Network Synergy Blog

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Network Synergy. Give us a call at 203.261.2201.

Mobile Security Showdown: Cellular Network vs. Wi-...
Tip of the Week: Do You Know What Your Android Per...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      3D Password Recovery Digital Payment Social Engineering Help Desk Malware IT Support Virtualization Infrastructure Cortana Online Currency Microsoft Excel IP Address Smart Tech Redundancy Relocation Hardware Black Friday Private Cloud Inbound Marketing Assessment Gmail Mobile Security Backup Specifications Star Wars Touchscreen Service-based Business Hiring/Firing Recycling Office Data Breach Skype Tablet Entrepreneur Management Unified Threat Management Start Menu Distributed Denial of Service Unsupported Software Computers Mobile Computing IT Consulting Automation Cleaning Hacker Information Technology Data Recovery Cost Management 5G IT Technicians Unified Threat Management Work/Life Balance Break Fix Legal Language Battery Cache App BDR Business Social Media Email Motherboard IT Solutions Monitors Flexibility Leadership Typing Notifications Point of Sale Passwords High-Speed Internet Phone System Debate Outlook Current Events Motion sickness Mail Merge Data storage Save Time Cooperation Disaster Recovery Bookmarks Video Surveillance Automobile PDF Printer eWaste Wires Electronic Medical Records The Internet of Things Tech Term Android Finance Going Green Mouse Hackers Quick Tips Regulations Data Loss Smartphone Small Business Tip of the week Humor Security Office Tips Files Smart Technology Analyitcs Privacy Remote Computing Mobile Technology Remote Monitoring Deep Learning Gaming Console Content Filtering Techology Remote Monitoring and Management Virtual Desktop Google Calendar Cyber Monday Enterprise Content Management Public Speaking User Virtual Reality Meetings Windows Conferencing Laptop Tip of the Week Bring Your Own Device Dark Web Business Technology Alerts Data Scheduling SharePoint Troubleshooting Patch Management Cables Facebook Memory Workplace Tips Budget Disaster Resistance Google Docs Uninterrupted Power Supply Wireless Technology Internet of Things Office 365 Digital Signature Business Continuity Gadget Innovation Buisness Managing Stress Networking User Tips Intranet Saving Time How To Scam Mobile Data Ransomware Data Warehousing Utility Computing Best Practice Machine Learning IT Consultant Upgrades Big Data Sports Mobile Device Bluetooth Mobile Device Management Antivirus Text Messaging Tutorials Artificial Intelligence Data Backup Telephone Systems Proactive IT Value Fleet Tracking Windows 8 Consultation Hard Drives IT service GPS Print Server Computer Repair Documents IoT IBM Business Growth Printers Knowledge Computer Accessories Law Firm IT PowerPoint Chromebook Webcam Marketing Trainging Mobile Office Comparison Efficiency Augmented Reality Healthcare Disaster Tracking Mobility Gadgets Communication Staff CCTV Co-managed IT Save Money Macro Best Practices Lithium-ion Battery Productivity Cameras Unified Communications Consulting HIPAA Document Management Avoiding Downtime Telephony Encryption Vendor Management Presentation Hotspot Black Market Downtime Identity Virus Google Analytics Business Computing Supercomputer Government IT Management Network Congestion BYOD Alert Remote Support Hacks Windows 10 PC Care Enterprise Resource Planning Alt Codes Social Business Owner Running Cable Cloud Computing Refrigeration Statistics Modem Superfish Spam Hosted Solution Mobile Devices Technology Crowdfunding Education Fun Two-factor Authentication Data Security Network Management Emoji Time Management Monitoring Phishing Software as a Service Vulnerabilities Wi-Fi Tip of the Work Halloween Health Microsoft Office Fraud Vulnerability Risk Management History LinkedIn Smartphones Computer Care Maintenance Managed Service Screen Reader Google Wallet Saving Money Project Management Cryptocurrency IT Services Public Cloud Digital WPA3 Technology Tips OneNote IT Support Samsung Internet Legislation Firewall Microsoft VoIP IT budget Google Drive USB Printing Charger Customer Service Work Station Robot Mirgation Website Programming Cloud Politics Technology Laws Social Networking Permissions Storage Router Network CrashOverride Managed Services Provider Hard Disk Drive Bandwidth Solid State Drive Customer Relationship Management Paperless Office Hard Drive Virtual Private Network Computing Infrastructure Spyware Hacking Corporate Profile Writing Best Available Twitter Training Shortcut Thank You Software Tips Taxes Blockchain Hosted Solutions Access Control G Suite Error Operating System Webinar eBay Piracy Data Management Chrome Logs communications Outsourced IT YouTube Licensing Chatbots E-Commerce Money Cybercrime Managed IT Employer-Employee Relationship User Error Staffing VPN Food Nanotechnology Computer Lenovo Asset Tracking Employee-Employer Relationship Users Scary Stories Server Mobile How To iPhone Features Physical Security Backups Wearable Technology Instant Messaging Holiday Managed IT services Downloads Connectivity WiFi Collaboration Competition Productivity Firefox Websites Identities Safety Favorites Cybersecurity Cyberattacks Streaming Media Web Server Proactive People Congratulations Application Trending Travel Software Cookies Administrator Miscellaneous Retail Drones Settings 3D Printing Tech Support Multi-Factor Security Google Applications Experience Operations Sync Word Botnet Browser Display Bitcoin CIO Internet Exlporer Managed Service Provider File Sharing Computing Wireless Administration Managed IT Service Excel End of Support Crowdsourcing Migration Business Management Personal Information Domains Compliance Fax Server Secruity Consumers Google Maps Regulation Windows 8.1 Update Information MSP Servers Business Intelligence Read Only Law Enforcement SaaS Geography Processors Server Management Windows 10 Heating/Cooling Address Cabling Upgrade Identity Theft Development Search Environment Network Security Apple Remote Workers Net Neutrality Apps Electronic Health Records Company Culture LiFi Undo Managed IT Services

      Latest Blogs

      The cloud is such an important part of today’s business environment that most organizations use it to some extent, even if it’s just for basic storage needs. However, the cloud nee...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube