode helped you—whether you’re protecting your family, your personal accounts, or your business—share it with someone who needs it and hit subscribe to stay ahead of the latest cybersecurity threats.

For more practical, easy-to-understand protection tips, visit us anytime at:
https://www.thepulseoncyber.com 🔗 https://www.CJNetworkSystems.com

SPEAKER_00

Imagine it's a Tuesday night, you're clearing out your inbox before bed, and you see a subject line that stops your heart. It's not just a random string of text, it's your own email address staring back at you. Or maybe it's your own password, one you haven't used in years but recognize instantly. In some cases, it's both, a perfect match of your digital identity sitting right there in the subject line. The email starts with two words. Hello, pervert. Suddenly the room feels a little colder. Whether it's just your email, just a password, or a terrifying combination of both, the goal is the same. To make you believe the sender is already inside your life. They claim they've installed a Trojan on your machine. They say they've been watching you through your webcam for months and have a split screen video, one side showing what you were watching, and the other side showing you. They give you 48 hours to pay$1,500 in Bitcoin, or they'll blast that video to every single one of your contacts. Your stomach drops, you look at your laptop camera, you wonder, is this real? Welcome to the Pulse on Cyber, hosted by CJ Network Systems today, we're deconstructing the anatomy of a bluff. Let's breathe for a second. If you've received this email, you aren't alone. This is what we call a sex torsion scam. The hacker will use a subject line designed to trigger an immediate fight or flight response. They'll use something like security alert, your password is compromised. I have recorded you proof inside for your email. Seeing your specific email and password together is terrifying. But here is the reality: it doesn't mean you've been hacked. Think of it like a mail merge. You know when you get a physical letter from a car dealership that has your name and address printed on it? That salesman didn't break into your house. He just bought a mailing list. Scammers do the same thing with combo lists. These are huge files from old data breaches. Think LinkedIn, Adobe, or that old fitness app from 2019. They take your email and your old password and use a script to automatically plug them into these scary emails. But what about when the email says it's from you? That's called spoofing. It's the digital version of a prank caller changing their caller ID to make it look like the call is coming from inside the house. They are standing on your digital porch with a megaphone. They aren't actually in the house. Let's look at the technical claims. They usually say, I recorded you using a split screen interface. Wait a minute. Recording high-definition video from a webcam, syncing it with a screen recording, and then uploading that massive file without you noticing? That takes serious power. Your laptop fans would be spinning like a jet engine. Your internet would crawl. And the biggest red flag? Where is the proof? If I actually had a video that could ruin your life, I wouldn't just tell you I have it. I'd send a screenshot. These scammers never do because the video doesn't exist. They are betting on your guilt and your fear to do the work for them. They use buzzwords like RDP or keylogger just to sound scary. It's all noise. So, what is the tactical move when hello pervert lands in your inbox? Do not panic. Fear is the only way this works. Once you realize it's a mass marketing scam, the power shifts back to you. Audit your access. If you are still using that password anywhere, change it immediately. Get a password manager to handle the heavy lifting. Deploy MFA. Turn on multi-factor authentication, MFA on everything. Make it so that even if they have your password, they still can't get through the front door. Check the leaks. Head over to Have I Been Pond. Search your email, you'll see exactly which old company lost your data. The physical kill switch. Put a$2 sliding webcam cover over your lens. You can't hack a piece of plastic. If you found this episode helpful, do me a favor. Hit that subscribe button for the pulse on cyber on whatever platform you're listening on. And more importantly, share this podcast with a friend, a family member, or a coworker. Most people panic when they see these emails. Your one share could be the reason someone doesn't lose$1,500 to a scammer today. And if your business needs a partner to lock down its perimeter or build a platform that's secure from the ground up, reach out to us at CJ Network Systems. We don't just talk about security, we build it. I'm CJ, stay vigilant, and as always, keep your finger on the pulse.