Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Network Synergy. Give us a call at 203.261.2201.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Going Green Applications Smartphones Network Management Mobile Technology Data Warehousing Gmail Health Staffing Sports Display Heating/Cooling Unsupported Software Productivity Fun Scary Stories Phone System Malware Service-based Business Recovery IT budget Cortana Sync 3D Printing Cameras Tip of the Work Private Cloud Mobility Scam Chromebook Google Maps Unified Communications Telephony Best Practices CIO User Error Managed IT Services Customer Relationship Management Conferencing Managed IT Service History Patch Management Business Owner IT Technicians Alt Codes Saving Time Scheduling Laptop Emoji Data Management Windows 8.1 Update Fraud Save Money IT Management Antivirus Disaster Recovery Microsoft CrashOverride Gadgets Cyber Monday Virus Communication Online Currency Hacks Security Windows 10 Fax Server IT Support Hiring/Firing Software as a Service Small Business Business Continuity Print Server Charger Backups Search Data Security Permissions Virtual Reality Current Events Document Management Quick Tips Digital Signature Thank You VPN Law Firm IT Email Training Notifications Intranet Uninterrupted Power Supply Operations Spyware Software Windows 10 Alert Social Assessment Windows 8 Video Surveillance Law Enforcement File Sharing Bitcoin People Data Loss Motion sickness Experience Hacker communications Legal Piracy Humor Outlook Multi-Factor Security Blockchain Processors Food Windows Legislation Business Computing Business Intelligence Hosted Solution Help Desk Taxes Unified Threat Management Solid State Drive Public Cloud Software Tips Internet of Things Printing Language Webcam Money Politics Google Docs Upgrades Competition Proactive IT VoIP Cooperation Risk Management Congratulations Digital IT Consulting Servers Wireless Apps eWaste Telephone Systems Chrome GPS Settings Ransomware Shortcut Microsoft Office Wearable Technology Tip of the Week Vendor Management Personal Information Error Augmented Reality Facebook eBay Bandwidth USB Customer Service Workplace Tips Administration Tech Support Drones Hacking App Cybercrime Save Time Safety Websites Automobile G Suite Relocation Remote Support Information Technology Google Calendar Macro Licensing The Internet of Things PDF Troubleshooting Mobile Device Management Computing How To Trainging Address Phishing Disaster Access Control Cabling Digital Payment Miscellaneous Mobile Data User Tips Wi-Fi Downtime Downloads Crowdsourcing Infrastructure Router Smartphone Office Tips Server Artificial Intelligence Computing Infrastructure Writing Upgrade CCTV Start Menu Efficiency Hackers Point of Sale Cost Management End of Support Halloween Leadership IT Solutions Network Congestion Cleaning Comparison Social Networking Break Fix Password Users Cloud Computing WiFi User Mouse Compliance Twitter Entrepreneur iPhone Avoiding Downtime YouTube Firewall Business Computer Accessories Productivity Virtualization IT service Tracking Skype Computer Repair Hotspot SaaS Black Market Recycling Data Backup Managed IT Unified Threat Management Tip of the week Dark Web Superfish Remote Monitoring Tutorials Project Management Crowdfunding Mobile Device Firefox Inbound Marketing Marketing Domains Google Analytics Web Server 3D Remote Computing Refrigeration Monitors Word Distributed Denial of Service Website Business Growth Excel PC Care Samsung Passwords Cybersecurity Microsoft Excel HIPAA Co-managed IT Hardware Data Breach Environment Network Trending Encryption Computer Care Big Data Managed IT services Alerts Content Filtering Hosted Solutions Internet Exlporer Google Electronic Medical Records Computers Secruity Webinar Nanotechnology Machine Learning Statistics Logs Vulnerability Maintenance Retail Wireless Technology Technology Laws Gaming Console Google Wallet Browser LiFi Techology Innovation Touchscreen Collaboration Knowledge Deep Learning Mail Merge BDR Data Hard Disk Drive Debate Physical Security IT Consultant Printer Black Friday Bluetooth Lenovo Lithium-ion Battery Technology Public Speaking Spam Disaster Resistance Presentation Google Drive Server Management Identity Theft Automation Mobile Office Staff Consumers Cryptocurrency Government Outsourced IT Robot PowerPoint Social Engineering Social Media 5G Memory Education Business Technology Documents Bring Your Own Device Networking Mobile Security Employer-Employee Relationship Programming Battery Best Available Flexibility Travel IBM Time Management Files Data storage Net Neutrality Typing Work/Life Balance Business Management Undo Mirgation Streaming Media Supercomputer Consultation Hard Drives Analyitcs Redundancy Work Station Data Recovery Internet Holiday IP Address Office 365 Backup Company Culture IT Services Regulations Mobile Devices Buisness Specifications Identities Saving Money Mobile Computing Operating System Computer Privacy Virtual Private Network Text Messaging IT Support Two-factor Authentication Corporate Profile Smart Technology Tablet Application Cloud Virtual Desktop Running Cable Android Botnet Paperless Office Administrator Network Security Managed Service Provider Apple Technology Tips LinkedIn BYOD SharePoint Best Practice Value Budget Gadget Meetings Office

      Latest Blogs

      For the modern business owner or executive, making smart business decisions has become a necessity. Margins are small, efficiency is key, and if we were to be completely honest, bu...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube