Share via

Blackmail sent from my own e-mail address

AvIva chen 25 Reputation points
2026-03-14T20:33:54.68+00:00

I have received a blackmail message in my junk folder regarding the transfer of Bitcoin (BTC) to an account within 48 hours; otherwise, they threaten to send a folder containing my address, personal information, and credit card details to the dark web. Additionally, I have noticed that several emails sent to myself appear as "null" in the sent folder.

Outlook | Web | Outlook.com | Account management, security, and privacy
0 comments No comments

Answer accepted by question author

  1. EmilyS726 231.6K Reputation points Independent Advisor
    2026-03-14T21:08:18.2066667+00:00

    Hello,

    Email spoofing happens when someone uses an outside mail server to send messages that pretend to come from your email address by forging the "From" field. They do not have access to your actual email account. To prevent and detect this, email providers like Microsoft use protections like SPF (to define which servers are allowed to send on your behalf), DKIM (to attach a digital signature to prove the email is real), and DMARC (to tell other servers what to do if a message fails these checks). If a spoofed email fails these checks, it will usually be flagged as spam or rejected.

    So, if the email is already in spam/junk folder, you have nothing to worry about.

    Was this answer helpful?

    4 people found this answer helpful.
    0 comments No comments

1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-03-14T20:34:10.4233333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    This is almost certainly a phishing/blackmail scam and not a genuine compromise of Outlook.com by the sender.

    Actions to take immediately:

    1. Do not pay or reply
    • Law enforcement or legitimate companies will never demand Bitcoin or payment via email for “illegal activity” or data exposure.
    • Ignore the threat; responding confirms the address is active and can invite more scams.
    1. Treat the message as phishing
    • The content matches common phishing and extortion patterns: urgent threat, demand for cryptocurrency, and claims of having personal data.
    • In Outlook.com or Outlook on the web, leave it in Junk or delete it. Do not click any links or open attachments.
    • If there are links, hover over them (don’t click) to see the real destination; phishing links often go to unrelated or suspicious domains.
    1. Check whether the sender is really “you” Scammers often spoof the From address so it looks like it came from the same account:
    • In Outlook, check the sender indicators:
      • A ? in the sender image means Outlook could not verify the sender using email authentication.
      • If the sender’s real address differs from what appears in the From field, Outlook may show an underlined via tag with the true sending domain.
    • A message that appears “from you” but fails authentication or shows as unverified is typically spoofed, not actually sent from the account.
    1. Secure the Microsoft account Even though this is likely spoofing, still harden the account:
    • Change the Microsoft account password to a strong, unique one not used anywhere else.
    • Review sign-in and security info in the account (alternate email, phone) and update if anything looks unfamiliar.
    • Enable two-factor authentication (2FA) if not already enabled.
    1. Check for real compromise indicators The “null” entries in Sent could be:
    • Artifacts of spoofed messages or junk that did not send properly, or
    • Signs that rules or forwarding were created if the account was actually accessed.

    After securing the account:

    • Review the Sent folder and any rules/forwarding settings for items not created personally.
    • If there are messages or rules that are not recognized, remove them and consider running a malware scan on devices used to access the account.
    1. Protect against future phishing From the guidance:
    • Be wary of urgent calls to action or threats demanding immediate payment.
    • Watch for mismatched or misspelled domains (for example, micros0ft.com instead of microsoft.com).
    • Treat unexpected attachments and links as suspicious; never open them if the message looks questionable.

    If there is strong evidence the account itself was taken over (for example, password no longer works, recovery info changed, or continuous suspicious drafts/messages appearing):

    • Use the Microsoft account recovery process and follow the steps carefully to regain control.
    • Inform contacts from another account that the address may have been used for phishing so they can ignore suspicious messages.

    References:

    Was this answer helpful?

    2 people found this answer helpful.

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.