Free Video Downloader

Fast and free all in one video downloader

For Example: https://www.youtube.com/watch?v=OLCJYT5y8Bo

1

Copy shareable video URL

2

Paste it into the field

3

Click to download button


How to Respond to a Hacker’s Cyber Attack and Extortion Threat
January 22, 2023

How to Respond to a Hacker’s Cyber Attack and Extortion Threat

Reading Time: 6 minutes

A hacker emailed me claiming to have gained full access to my computer and has been monitoring my activities, compiled compromising video, and required me to pay him within 50 hours or else he’d release the videos to all contacts on my devices and make con

The Cyber Crime

On Saturday, January 7, 2023, I received an email from a self-proclaimed, careful, calculated, professional hacker, intending to generate fear, shame, paranoia, and extort money. The hacker said he had successfully infected my computer with harmful spyware, gained full access, can see confidential information, and has been secretly monitoring all my activities and watching me for several months.

I discovered the email in the Junk folder while searching to confirm receipt of a client email and only opened it because the email address in the From and To fields was disturbingly one of my business aliases that I never used. Therefore, I thought his ability to access and use one of my email addresses lent an element of proof to being hacked.

However, the hacker’s explanation of how he gained access and the type of video he compiled of me was totally off base and uncharacteristic of my behavior or activities. I include the email photos below. But suffice is to say that I am not into porn related sites or pleasuring myself. So, this seemed to me a phishing exercise to target several individuals in the likelihood that someone somewhere might engage in those activities and be willing to pay to keep a ‘compromising video from being sent to all their email addresses and messenger contacts on their devices, as well as make all emails and chat history public.’ If God had not rooted and been growing me these past 42 years, the cyber-attack and extortion threat might have worked.

The hacker instructed me to transfer the Bitcoin equivalent of $1490 to his bitcoin account within 50 hours to avoid the threat of public shame. Upon compliance, he would then delete the videos and completely disappear from my life.

The Hacker's Phishing Email

My Thoughts

I intentionally used the word respond instead of react because I have cultivated a state of peace in God over the past couple of years and have been able to maintain it well. So, whereas the use of my email concerned me, his explanation of access told me he had the wrong one and in more than one way.

Scriptures immediately sprung up in my spirit, such as Isaiah 54:17; Romans 8:31, 37; Romans 8:28; and Psalm 23.

Since I saw the email late in the evening on my sabbath Saturday, the false information about what he recorded outweighed any truth to the magnitude of his hack. Other than having access to one of my email addresses, if his trojan virus and spyware were so effective and my devices so compromised, why did he need me to transfer the bitcoins to his account?

In addition, I was due to start a 5-day fast and three nights of prayer services with my local church, Apostolic Temple of Jesus Christ and 21-Days of Prayer and Fasting with my online church, Transformation Church (TC Nation) that Monday. Plus, I was already on day seven (7) of a 31-day Wisdom Challenge with Pedro Adao and guest speaker-friends, and the 100X community, reading and discussing the book of Proverbs daily for the month of January.

On one hand, I knew the devil was not happy with me striving to be more like Jesus, living a kingdom principled lifestyle. But I also knew the devil can’t do anything without God's permission and therefore, I thought it was a test of faith and spiritual growth to see how I would respond or react to the situation. Either way, this battle belonged to God.

The Battle Is Not Yours – Yolanda Adams

My Response

PRAYED – After seeing the email on Saturday evening, I was quiet and prayerful, seeking God’s instruction. On Monday, Jan. 9, 2023, during my morning prayer time, I did the YouVersion Bible app’s daily guided prayer and Transformation Church’s The Sauce: Seek First Bible Plan. I couldn’t help but smile from the inside out. With the confirmation of everything I was reading and reflecting on, I felt covered and cared for by God. It caused me to offer a sincere prayer for the hacker. Feeling like Jesus was my Big Brother, in that instance, I asked Him to forgive the hacker just as He asked the Father to forgive the soldiers mocking Him at the cross because they didn’t understand what they were doing.

