1. Januar 1970 Gudrun Heusner

***SPAM*** Settle your debt in order to avoid additional fees.

Dear user of caractere-mode.de! I am a spyware software developer. Your account has been hacked by me couple months ago. The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2023-20026). I went around the security system in the router, installed an exploit there. When you went online, my exploit downloaded my malicious code (rootkit) to your device. This is driver software, I constantly updated it, so your antivirus is silent all time. Since then I have been following you (I can connect to your device via the VNC protocol). That is, I can see absolutely everything that you do, view and download your files and any data to yourself. I also have access to the camera on your device, and I periodically take photos and videos with you. At the moment, I have harvested a solid dirt… on you… I saved all your email and chats from your messangers. I also saved the entire history of the sites you visit. I note that it is useless to change the passwords. My malware update passwords from your accounts every times. I know what you like hard funs (adult sites). Oh, yes .. I’m

1. Januar 1970 Gudrun Heusner

***SPAM*** Don’t forget to pay the tax within 2 days!

Hi. How are you? I know, it’s unpleasant to start the conversation with bad news, but I have no choice. Few months ago, I have gained access to your devices that used by you for internet browsing. Afterwards, I could track down all your internet activities. Here is the history of how it could become possible: At first, I purchased from hackers the access to multiple email accounts (nowadays, it is a really simple thing to do online). As result, I could easily log in to your email account (gudrun.heusner@caractere-mode.de). One week later, I installed Trojan virus in Operating Systems of all devices of yours, which you use to open email. Frankly speaking, it was rather straightforward (since you were opening the links from your inbox emails). Everything ingenious is quite simple. (o_0)! My software enables me with access to all controllers inside devices of yours, like microphone, keyboard and video camera. I could easily download to my servers all your private info, including the history of web browsing and photos. I can effortlessly gain access to all your messengers, social networks accounts, emails, contact list as well as chat history. Virus of mine constantly keeps refreshing its signatures (because

1. Januar 1970 Gudrun Heusner

***SPAM*** Settle your debt in order to avoid additional fees.

Dear user of caractere-mode.de! I am a spyware software developer. Your account has been hacked by me couple months ago. The hacking was carried out using a hardware vulnerability through which you went online (Cisco router, vulnerability CVE-2023-20026). I went around the security system in the router, installed an exploit there. When you went online, my exploit downloaded my malicious code (rootkit) to your device. This is driver software, I constantly updated it, so your antivirus is silent all time. Since then I have been following you (I can connect to your device via the VNC protocol). That is, I can see absolutely everything that you do, view and download your files and any data to yourself. I also have access to the camera on your device, and I periodically take photos and videos with you. At the moment, I have harvested a solid dirt… on you… I saved all your email and chats from your messangers. I also saved the entire history of the sites you visit. I note that it is useless to change the passwords. My malware update passwords from your accounts every times. I know what you like hard funs (adult sites). Oh, yes .. I’m

1. Januar 1970 Gudrun Heusner

***SPAM*** Don’t miss your unsettled payment. Complete your debt payment now.

Hi there! I regret to inform you about some sad news for you. Approximately a month or two ago I have succeeded to gain a total access to all your devices utilized for browsing internet. Moving forward, I have started observing your internet activities on continuous basis. Go ahead and take a look at the sequence of events provided below for your reference: Initially I bought an exclusive access from hackers to a long list of email accounts (in today’s world, that is really a common thing, which can arranged via internet). Evidently, it wasn’t hard for me to proceed with logging in your email account (gudrun.heusner@caractere-mode.de). Within the same week, I moved on with installing a Trojan virus in Operating Systems for all devices that you use to login to email. Frankly speaking, it wasn’t a challenging task for me at all (since you were kind enough to click some of the links in your inbox emails before). Yeah, geniuses are among us. Because of this Trojan I am able to gain access to entire set of controllers in devices (e.g., your video camera, keyboard, microphone and others). As result, I effortlessly downloaded all data, as well as photos,

1. Januar 1970 Gudrun Heusner

***SPAM*** Vergessen Sie nicht, innerhalb von 2 Tagen die Steuer zu zahlen!

Hallo, wie geht es Ihnen? Ich weiß, es ist unangenehm, das Gespräch mit schlechten = Nachrichten zu beginnen, aber ich habe keine andere Wahl. Vor ein paar Monaten habe ich mir Zugang zu Ihren Geräten = verschafft, die Sie zum Surfen im Internet benutzen. Danach konnte ich alle Ihre Internetaktivitäten = aufspüren. Hier ist die Vorgeschichte, wie es dazu kommen konnte: Zunächst habe ich mir von Hackern den Zugang zu mehreren = E-Mail-Konten erkauft (heutzutage ist das online sehr einfach zu = bewerkstelligen). So konnte ich mich problemlos in Ihr E-Mail-Konto einloggen = (gudrun.heusner@caractere-mode.de). Eine Woche später habe ich in den Betriebssystemen aller Ihrer = Geräte, die Sie zum Öffnen von E-Mails verwenden, einen = Trojaner installiert. Ehrlich gesagt, war das ziemlich einfach (da Sie die Links aus Ihren = E-Mails im Posteingang geöffnet haben). Das Geniale ist ganz einfach. 。゚・ (>﹏

1. Januar 1970 Gudrun Heusner

***SPAM*** Don’t miss your unsettled payment. Complete your debt payment now.

Hi there! I regret to inform you about some sad news for you. Approximately a month or two ago I have succeeded to gain a total access to all your devices utilized for browsing internet. Moving forward, I have started observing your internet activities on continuous basis. Go ahead and take a look at the sequence of events provided below for your reference: Initially I bought an exclusive access from hackers to a long list of email accounts (in today’s world, that is really a common thing, which can arranged via internet). Evidently, it wasn’t hard for me to proceed with logging in your email account (gudrun.heusner@caractere-mode.de). Within the same week, I moved on with installing a Trojan virus in Operating Systems for all devices that you use to login to email. Frankly speaking, it wasn’t a challenging task for me at all (since you were kind enough to click some of the links in your inbox emails before). Yeah, geniuses are among us. Because of this Trojan I am able to gain access to entire set of controllers in devices (e.g., your video camera, keyboard, microphone and others). As result, I effortlessly downloaded all data, as well as photos,

1. Januar 1970 Gudrun Heusner

***SPAM*** Vergessen Sie nicht, innerhalb von 2 Tagen die Steuer zu zahlen!

Hallo, wie = geht es Ihnen? Ich weiß, es ist unangenehm, das Gespräch mit schlechten = Nachrichten zu beginnen, aber ich habe keine andere Wahl. Vor ein paar Monaten habe ich mir Zugang zu Ihren Geräten = verschafft, die Sie zum Surfen im Internet benutzen. Danach konnte ich alle Ihre Internetaktivitäten = aufspüren. Hier ist die Vorgeschichte, wie es dazu kommen konnte: Zunächst habe ich mir von Hackern den Zugang zu mehreren = E-Mail-Konten erkauft (heutzutage ist das online sehr einfach zu = bewerkstelligen). So konnte ich mich problemlos in Ihr E-Mail-Konto einloggen = (gudrun.heusner@caractere-mode.de). Eine Woche später habe ich in den Betriebssystemen aller Ihrer = Geräte, die Sie zum Öffnen von E-Mails verwenden, einen = Trojaner installiert. Ehrlich gesagt, war das ziemlich einfach (da Sie die Links aus Ihren = E-Mails im Posteingang geöffnet haben). Das Geniale ist ganz einfach. 。゚・ (>﹏

";