Bitcoin Abuse Database

Report history for 13gdUqbxkC2TQPmaHLuMsTatATz6jHCwkp

Address found in database:
Address 13gdUqbxkC2TQPmaHLuMsTatATz6jHCwkp
View address on blockchain.info
Report Count51
Latest ReportWed, 25 Aug 21 15:17:57 +0000
(3 weeks ago)

If you have additional information about this address, please file a report.

Reports:

Date Abuse Type Description
Aug 25, 2021 sextortion The sender, using a spoofed address, threatened to release the target's information and encrypt their data. Copy of the email: Greetings, I am sorry to inform you that your cloud storage was compromised. LetÂ’s get the biggest elephant out of the room first. I am not a part of shady group that encrypts your data and extorts money leaving you no choice. But I HAVE copied your data. The choice is yours. Here is what happened, one of the websites where you have an account was breached. After that I got access to your password from that breach and with some advanced manipulations and bruteforce extracted your backup data. The data set that I have downloaded and parsed contains pictures, documents, contacts and more including some deleted files. I don't have much time and dedication NOW to go through all of the files, but with some fast looking I did - I am sure that you dont want some of them to be seen by other people. What I can do if you don't follow my instructions is simple. I can send from your name to your contacts the most interesting content, it's the least I can do. You may care or not, it's up to you to decide. If you decide that you don't care, I will go through all files, and who knows what more I may find more. Maybe you have some confidential business information. Or GREAT nudes and videos. If I spend more time on your case, the amount will be 3 times bigger. Depends on the content. So let's make it simple. You pay me $2000 USD, I delete the data, you change your password. Business as usual, use Bitcoin to make the transfer. 13gdUqbxkC2TQPmaHLuMsTatATz6jHCwkp Account is unique and you have some reasonable time to make the payment. Take care.
Jun 25, 2021 blackmail scam After that I got access to your password from that breach and with some advanced manipulations and bruteforce extracted your backup data. The data set that I have downloaded and parsed contains pictures, documents, contacts and more including some deleted files. You pay me $2000 USD, I delete the data, you change your password.
Jun 24, 2021 blackmail scam After that I got access to your password from that breach and with some advanced manipulations and bruteforce extracted your backup data. The data set that I have downloaded and parsed contains pictures, documents, contacts and more including some deleted files. So let's make it simple. You pay me $2000 USD, I delete the data, you change your password.
Jun 23, 2021 blackmail scam After that I got access to your password from that breach and with some advanced manipulations and bruteforce extracted your backup data. You pay me $2000 USD, I delete the data, you change your password.
Jun 23, 2021 blackmail scam I am not a part of shady group that encrypts your data and extorts money leaving you no choice. But I HAVE copied your data.
Jun 20, 2021 blackmail scam cloud storage was compromised scam
Jun 14, 2021 blackmail scam Compromised cloud storage scam
Jun 10, 2021 blackmail scam We received the same note reported below. Adding some additional information. This bypassed our "External" mail transport rule. There was no caution banner at the top of the email. All of the headers appeared from Office365, and were very similar to those that come from sending ourselves mail with one exception. Came from IP 200.119.224.83. We currently do not have SPF/DMARC records which likely would have prevented this. However, it is very interesting that it bypassed the O365 external mail banner.
Jun 9, 2021 blackmail scam Same message text as previous reports. Received 4 copies over several hours on 2021/06/04, relayed via different SMTP hosts in different countries. One message provided a seemingly-gibberish string as the "User Agent" SMTP header. Google finds no match for it. Possibly used by scammers for tracking?
Jun 9, 2021 ransomware 13gdUqbxkC2TQPmaHLuMsTatATz6jHCwkp