Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Network Synergy. Give us a call at 203.261.2201.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 22 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Unified Threat Management Phishing Websites Social Engineering Cryptocurrency CCTV Mobile Computing Servers Windows 10 Intranet Access Control Macro BYOD Business Owner Business Continuity Unified Threat Management Antivirus Artificial Intelligence Twitter Lenovo Upgrades Users Battery Gmail Lithium-ion Battery Efficiency Online Currency Money Processors Spyware Disaster Recovery Data Warehousing Microsoft Office Vendor Management Customer Relationship Management Business Growth Virtual Desktop The Internet of Things 3D PowerPoint Ransomware Relocation Hosted Solution Deep Learning Downtime IT service Black Friday Analyitcs Staffing Webcam Productivity Technology Apple PDF SaaS IT Solutions User Windows 8.1 Update Printing Break Fix Private Cloud CrashOverride Business Technology Paperless Office Saving Money PC Care Best Practice Data Management Value Web Server Wi-Fi Data storage Work Station Training Outlook Leadership Backup Website Computer Identity Theft Tip of the week Heating/Cooling Time Management Debate Google Analytics Save Time Hacker Tip of the Week Notifications Tracking Taxes Address iPhone Save Money Hard Drive Excel Disaster Resistance Security Automation Memory Proactive IT Unsupported Software Applications IT budget Mobile Security Google Maps Botnet Electronic Medical Records Cabling Licensing Business Intelligence Best Available Social Networking IT Support Cooperation Chatbots Data Security Productivity Comparison Windows 8 IT Support Printer Document Management Smartphones Gadgets Work/Life Balance Software Tips Word Cloud Digital Payment Black Market HIPAA Mobile Data Touchscreen Social Media Google Docs IT Consulting Computing Hosted Solutions Managed IT Services GPS Mobile Device Password Chromebook Public Cloud Dark Web Google Cloud Computing Cache Identity Data Loss Business Cleaning Computers Innovation Motherboard Domains Print Server Alt Codes Mobile Office Gadget Managed Service Provider Windows 10 Quick Tips Business Computing Marketing Backups Internet of Things Environment Error Application 5G Help Desk Samsung Software as a Service Bitcoin Food Superfish Smart Tech Streaming Media Computer Repair Fax Server Telephone Systems Microsoft Recycling 3D Printing Smart Technology Server Data Computer Accessories File Sharing Virtual Private Network Point of Sale Budget Video Surveillance Hiring/Firing eBay Legal Typing Storage Small Business Microsoft Excel Crowdfunding Vulnerability Star Wars Google Drive Motion sickness Fun Mail Merge eWaste IT Technicians Retail Scam Spam Government Cortana Mobile Technology Regulations Facebook Hacking Remote Monitoring Business Management Virtualization Buisness IT Consultant Patch Management Network LinkedIn Networking Cybersecurity App BDR Router Personal Information IBM Law Enforcement CIO Employer-Employee Relationship Scheduling Service-based Business Writing Email Emoji Corporate Profile Mobile Devices Monitors YouTube Distributed Denial of Service Hacks Big Data Office 365 Managed IT Service Disaster Going Green Supercomputer Unified Communications Recovery Hard Disk Drive Data Breach Firefox Bluetooth Scary Stories Screen Reader Maintenance Uninterrupted Power Supply User Error How To Meetings Administrator Inbound Marketing Consumers Collaboration Text Messaging Virus Bandwidth Health Files Cookies Avoiding Downtime Server Management Compliance Software Sports Connectivity Downloads Education Wireless Technology Holiday Assessment Administration LiFi Humor VPN Solid State Drive Knowledge Conferencing Alert Wearable Technology Physical Security Healthcare Language Customer Service Digital Gaming Console Virtual Reality Google Wallet Permissions Automobile USB Bring Your Own Device Troubleshooting Augmented Reality Remote Computing Start Menu Logs Safety Technology Laws Competition Managed IT Risk Management Shortcut Network Security Presentation Webinar Running Cable Hackers Technology Tips IT Management Public Speaking Congratulations Remote Support Malware G Suite Redundancy SharePoint Legislation Data Backup Display Statistics Cameras Workplace Tips Operating System Specifications Charger Apps Data Recovery Hard Drives Office Tips Laptop Smartphone Network Management Trainging Piracy Search Entrepreneur Migration Identities Tip of the Work Tablet IoT Browser Computing Infrastructure Robot Utility Computing Law Firm IT Drones Information Technology Privacy Internet Exlporer History Flexibility Cybercrime Consultation Chrome Office Sync Network Congestion Trending Multi-Factor Security Hotspot Techology Android Skype Project Management Tutorials Travel Machine Learning End of Support Managed IT services Nanotechnology Programming Internet Windows Computer Care Modem Undo User Tips Thank You Wireless Encryption Two-factor Authentication Current Events Tech Support Firewall Telephony Mirgation IT Services Staff Secruity communications People Best Practices Net Neutrality Infrastructure Google Calendar Halloween Co-managed IT Fraud Upgrade VoIP Mobility Hardware Miscellaneous Saving Time Politics Operations Social Blockchain Documents Content Filtering IP Address Mobile Device Management Cost Management Phone System WiFi Crowdsourcing Tech Term Refrigeration Communication Digital Signature Passwords Mouse Outsourced IT Alerts Experience Cyber Monday Company Culture Settings

      Latest Blogs

      Artificial intelligence is perhaps most commonly known as a malevolent force, thanks to popular culture. HAL 9000, Ultron, and many others have reinforced that A.I. will be the dow...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube