Debunking email hoaxes and exposing Internet scams since 2003!

Hoax-Slayer Logo Hoax-Slayer Logo

Home    About    New Articles    RSS Feed    Subscriptions    Contact
Bookmark and Share

Issue 112 - March 2011 - Page 15

Mike The Hacker Scam Emails

Issue 112 Start Menu

Previous Article            Next Article

Emails purporting to be from a hacker named Mike claim that he has gained access to the recipient's computer and will pass on personal files to a woman who hired him unless the recipient contacts him to discuss withholding the files.

Brief Analysis
The claim that "Mike" has hacked the recipient's computer is a lie. The message is simply a ruse to trick recipients into sending money in the mistaken believe that "Mike" the hacker has access to their files.

Bookmark and Share
Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 9th February 2011
First published: 9th February 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer

Subject: Re: Notice

Hello. My name is Mike. I'm hacker.

Last week, one woman has contacted me and asked to hack your computer in order to get copies of certain interested her files. For showing your digital photos, text documents, e-mail messages, personal messages from your account in Facebook, she promised to pay me 150 GBP (200 USD).

Yesterday I managed to hack your computer and now I have all copies of your files and messages, in 72 hours I will send this all to my client.

And, perhaps the most important: if, among all those files and messages, there is nothing that could damage your reputation or cause any other unwanted consequences for you - just ignore this email.

Otherwise, I'm sure we can agree on to keep your personal files and messages before I send them to my client. In order to do this, immediately contact me:

Subject: Re: Notice

Hello, My name is Mike.

Last week one woman contacted me. She asked me to hack your computer and to make the copies of the files she might be interested in. 2 days ago, via trojan horse virus, I got an access to the files in your computer.

Thus, at present, I have got the following copies of files from your computer:
- all your digital photos
- all your text documents
- all your text messages
- all your personal messages from the websites, where you have been registered
In 72 hours I will pass them to the above mentioned woman (customer).

And the most important: If you think, that if the files will be passed to my customer and it will cause unwanted consequences, please contact me by e-mail: ,

I am confident, we could come up to the agreement, and these copies won't be passed to my client.

Otherwise, just ignore this letter.

Detailed Analysis
Submissions indicate that versions of the above emails have been widely distributed since early February, 2011. The emails, which claim to be from an individual identified only as "Mike", warn the recipient that his or her computer has been hacked. "Mike" claims that an unnamed woman hired him to hack the recipient's computer and steal personal files. He suggests that, if the recipient does not want the stolen files to be passed on to the unidentified woman, the recipient should contact him to "come up to the agreement".

However, the claims in the email are outright lies. The email represents nothing more than a transparent ruse to trick panicked recipients into handing over their money to Internet scammers. Those who fall for the ruse and contact "Mike" will be asked to send money in order to stop him from sending the personal files to his "client".

Of course, hackers can and do gain access to people's personal files through various means such as trojan horses or phishing scams. And, so called ransomware attacks have been used by criminals in the past as a means of forcing victims to pay fees or buy products. Typically, ransomware consists of a malicious program that locks a user out of his or her computer until a fee is payed or an unwanted product purchased in exchange for a password that will restore the user's access.

However, the claims in "Mike's" emails can be dismissed as false for the following reasons.
  1. Thousands of people all around the world have received identical versions of the scam emails. All claim that an unnamed woman hired the hacker to access the recipient's files. None include any details about the recipient such as a personalised greeting or a specific reference to the supposed hacking victim's individual circumstances. If "Mike" had really gained access to the user's computer, he would certainly be able to find details specific to his target and include them in the demand email. The generic, non specific nature of the scam emails is a telling indicator that the hacking claims are false.

  2. The scam emails make no effort to specify any individual files that the hacker claims to have accessed. If the supposed attack was genuine, the hacker would most likely include proof such as a screenshot of a stolen file in his initial demand letter.

  3. Repeated replies to "Mike" demanding that he show proof of his supposed attack by naming stolen files or sending a screenshot of one such file have so far gone unanswered. If a hacker had really stolen your files and was intent on being paid to withhold them from his "client", then he would certainly be willing to take the very simple steps necessary to prove that he really had such files.
Thus, the emails are just a rather lame attempt by a grubby little scammer to extort money from unsuspecting Internet users. Those who do comply and contact "Mike" to make an arrangement will be paying for absolutely nothing. If you receive one of these emails, the best course of action is to simply delete it.

This scam attack is quite reminiscent of other - somewhat more sinister - scams in which the scammer claims to be an assassin hired to kill the recipient. These scam emails demand that the recipient pay a specified fee in order to avert his or her pending assassination. As in the above "Mike the hacker" versions, the claims in the hitman scam emails are lies designed to trick users into sending money to Internet criminals.

Bookmark and Share References
Ransomware Holds Your Files Hostage
Hitman Payoff Scam Email

Previous Article            Next Article

Issue 112 Start Menu

Pages in this month's issue:
  1. Money Laundering Scam - Christchurch Earthquake Charity Support Job
  2. False Claim - Viral Video Shows 92 Year Old Ginger Rogers Dancing With Her Great Grandson
  3. Flu Remedy Myth - Onions Absorb Viruses and Bacteria From a Room
  4. False Claim - Onions are Magnets for Bacteria
  5. The Fly in the Urinal - Schiphol Airport Toilet Aim Improvement Technique
  6. Blackberry Award Advance Fee Scam
  7. Overblown Warning - Phone Numbers Now On Facebook
  8. UK Post Office Online Reward Program Phishing Scam
  9. Amber Alert Hoax - Mitsubishi Eclipse With Plate Number 98B351
  10. Hitman Payoff Scam Email
  11. Facebook 'See Who Viewed Your Profile' Scams - Rogue 'Stalker' Apps
  12. Analysis of a Hijacked Account Overpayment Scam - Boat and Trailer For Sale
  13. Tick Removal Advice - Liquid Soap Technique
  14. Does Rubbing Vicks VapourRub on Your Feet Relieve Coughing?
  15. Mike The Hacker Scam Emails
  16. DVLA Update Driver's Licence Phishing Scam
  17. Plea to Help Find Homes for 52 Thoroughbred Horses
  18. Prime Minister Howard - Muslims Out Of Australia
  19. Unsubstantiated Rumours Claim Michelle Obama is Pregnant
  20. AOL 'Billing Update Must be Performed' Phishing Scam
  21. Health Canada Warning - Over The Counter Drug Recall
  22. Do Not Call - Mobile Phones Going Public Hoax
  23. Facebook Grant Award Advance Fee Scam
  24. Post Express 'Incorrect Delivery Address' Malware Emails
  25. Adobe Acrobat Upgrade Phishing Scam Emails
  26. Mobile Phone Tips - Things You Never Knew Your Mobile Phone Could Do
  27. Telstra Bill Account Update Phishing Scam