BNMC Blog

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at BNMC. Give us a call at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 17 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Network Security User Tips Business Computing Business Hackers Software Computer Tech Term Internet Microsoft Google IT Services Mobile Devices Hosted Solutions Efficiency Ransomware Smartphone Small Business Communication IT Support Backup Productivity Managed IT Services Data Android Browser Innovation Managed IT Services Saving Money Business Continuity Hardware Data Management Cloud Computing Windows 10 Windows Internet of Things Data Recovery Microsoft Office Workplace Tips Business Management App Data Backup Productivity Cybersecurity Windows 10 Outsourced IT Word Disaster Recovery Upgrade Encryption Passwords Remote Monitoring Mobile Device Office 365 Gmail Server Artificial Intelligence Facebook Network BYOD Infrastructure Money IT Support Applications Website Tip of the week Vulnerability Employer-Employee Relationship Analytics Smartphones communications Chrome Managed Service Provider Phishing Data storage Users YouTube Social Media Risk Management Maintenance Robot Save Money Office Tips Google Drive Antivirus Bandwidth Content Filtering Company Culture Miscellaneous Big Data Managed Service VoIP IT Management Government Settings Quick Tips Data loss Alert Unified Threat Management HIPAA Display Telephone Systems Spam Computing Mobile Security desktop Outlook WiFi Operating System Monitors Firewall LiFi Two-factor Authentication Vendor Management Business Intelligence Hosted Solution Avoiding Downtime Administration Scam Laptop Automation Mouse End of Support Wireless The Internet of Things Employee-Employer Relationship Virtual Reality Education Apple VPN Managing Stress Access Control Storage Printing Data Security Paperless Office SaaS Business Technology Development Information Server Management Virtual Private Network Touchscreen Holiday Identity Continuity Techology Fraud Cost Management Hacker Onboarding Managed IT Dark Data Smart Technology Update Mobile Device Management Print Toner Halloween How To Lenovo Retail Screen Reader Charging Deep Learning Slack Statistics Tablet Smart Office Mail Merge Blockchain Wires Downloads Politics Licensing Dongle Content Shortcut Customer Service Distributed Denial of Service Solar Digital Payment VoIP Unified Threat Management Assessment Alt Codes Digital Signage Digital Scary Stories Firefox Superfish Office Samsung Smart Tech Disaster Bring Your Own Device Monitoring Bluetooth Comparison Work Social Streaming Running Cable Address Permissions Router Voice over Internet Protocol Collaboration Budget Tech Support Cooperation Service Level Agreement Patch Management Managed IT Service Chromebook Compliance Information Technology Buisness User Error Hotspot Internet Exlporer Typing Troubleshooting Humor Optimization Document Management Spyware Current Events Sports Customer Relationship Management Social Engineering Connectivity Uninterrupted Power Supply Best Practice Spying Virtual Desktop Specifications IT Technicians Computer Care IBM Human Error Modem FinTech File Sharing Analysis Heating/Cooling Multi-Factor Security Websites Staff Leominster Break Fix Regulations Apps Time Management Printer Language Value Solid State Drive Cryptocurrency Mirgation Recycling Identity Theft IT solutions Going Green Networking Safety IoT Google Docs Search Black Friday Training Corporate Profile Hacks Device Emergency Remote Computing Cookies MSP Servers Google Calendar Augmented Reality K-12 Schools Cybercrime Network Congestion Dark Web Social Networking Automobile Google Wallet Downtime Network Management Computing Infrastructure Professional Services Hard Disk Drive Bitcoin LED Chatbots eWaste Marketing Star Wars Dell Business Growth PowerPoint Cyber Monday WannaCry Password Mobility Gadgets Writing Nanotechnology Cabling Legal Legislation Wi-Fi Wearable Technology Network upgrade Computers Microsoft Excel Motherboard Cables Google Maps Unified Communications Drones SharePoint Alerts USB Windows 8 Co-Managed IT IT Budget Web Server what was your? GPS Computer Repair Relocation BDR Mobile Data IT Consultant Recovery How To Work/Life Balance Cameras Tracking Mobile Computing Regulation Meetings Health Private Cloud Black Market Cleaning Law Enforcement CCTV Notifications Webcam Electronic Medical Records Twitter Physical Security Emoji Error Upgrades Gadget Printers Crowdsourcing Point of Sale Ben McDonald shares Travel Personal Information Botnet Cortana 3D Printing G Suite Supercomputer CrashOverride Staffing Processors Motion Sickness Machine Learning Virtualization Administrator Unsupported Software Taxes

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3