I am sorry to inform you that your device was compromised.
_x000D_
Ill explain what led to all of this. I have used a Zero Day vulnerability with a special code to infect your device through a website._x000D_
This is a complicated software that requires precise skills that I have. It works as a chain with specially crafted and unique code and that’s why this type of an attack can go undetected._x000D_
You only need one not patched vulnerability to be infected, and unfortunately for you – it works that simple._x000D_
_x000D_
You were not targeted specifically, but just became one of the quite a few unlucky people who got hacked that day._x000D_
All of this happened a few month ago. So I’ve had time to collect information on you._x000D_
_x000D_
I think you already know what is going to happen next._x000D_
During that time, my software was quietly collecting information about your habits, websites that you visit, searches you do, texts you send._x000D_
There is more to it, but I have listed a few reasons for you to understand how serious this is._x000D_
_x000D_
For you to clearly understand, my software controlled your camera and microphone as well and it was impossible for you to know about it._x000D_
It was just about right timing for me to get you privacy violated._x000D_
_x000D_
I’ve been waiting enough and have decided that it’s time to put an end to this._x000D_
So here is my offer. Let’s name this a “consulting fee” I need to delete the media content I have been collecting._x000D_
Your privacy stays untouched, if I get the payment._x000D_
Otherwise, I will leak the most damaging content to your contacts and post it to a public tube for perverts to explore._x000D_
....._x000D_
_x000D_
I will monitor your every move until I get paid. If you keep your end of the agreement, you wont hear from me ever again._x000D_
_x000D_
Take care.