Share via

Blackmail email

robert nelson 0 Reputation points
2026-03-04T17:03:40.6433333+00:00

Today I received an email stating they had all my personal information including social security number banking records and account numbers. Account passwords and all kinds of personal information. All of this information would be sold on to the dar web unless I paid 600 usd in bitcoin to a provided number. I had one day to respond or all of my information would be sold. It shows that the received email is from me.

Outlook | Web | Outlook.com | Email
0 comments No comments

2 answers

Sort by: Most helpful
  1. Rob Koch 25,865 Reputation points Volunteer Moderator
    2026-03-04T17:48:13.83+00:00

    Enen if the email is true and someone has your personal information, how is paying them in anonymous bitcoin to stop them from selling it to someone else?

    That's also a common scam used to try and get foolish people to give the scammers something for nothing, as the following Federal Trade Commission article outlines.

    Did you get an email saying your personal info is for sale on the dark web? | Consumer Advice

    The recommendations there or in the Q&A Assist response that detail things you can do to help confirm whether your personal information is safe or there are other steps you need to take to protect it are really the only things worth spending time on in either case, since once the info is out, it's not possible to put the genie back in the bottle no matter how much you pay someone.

    Rob

    0 comments No comments

  2. Q&A Assist
    2026-03-04T17:03:57.67+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    This is almost certainly a phishing and blackmail scam and payment should not be sent.

    Take these steps:

    1. Strengthen and secure accounts
    • For any accounts that may use the email address mentioned, ensure a strong, unique password and turn on multi‑factor authentication (MFA) wherever available. Multi‑factor authentication blocks the vast majority of password‑based attacks.
    • If any passwords are reused across sites, change them so each important account (email, banking, social media) has its own unique password.
    1. Treat the email as phishing
    • Do not reply, click any links, scan QR codes, or open attachments in that message.
    • If using Outlook/Outlook.com, mark the message as junk/phishing so filters can learn and block similar messages in the future.
    • Be extra cautious with any future messages that:
      • Claim urgent action is required ("one day to respond"),
      • Ask for payment (especially in cryptocurrency), or
      • Ask to click a link or open an attachment to “fix” a problem.
    1. Assume data may be exposed and monitor
    • If there is any chance that personal data (such as Social Security number, bank or card details) has been exposed in any breach, follow these precautions:
      • Monitor bank and credit card accounts closely for suspicious transactions and report anything unusual to the bank immediately.
      • Review credit reports regularly and consider placing a fraud alert or credit freeze with major credit bureaus if Social Security or similar identifiers may be exposed.
    1. Check email security and activity
    • Review sign‑in activity and security settings on the primary email account (where possible):
      • Confirm recovery email/phone are correct.
      • Remove any unknown devices or sessions.
      • Look for suspicious inbox rules (for example, rules that auto‑forward mail or move messages to unexpected folders such as Junk, Notes, or RSS Subscriptions) and delete any that were not created intentionally.
    1. Improve spam and phishing protection
    • Use the spam/phishing reporting features in the email service regularly to help tune filters.
    • Stay alert for common phishing patterns: generic greetings, poor spelling/grammar, unexpected invoices, “fake order” notifications, or messages that demand immediate action to avoid penalties.
    1. Do not be pressured by threats
    • Threats to “sell data on the dark web unless you pay” are a common extortion tactic. Paying does not guarantee that data will not be misused and may encourage further targeting.

    If there is evidence that accounts are already compromised (for example, password‑change confirmations not initiated, missing mail, or suspicious sent items), follow the provider’s “compromised account” recovery steps immediately and notify financial institutions if banking data may be affected.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.