How to identify scams like "Time Is Slipping Away From Your Grasp"
Written by Tomas Meskauskas on
What kind of scam is "Time Is Slipping Away From Your Grasp"?
We have examined the email and concluded that it is a sextortion scam. This type of scam typically involves a fraudulent claim that the sender has obtained compromising material, such as explicit photos or videos. Scammers behind such scams demand a ransom, often in cryptocurrency, to prevent the alleged material from being disclosed.
More about the "Time Is Slipping Away From Your Grasp" scam email
Scammers claim to have gained full access to the recipient's devices through malware, supposedly planted when they visited an unsecured website. They allege that this malware allowed them to remotely activate the recipient's camera and microphone, record their activities, and steal sensitive data.
The email states that compromising footage has been compiled, showing the recipient and the content they supposedly viewed. Scammers give two options: pay a "privacy fee" of $1,500 in Monero (XMR) cryptocurrency or face the consequences of having the fabricated recordings shared with the recipient's contacts, including friends, family, and coworkers.
They also provide a countdown of 50 hours, supposedly starting as soon as the email is opened, and discourage attempts to ignore, negotiate, or reset devices. However, there is no actual malware infection, recorded footage, or real threat. Whoever receives this email should ignore it.
Name | Time Is Slipping Away From Your Grasp Email Scam |
Threat Type | Phishing, Scam, Social Engineering, Fraud |
Fake Claim | Recipient's computer has been compromised |
Cyber Criminal Cryptowallet Address |
88wKr6fytqM7c15y6aVYTzP1vwi4WxVEq3JnMEJdBr3cj3Rq KtWq5xA15d6acJEjXFCKPYBZVPc4YbwP3QUFvK1479h8N8E |
Disguise | Letter from a hacker |
Symptoms | Unauthorized online purchases, changed online account passwords, identity theft, illegal access of the computer. |
Distribution methods | Deceptive emails, rogue online pop-up ads, search engine poisoning techniques, misspelled domains. |
Damage | Loss of sensitive private information, monetary loss, identity theft. |
Malware Removal (Windows) | To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. |
Similar scam emails in general
Sextortion scam emails are designed to pressure victims into paying a ransom, but they are fake. In reality, scammers do not have access to devices or any compromising material. The best response is to ignore the email, avoid engaging with the sender, and report it as spam.
Some examples of similar emails are "Your System Was Breached By Remote Desktop Protocol Email Scam", "Is Visiting A More Convenient Way To Reach", and "Malware On Porn Website". It is important to mention that fraudulent emails can be (and often are) used to trick users into executing malware on their devices.
How do spam campaigns infect computers?
Threat actors use email as a tool to spread malware by deceiving recipients into opening malicious PDFs, Word documents, executable files, scripts, or other attachments containing malware. Infections can occur after users open malicious files or take additional steps (e.g., enable macros in infected documents).
Emails can also contain links directing users to malicious websites. These sites may either initiate an automatic malware download or trick users into downloading and running harmful software themselves.
How to avoid installation of malware?
Be cautious when dealing with emails containing links or attachments, particularly if they are unexpected, unrelated to your activities, and (or) from unfamiliar senders. Only download software and files from trusted sources, such as official websites or legitimate app stores—avoid unofficial platforms, pirated software, cracking tools, and key generators.
Update your operating system and software regularly and perform scans with reputable security software. Additionally, do not click ads, pop-ups, buttons, or links on questionable websites, and never grant them permission to send notifications. If you have already opened malicious attachments, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate infiltrated malware.
Appearance of the email (GIF):
Text presented in the "Time Is Slipping Away From Your Grasp" email letter:
Subject:
Time is slipping away from your grasp.
Take a moment to pause, take a deep breath, and focus entirely on this message.
It's important that you give it your full attention.
We're about to address something serious between us, and I'm not joking in the slightest.
You may not know who I am, but I know who you are and right now, you're probably wondering how, aren't you?Your online activities have been quite risky scrolling through videos, clicking on links, and visiting unsecured websites.