Then, I texted my prayer groups and partners to make them aware of the situation. While worshipping to CeCe Winans song, Goodness of God, I shared the song to my Facebook page with an #urgentprayerrequest clarion call post to all prayer warriors, intercessors, and godly people to pray a protective covering over my life and all that relates to it.

Attending the prayer services at my local church on Monday and Friday night and watching Transformation Church prayer services online each night has been transformational and encouraging. The support through this 21-day journey has been incredible.

ADDED PROTECTION – I ordered camera covers for all my devices. It was something I should have done years ago after watching a movie where a hacker took control of several computers and was spying on people like this hacker described in the email. I opted to tape a piece of paper over my laptop camera instead. But I hadn’t even done that with the newer devices I have. But, I’m pleased to say they are all covered now.

I also changed my password and removed the alias email address he used.

I’ve been slow to respond to this situation because I’m amid the fast and been busy with prayer services and zoom meetings and honoring my intention to be consistent. But I also plan to contact my anti-virus and device coverage plans to investigate. In the meantime, their scans show I am protected. And I have a couple of sources monitoring any use of my personal information or inquiries online and send alerts.

REPORTED INCIDENT – In 2016, I wrote a book called ‘How to Protect Yourself from ‘Pretend’ Friend Requests & Email Scams,’ and this is the second time since then that I’ve had to refer to it for instructions on what to do. I filed a report with the Federal Trade Commission (FTC) and forwarded the email to the Anti-Phishing Working Group at reportphishing@apwg.org.

Two Important Truths About Me

Had this hacker really been monitoring me, he would see that I spend most of my time doing godly things. Everyone who knows me can attest that I keep it positive and encouraging. I’m a praise and worship, Hallmark movies, Christian romance books type of woman. For instance, I had to turn off ‘The Best Man’ TV series after five minutes into the first episode because some of those scenes were too much for me and so unnecessary, which was unfortunate because I enjoyed the previous two Best Man movies.

The other thing he didn’t know is that I’m not freely giving away my power ever again. Not after having felt voiceless, undervalued, and victimized for the first 20+ years of my life, and especially not after God forgave and saved me, and made me a new creature in Christ. I believe that when you tell your truth out loud, you take the power away from anyone else to use it against you; you also free yourself, heal on deeper levels, and empower others to do the same. Therefore, in 2014, I compiled the three-book series, Living A Vocal, Valued, and Victorious Life, as well as included parts of my journey in most of my books and online articles when applicable. I knew early on that what I had been through and overcome was not just for me, but so that I could offer comfort and encouragement to others with the comfort I have received from God.

Unveiling the Light – Jo Anne Meekins #inspired4upoetry

Goodness of God – CeCe Winans

Closing Comments

This is one of my my longer articles. But I felt the details were necessary for those who may have fallen victim to this hacker’s demands or someone else’s in fear of being publicly shamed. It’s also naïve to believe a hacker would delete the compromising footage and disappear once he knows that his prey will pay.

I’m here to tell you that there is no condemnation in Jesus when you invite Him into your life. He can deliver you from bondage and empower you to live the abundant kingdom principled lifestyle He purposed and planned for you at the beginning of time.

Be Blessed,

Jo Anne Meekins, Founder
Inspired 4 U Publications

Sinner’s Prayer – Deitrick Haddon

He Touched Me – Gaither Vocal Band

This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional.

© 2023 Jo Anne Meekins

Ref: hubpages

MediaDownloader.net -> Free Online Video Downloader, Download Any Video From YouTube, VK, Vimeo, Twitter, Twitch, Tumblr, Tiktok, Telegram, TED, Streamable, Soundcloud, Snapchat, Share, Rumble, Reddit, PuhuTV, Pinterest, Periscope, Ok.ru, MxTakatak, Mixcloud, Mashable, LinkedIn, Likee, Kwai, Izlesene, Instagram, Imgur, IMDB, Ifunny, Gaana, Flickr, Febspot, Facebook, ESPN, Douyin, Dailymotion, Buzzfeed, BluTV, Blogger, Bitchute, Bilibili, Bandcamp, Akıllı, 9GAG

Leave a Reply

Your email address will not be published. Required fields are marked *