BNMC Blog

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at BNMC. Give us a call at 978-482-2020.

 

Comments 1

Milli Catery on Friday, 17 January 2020 05:03

There are other threatens that can destroy our lives. Some people are very scared and they buy competition handguns not only for competitions but also to have them in the house as a precaution. It is important to take measures to protect ourselves, but we should learn to not use them if it is not an imminent threat.

There are other threatens that can destroy our lives. Some people are very scared and they buy [url=http://www.glockstore.com/Competition]competition handguns[/url] not only for competitions but also to have them in the house as a precaution. It is important to take measures to protect ourselves, but we should learn to not use them if it is not an imminent threat.
Already Registered? Login Here
Guest
Friday, May 29 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Business Malware Efficiency Communication Data Google Small Business Workplace Tips IT Services IT Support Mobile Devices Tech Term Hardware Cloud Computing Internet Managed IT Services Data Recovery Innovation Ransomware Backup Smartphone Outsourced IT Users Saving Money Mobile Device Windows Smartphones Android Upgrade Data Backup Miscellaneous communications Business Continuity Disaster Recovery Microsoft Office Windows 10 Business Management VoIP Server Facebook Phishing Information Cybersecurity Social Media Office 365 Managed IT Services Network Browser Productivity Windows 10 Passwords Internet of Things Data Management App Gmail Gadgets Word Vulnerability Remote Monitoring Artificial Intelligence Mobile Office Quick Tips Infrastructure Encryption Managed Service Chrome Apps Virtual Reality Access Control Analytics VPN Applications Website Router BYOD Company Culture Money IT Support Tip of the week Settings Remote Workers Managed Service Provider Save Money Employer-Employee Relationship Networking BDR Apple Risk Management Education Paperless Office Storage IT Management Data Security Government Office Tips Virtual Private Network Computers Unified Threat Management Hacker Data storage Big Data Employee-Employer Relationship Display Maintenance Collaboration Firewall WiFi Avoiding Downtime Information Technology Antivirus Development Robot Google Drive Automation Content Filtering Bandwidth HIPAA YouTube Going Green Remote Computing Hard Disk Drive Mobile Security Printing Server Management Business Technology SaaS Touchscreen Business Intelligence iOS Wi-Fi Password Laptop Managed IT Holiday Virtualization Tablet Data loss The Internet of Things Retail Alert Conferencing Telephone Systems desktop Managed Services Spam Computing Downtime MSP Outlook Augmented Reality Two-factor Authentication Marketing Managing Stress Bring Your Own Device Operating System Monitors LiFi Managed IT Service Vendor Management Social OneNote Hosted Solution Document Management Humor Data Breach Customer Relationship Management Scam Chromebook Best Practice Windows 7 IT Administration Solid State Drive Mouse Software as a Service Break Fix Social Network Wireless Search End of Support IT solutions Content Huawei Servers Google Calendar Safety Wires Training Corporate Profile Google Docs Messaging Emergency Holidays Licensing Dongle Network Management Scary Stories Solar G Suite Entertainment Vendor Dark Web Distribution Assessment Automobile Hacks Digital Signage Data Warehouse Remote Work Running Cable Work Dell Google Wallet Shortcuts Mobile Management Cyber Monday Smart Tech Bitcoin Monitoring Solid State Drives Network Congestion Streaming Processor Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling SharePoint Writing Sports Compliance Legal Hybrid Cloud Microsoft Excel Logistics Virtual Desktop Hotspot Internet Exlporer Google Maps Troubleshooting Business Analysis IT Technicians Optimization Unified Communications Drones Security Cameras Profiles Smart Technology Connectivity Windows 8 Spying National Security Techology Human Error Memory Statistics Modem FinTech Analysis Students How To Lenovo Dark Data Update Inventory Staff Leominster Virus Downloads Regulations Deep Learning Scalability Mail Merge Blockchain Asset Management Language Value Mobile Device Management Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Politics IoT Digital Payment Updates VoIP Unified Threat Management Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools LED Threats Office Samsung Social Networking Migration Consulting Address Permissions Health Private Cloud Memes Computing Infrastructure Professional Services Chatbots eWaste Budget Laptops Patch Management Tech Support Star Wars PowerPoint User Error Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Spyware Typing Gamification Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Alerts USB File Sharing Halloween Identity Continuity Managed Services Provider Websites Fraud Cost Management Onboarding GDPR Time Management Printer Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives COVID-19 Crowdsourcing Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS Printers IT Consultant Computer Repair Relocation Cameras Mobile Data Meetings How To Tracking Recovery Cleaning Mobile Computing Black Market CCTV Webcam Law Enforcement Financial Notifications Electronic Medical Records Twitter Physical Security Error Point of Sale Ben McDonald shares Upgrades Gadget Emoji

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3