Bredy Network Management Corporation Blogs

2 minutes reading time (450 words)

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at BNMC. Give us a call at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 25 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Hackers Business Computing Software Internet Hosted Solutions Ransomware Business Network Security Microsoft Google Computer Android IT Services Smartphone Mobile Devices Tech Term Data Management Backup Managed IT Services Windows Small Business Internet of Things Cloud Computing Cybersecurity App Business Continuity Hardware Windows 10 Browser User Tips Innovation Server Remote Monitoring Saving Money Data Recovery Data IT Support Artificial Intelligence Gmail Encryption Business Management Smartphones Productivity Tip of the week Word Chrome Outsourced IT Managed Service Provider Facebook Phishing Data Backup Productivity Vulnerability Efficiency Office 365 Infrastructure Disaster Recovery Windows 10 IT Support Applications Settings Antivirus Robot Google Drive Bandwidth Upgrade YouTube Communication Analytics Social Media communications Risk Management IT Management Government Office Tips Data storage Managed IT Services Passwords Big Data Money Mobile Security Spam Computing VoIP Outlook WiFi Two-factor Authentication Maintenance Firewall Avoiding Downtime Monitors LiFi Vendor Management Hosted Solution Save Money Scam Administration Automation Content Filtering Mouse Workplace Tips Employer-Employee Relationship Miscellaneous End of Support Virtual Reality Apple VPN Mobile Device Paperless Office Storage Data Security Server Management Website Business Technology SaaS Virtual Private Network Holiday Unified Threat Management Network Microsoft Office BYOD Data loss Alert HIPAA The Internet of Things Telephone Systems Assessment Disaster Bluetooth Comparison Solar Digital Alt Codes Firefox Superfish Customer Service Office Samsung Downtime Work Bring Your Own Device Operating System Address Permissions Cybercrime Smart Tech Collaboration User Error Marketing Cooperation Service Level Agreement Budget Patch Management Managed IT Service Tech Support Router Voice over Internet Protocol Social Hotspot Internet Exlporer Uninterrupted Power Supply Information Technology Specifications Compliance Business Intelligence Document Management Spyware Typing Humor Customer Relationship Management Chromebook Gadgets Current Events Heating/Cooling Multi-Factor Security Social Engineering IT Technicians Optimization Computer Care IBM Best Practice Connectivity File Sharing Time Management Printer Staff Leominster Solid State Drive Break Fix Websites Modem Wireless Users Halloween Language Value Apps Search Black Friday Regulations Company Culture Identity Theft Cryptocurrency Networking IT solutions Going Green Servers Google Calendar Safety Mirgation Recycling Training Corporate Profile Google Docs Emergency IoT Network Management Access Control Remote Computing Augmented Reality K-12 Schools Hard Disk Drive Dark Web Cookies Automobile Education Hacks Scary Stories Computing Infrastructure Professional Services Dell Google Wallet Cyber Monday Social Networking Managing Stress Bitcoin Network Congestion Star Wars Cabling Printing Legislation Chatbots eWaste WannaCry Business Growth Running Cable Touchscreen SharePoint Writing Buisness Wearable Technology Network upgrade Legal Microsoft Excel Wi-Fi Nanotechnology Google Maps Password Computers Sports Alerts USB Unified Communications Drones Managed IT Smart Technology Virtual Desktop Motherboard Cables Windows 8 Quick Tips Techology Fraud Cost Management Statistics Tablet Identity Continuity Hacker How To Lenovo Dark Data Laptop Downloads Retail Smart Office Deep Learning Mail Merge Blockchain Screen Reader Display Licensing Dongle desktop Shortcut Distributed Denial of Service Politics Wires Digital Payment VoIP Unified Threat Management Meetings How To Work/Life Balance Tracking Recovery Mobile Computing Cleaning Health Private Cloud Black Market CCTV Webcam Law Enforcement Notifications Electronic Medical Records Twitter Physical Security Error FinTech Point of Sale Ben McDonald shares Upgrades Gadget Emoji Travel Crowdsourcing G Suite Personal Information Botnet 3D Printing Supercomputer CrashOverride Cortana Motion Sickness Staffing Processors Taxes Machine Learning Administrator Virtualization Web Server what was your? Unsupported Software IT Budget GPS Update Mobile Device Management IT Consultant Computer Repair Relocation Cameras Mobile Data BDR

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3