I embedded malware on website, and you happened to encounter it.
While you were streaming, your system became vulnerable through hVNC, granting me full access to your devices (and your phone, too, yeah. o_O).
Now, I can monitor everything happening on your screen, remotely activate your cam and mic without your knowledge, and I have complete access to your contacts, etc.I've been keeping an eye on your activities for quite a while now. I've gathered a substantial amount of sensitive information from your device and reviewed it in detail.
I even have recordings of you engaging in some questionable behavior at home. I've put together videos and screenshots (including images of your living space), with one side showing the content you were viewing and the other side showing... well, you know what I mean.
With just one click, I could share all of this with every single one of your contacts.I understand your hesitation, but don't expect any mercy from me.
That being said, I'm willing to let this slide and allow you to move on like nothing ever happened.
Here's the deal I'm giving you two variants.Ignore this message, and you'll see what happens next. If you choose this path, I'll send the video to all your contacts.
It's a pretty revealing clip, and I can only imagine the embarrassment you'd feel when your coworkers, friends, and family see it.
But remember actions have consequences.Pay to keep this matter confidential - let's call it a privacy fee.
If you take this option, your secret will remain secure, and no one will ever find out.
As soon as I receive the payment, I'll delete all the evidence. The payment must be made strictly in cryptocurrency.Send 1500 USD in XMR (Monero) cryptocurrency equivalent to my wallet listed below between the "---" symbols:
88wKr6fytqM7c15y6aVYTzP1vwi4WxVEq3JnMEJdBr3cj3RqKtWq5xA15d6acJEjXFCKPYBZVPc4YbwP3QUFvK1479h8N8E
Hint: type the query in google "buy XMR" or "buy Monero".From this moment, you have exactly 50 hours, and the countdown begins as soon as you open this email.
Once the payment is received, you can be assured that I will honor my commitment.
My system will automatically register the payment and promptly erase all the information I have on you.
Don't waste time replying or trying to negotiate - it's futile.Don't even think about turning off your phone or attempting a factory reset - it won't change anything.
I make no mistakes and just wait for my money.(^_^)
Instant automatic malware removal:
Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner
By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
- What is Time Is Slipping Away From Your Grasp sextortion scam?
- Types of malicious emails.
- How to spot a malicious email?
- What to do if you fell for an email scam?
Types of malicious emails:
Phishing Emails
Most commonly, cybercriminals use deceptive emails to trick Internet users into giving away their sensitive private information, for example, login information for various online services, email accounts, or online banking information.
Such attacks are called phishing. In a phishing attack, cybercriminals usually send an email message with some popular service logo (for example, Microsoft, DHL, Amazon, Netflix), create urgency (wrong shipping address, expired password, etc.), and place a link which they hope their potential victims will click on.
After clicking the link presented in such email message, victims are redirected to a fake website that looks identical or extremely similar to the original one. Victims are then asked to enter their password, credit card details, or some other information that gets stolen by cybercriminals.
Emails with Malicious Attachments
Another popular attack vector is email spam with malicious attachments that infect users' computers with malware. Malicious attachments usually carry trojans that are capable of stealing passwords, banking information, and other sensitive information.
In such attacks, cybercriminals' main goal is to trick their potential victims into opening an infected email attachment. To achieve this goal, email messages usually talk about recently received invoices, faxes, or voice messages.
If a potential victim falls for the lure and opens the attachment, their computers get infected, and cybercriminals can collect a lot of sensitive information.
While it's a more complicated method to steal personal information (spam filters and antivirus programs usually detect such attempts), if successful, cybercriminals can get a much wider array of data and can collect information for a long period of time.
Sextortion Emails
This is a type of phishing. In this case, users receive an email claiming that a cybercriminal could access the webcam of the potential victim and has a video recording of one's masturbation.
