Here’s what you need to do if you receive a threatening email.
In this article, we discuss the most common spam emails across different countries and how to protect yourself from email extortionists.
Classic Scam Emails
Classic scam emails may vary in their content, but their essence remains the same: the blackmailer plays the role of a “noble villain” and offers the victim a way out, provided they transfer money (usually cryptocurrency).
To make the scam more believable, the attackers often include personal information about their victims, such as full name, phone number, and even address. This doesn’t mean your device has been hacked; more often than not, these details come from leaked databases that are publicly available.
The most common theme among email blackmailers is a hacker breach and full access to devices and personal data.

There are three popular scenarios here:
- The blackmailer is direct with their threats and immediately gets to the point: stating the sum of money that needs to be transferred to keep private information from being made public.
- In more detailed spam emails, the scammer shares a lot of specifics about the malware that infected the victim’s device and the data they’ve accessed. This often covers details about the computer, mouse, webcam, and keyboard. At times, these scammers even “kindly” suggest that victims change their passwords often and steer clear of suspicious links to avoid future problems.
- Occasionally, the email doesn’t offer detailed accounts of the “hacker attack” or what the blackmailer wants. Instead, it includes a link to a website where victims are told they can find all the details. This tactic is used to slip past spam filters.
Police Are Coming for You: Scam Emails in Europe
In addition to the stories with noble hackers offering immediate solutions for a sensitive fee, there are also more elaborate schemes.
In these, the scammers pose as law enforcement officers but don’t ask for money upfront, which would raise suspicions.
Instead, the victim receives a “summons” by email, accusing them of committing a delicate crime, usually related to pornography (including child pornography), pedophilia, human trafficking, or even exhibitionism.

The “evidence” is allegedly taken directly from the victim’s computer, which the “authorities” have gained “remote access” to.
Spam Blackmail Targeting Users in France
The document contains everything to instill fear: a threat of arrest, large fines, a signature with a seal, an address, and the names of prominent prosecutors.
The scammers demand that the victim immediately contact the email address provided in the letter to offer an explanation – otherwise, sanctions may follow. If the victim fails to respond, they’ll be arrested and added to the sexual offender registry, and the dossier with their “crimes” will be sent to the media.
When the terrified victim contacts the scammers, they are told to “pay the fine” to “close the criminal case” – a case that doesn’t even exist.
Signs of Scam Emails
As you can see from the examples provided, most scam emails look highly implausible, yet they still find victims! However, with the advent of AI tools being used by scammers, we can expect significant improvements in both the text and design of such emails. Here are some signs that will help you recognize even the most sophisticated forgeries.
- Personal Data: Scam emails often appear more official and credible when they contain personal information like your address, tax ID, phone number, or passport details. However, the presence of this data doesn’t mean the email is legitimate. It’s highly likely that your data was obtained from leaked databases and exploited by scammers. On the flip side, impersonal greetings like “Dear customer” or “Dear sir” are also a big red flag.
- Sender’s Address: If the sender’s email address is from a free email service, it’s likely a scam.
- Request to Open an Attachment or Link: Scam emails often urge you to open an attachment or click a link to “find out more details.”
- Manipulation, Threats, and Urgency: Scammers use psychological tricks, like creating a sense of urgency or threatening you, hoping to unsettle you and make you act without seeking external support. If the email pushes you to act immediately or not share it with anyone, that’s a big warning sign.
- Typos and Errors: If the email looks like a poor translation from another language, you’re likely dealing with a scam. While scammers aren’t usually linguistically skilled, sometimes they create very high-quality spam emails.
- Character Substitution to Bypass Spam Filters: Scammers mix alphabets, add diacritical marks (e.g., “Ƙ” instead of “K”), or insert random, meaningless blocks of text to evade spam filters. Although the text remains readable, it often looks odd.

Example of fraudsters attempting to bypass spam filters by substituting characters and adding meaningless blocks of text.
How to Protect Yourself from Email Extortionists
Don’t Panic. Scammers work hard to frighten you right away. They build up this rush feeling and lean on your faith in big official groups. Their goal stays simple. They push you to accept whatever made-up tale they spin. Still, they hold zero real power over you. Things get clearer when threats come fast or ultimatums hit. You slow things down then. Impulsive moves just play into their hands.
Pay Attention to Details. Emails that claim ties to government offices or police need a close look first. Start with the sender’s address. See if it lines up with anything in the reply-to spot. Dig into the groups they name. Check if those outfits even exist and seem solid. Look up the so-called charges or claims they throw at you. Cross-check every bit of that info against real sources.
Use Verified Communication Channels. Official government spots never pull extortion tricks or threats over email. That stays true across the board. Doubt creeps in about some message you get. Hunt down the real contact details for whatever group they mention. Reach out through a different solid way instead. A phone call works fine for that. Skip any links in the email. Never dial numbers listed there. Mobile ones raise red flags especially. Pull contact info from trusted online spots every time.
🎯 Looking Ahead
We’re partnering with leading Web3 and deep tech teams to deliver custom solutions and expertise that really make an impact.
Follow our social channels to stay up to date and never miss key trends.
Have a Web3 or Deep Tech idea? Let’s turn it into reality — our experts are ready to help.