“Hello Pervert” Pegasus Scam Gets Cruel With Pics of Your Home

Loading content…

Hackers are constantly evolving their techniques, as seen in the latest version of the “Hello Pervert” sextortion scam. It now includes the threat of Pegasus spyware, and even more unsettling: a photo of your home.

People have been panicking over this latest iteration of the scam, and that’s exactly what the hackers want.

Hackers Scare People Into Action with Pegasus Threat

The “Hello pervert” sextortion scam has evolved, now using two new tactics to pressure victims: mentioning the Pegasus spyware and including photos of their home. These methods aim to convince victims that scammers have been spying on them and their families. The email accuses the target of watching pornography and threatens to release supposed compromising footage unless they pay a ransom. They claim the footage will be sent to all their email contacts.

More recently, scammers have started increasing their threats by mentioning a powerful spyware called “Pegasus.” Several versions of these scam emails have included the following text:

Hackers Now Including Pictures of Potential Victims’ Houses

The threat of Pegasus spyware in these “Hello pervert” sextortion scams are inherently empty. Pegasus has mainly been used by governments for surveillance, not by everyday scammers. Scammers often use old or compromised passwords from previous data breaches, which they purchase from other cybercriminals.

See also  What to Do If Someone Is Blackmailing You for Watching Porn

They’re now heightening their threats by including photos of the victim’s neighborhood, easily obtained from services like Google Maps. This creates the illusion of spying. It also adds credibility to their claims, even though the methods are simple and based on publicly available data.

Source: Midjourney


As an extra threat, the email may include something like:


They imply that they know where you live and threaten to stop by and create a scene. They’re banking on this scaring you enough to not think critically so you start handing over your money.

How to Recognize “Hello Pervert” Emails

These sextortion scam emails are recognizable in several ways, though not all may appear in every message:

1. The email may appear to come from your own address.
2. The scammer accuses you of inappropriate behavior and claims to have footage of it.
3. They falsely claim to have used Pegasus or a Trojan to spy on you.
4. The scammer mentions knowing your password.
5. You are pressured to pay quickly, often within a day, or the supposed footage will be shared with your contacts.
6. The message often comes as an image or PDF to bypass phishing filters.

How to React to “Hello Pervert” Emails

Here are key steps to take if you receive a sextortion scam email:

• Never reply, as it signals the sender that the email is being read, leading to more attempts.
• If the email includes a password you’re still using, change it immediately.
• Consider using a password manager to organize your passwords.
• Don’t rush into decisions—scammers rely on panic to cause mistakes.
• Avoid opening unsolicited attachments, especially from suspicious or self-sent addresses.
• For peace of mind, turn off or cover your webcam when not in use.

See also  How to Fight Online Blackmail and Digital Extortion

How to Protect Yourself from a Pegasus Email Scam

Be proactive in protecting your online privacy. Update your passwords regularly and use a password manager to create and store strong, unique passwords for each account.

To boost your cybersecurity, start using tools like a Virtual Private Network (VPN). A VPN encrypts your online traffic, ensuring that any data you send or receive is protected from snoopers. Encryption makes it much harder for anyone to intercept and use your personal information in scams, such as the Pegasus email scam.

Also, be sure to use two-factor authentication with any online accounts.

And if you’d like personal assistance, please book a call at Hacked.com today.

AGI Amazon Antivirus Apple bitcoin blackmail China Colonial Pipeline Cybercrime cybersecurity DarkSide Dark Web Deepfake Deepnude Facebook fireeye Google Hackers Impersonation Instagram iPhone Joe Biden malware Meta Microsoft pegasus phishing Playstation Porn ransomware Revenge porn Russia sim swap small business Snapchat solarwinds TikTok Twitter two-factor authentication yango YouTube

Grant Employees Free Security Help

At Hacked.com, we specialize in securing and recovering accounts like Facebook, Instagram, and LinkedIn. We also assist individuals in removing harmful online content, such as images, videos, and fake profiles.

We offer two annual cybersecurity webinars to help employees stay ahead of personal security threats. Our webinars are updated yearly and include:

  • Exclusive security toolkits
  • Free recovery assistance for any employee who attends a webinar