To get rid of the video, victims are asked to pay a ransom (usually using Bitcoin or another cryptocurrency). Nevertheless, all of these claims are false - users who receive such emails should ignore and delete them.
How to spot a malicious email?
While cyber criminals try to make their lure emails look trustworthy, here are some things that you should look for when trying to spot a phishing email:
- Check the sender's ("from") email address: Hover your mouse over the "from" address and check if it's legitimate. For example, if you received an email from Microsoft, be sure to check if the email address is @microsoft.com and not something suspicious like @m1crosoft.com, @microsfot.com, @account-security-noreply.com, etc.
- Check for generic greetings: If the greeting in the email is "Dear user", "Dear @youremail.com", "Dear valued customer", this should raise suspiciousness. Most commonly, companies call you by your name. Lack of this information could signal a phishing attempt.
- Check the links in the email: Hover your mouse over the link presented in the email, if the link that appears seems suspicious, don't click it. For example, if you received an email from Microsoft and the link in the email shows that it will go to firebasestorage.googleapis.com/v0... you shouldn't trust it. It's best not to click any links in the emails but to visit the company website that sent you the email in the first place.
- Don't blindly trust email attachments: Most commonly, legitimate companies will ask you to log in to their website and to view any documents there; if you received an email with an attachment, it's a good idea to scan it with an antivirus application. Infected email attachments are a common attack vector used by cybercriminals.
To minimise the risk of opening phishing and malicious emails we recommend using Combo Cleaner Antivirus for Windows.
Example of a spam email:
What to do if you fell for an email scam?
- If you clicked on a link in a phishing email and entered your password - be sure to change your password as soon as possible. Usually, cybercriminals collect stolen credentials and then sell them to other groups that use them for malicious purposes. If you change your password in a timely manner, there's a chance that criminals won't have enough time to do any damage.
- If you entered your credit card information - contact your bank as soon as possible and explain the situation. There's a good chance that you will need to cancel your compromised credit card and get a new one.
- If you see any signs of identity theft - you should immediately contact the Federal Trade Commission. This institution will collect information about your situation and create a personal recovery plan.
- If you opened a malicious attachment - your computer is probably infected, you should scan it with a reputable antivirus application. For this purpose, we recommend using Combo Cleaner Antivirus for Windows.
- Help other Internet users - report phishing emails to Anti-Phishing Working Group, FBI’s Internet Crime Complaint Center, National Fraud Information Center and U.S. Department of Justice.
Frequently Asked Questions (FAQ)
Why did I receive this email?
Scammers usually send these emails without targeting specific individuals. They collect email addresses from leaked databases, fraudulent websites, or other sources. Once they have a list, they distribute the same deceptive message to all recipients.
I have provided my personal information when tricked by a scam email, what should I do?
If you have shared any login credentials, you should change all associated passwords right away to prevent unauthorized access. If you have disclosed sensitive personal information, such as credit card numbers, ID card details, or banking information, reach out to the relevant authorities immediately.
I have downloaded and opened a malicious file attached to an email, is my computer infected?
It depends on the type of file used to deliver malware. Malicious executable files can cause immediate damage when opened, but files, such as documents or archives, typically require additional actions, like enabling macros or extracting contents, before the malware can be activated.
Was my computer actually hacked and does the sender have any information?
Scammers often send fake threats to scare you. Unless you downloaded and opened a malicious file or link, your device is likely safe.
I have sent cryptocurrency to the address presented in such email, can I get my money back?
Unfortunately, cryptocurrency transactions are irreversible. Once sent, the funds cannot be recovered unless the recipient returns them, which is highly unlikely in scams.
I have read the email but did not open the attachment, is my computer infected?
Simply opening an email is generally safe. The risk comes from interacting with malicious links or files/attachments.
Will Combo Cleaner remove malware infections that were present in email attachment?
Combo Cleaner is effective at detecting and removing most known malware, but sophisticated threats may remain hidden deep within the system. To ensure complete removal, it is best to run a full system scan.
▼ Show Discussion