Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at BNMC. Give us a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Software Internet Hosted Solutions Ransomware Microsoft Android IT Services Business Google Network Security Computer Backup Smartphone Windows Mobile Devices Small Business Windows 10 Innovation Data Management Internet of Things Data App Hardware Artificial Intelligence Encryption Cloud Computing Server Business Continuity Browser Managed Service Provider Managed IT Services Office 365 Data Recovery Efficiency Saving Money User Tips Business Management Tip of the week Productivity Remote Monitoring Phishing IT Support Gmail Outsourced IT Smartphones Facebook Data storage Risk Management Money Windows 10 Word Productivity Communication Vulnerability Chrome Settings Cybersecurity IT Management IT Support Infrastructure Office Tips Robot Google Drive Big Data Upgrade Antivirus HIPAA LiFi Mobile Device Administration Mobile Security Content Filtering Microsoft Office Business Technology Analytics Holiday Data loss Telephone Systems Outlook Monitors Alert Save Money Firewall Network Two-factor Authentication Automation Mouse Scam Virtual Reality Miscellaneous Apple Employer-Employee Relationship SaaS Hosted Solution Storage VPN Bandwidth Workplace Tips Data Security YouTube Government Server Management Virtual Private Network Social Media communications Unified Threat Management BYOD Computing Managed IT Services Disaster Recovery Maintenance Passwords End of Support Data Backup Marketing Printer Time Management Network Congestion Hacks Google Wallet Corporate Profile Black Friday Training Search Emergency Wi-Fi Automobile Business Growth Applications Dell Access Control Paperless Office Network Management Computers Password Drones WannaCry Cyber Monday Hotspot Google Maps IT solutions Hacker IT Technicians SharePoint Touchscreen Display Managed IT Smart Technology Language Lenovo Running Cable Alt Codes Mirgation desktop Downloads Buisness Shortcut Virtual Desktop Politics Budget Digital Distributed Denial of Service Computing Infrastructure Superfish Collaboration Humor Laptop Typing Current Events Chatbots Deep Learning Samsung Patch Management Tech Support Spyware Managed IT Service Document Management Alerts Spam File Sharing Customer Relationship Management Cryptocurrency Going Green Identity Solid State Drive Multi-Factor Security Remote Computing Bring Your Own Device Heating/Cooling Downtime Identity Theft Websites Break Fix Licensing Networking Bitcoin Gadgets Printing Tech Term Hard Disk Drive Google Calendar Servers Writing Legal Dark Web Cooperation Cabling Apps Dark Data Halloween Windows 8 Users Compliance Legislation Retail Education How To Microsoft Excel Staff Techology Quick Tips Customer Service Scary Stories Website Regulations Tablet Statistics Office Digital Payment Mail Merge Vendor Management Operating System Firefox Blockchain Augmented Reality Disaster Unified Threat Management Unified Communications VoIP Sports Social Information Technology Comparison Bluetooth Social Engineering Address The Internet of Things Best Practice Permissions Wearable Technology Uninterrupted Power Supply User Error Avoiding Downtime VoIP IBM Specifications Computer Care Safety Wireless WiFi Google Docs Cybercrime Fraud Ben McDonald shares Cortana Point of Sale Gadget Virtualization Staffing Computer Repair Administrator what was your? Web Server Processors Mobile Device Management How To GPS Health Mobile Computing Black Market Cameras Tracking Electronic Medical Records Twitter CCTV Upgrades Notifications 3D Printing Travel Crowdsourcing G Suite Supercomputer Unsupported Software Botnet CrashOverride Update Motion Sickness Taxes IT Budget Mobile Data Machine Learning Recovery IT Consultant Relocation Chromebook Meetings Work/Life Balance Cleaning Physical Security Private Cloud Emoji Webcam Law Enforcement Personal Information Error

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3