Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Haber Group. Give us a call at 866.625.3560.

Mobile Security Showdown: Cellular Network vs. Wi-...
Tip of the Week: Do You Know What Your Android Per...
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Malware Business Internet Computer Business Computing Microsoft Software Hosted Solutions Google Mobile Devices Ransomware Backup Network Security Windows 10 Small Business Android Hardware Smartphone User Tips IT Services Data Management Managed IT Services Tech Term Windows Facebook Browser IT Support Gmail Data Productivity App Cloud Computing Server Business Continuity Saving Money Internet of Things Encryption Microsoft Office Office 365 Upgrade Cybersecurity Phishing Artificial Intelligence Word Smartphones Business Management Disaster Recovery Data Recovery Managed Service Provider Remote Monitoring Efficiency Productivity Office Tips Windows 10 Chrome Data Backup Spam Content Filtering Tip of the week IT Support Big Data Workplace Tips Social Media Government Money Employer-Employee Relationship Infrastructure Managed IT Services Communication Outsourced IT Innovation IT Management WiFi Customer Service Avoiding Downtime The Internet of Things Apple Settings Two-factor Authentication Analytics Data storage Vulnerability Website Bandwidth YouTube Antivirus Miscellaneous communications Risk Management Robot Wireless Firewall Applications VoIP Passwords Presentation Augmented Reality Mouse Vendor Management Save Money Telephone Systems Safety Maintenance Network Mobile Device LiFi Office Wireless Technology Virtual Reality Hacker Scam Recovery Storage Hosted Solution Tablet Paperless Office SaaS Outlook VPN Monitors Holiday Search Unified Threat Management Apps Data Security HIPAA IBM Data loss Business Technology Printing Virtual Private Network Automation Administration Hacking End of Support BYOD Customer Relationship Management Wi-Fi Computing Server Management Password Mobile Security Google Drive Bitcoin Network Congestion Online IoT Computer Care Unified Threat Management Downloads IT Technicians File Sharing Wires Disaster Shortcut Break Fix Cookies Samsung 5G Spyware Superfish Information Technology Cooperation Solar Statistics Best Practice telephony Undo Halloween Address Writing Hotspot Professional Services Websites Identity Theft Cortana Work Google Docs Marketing Black Friday Regulations Patch Management Windows 8 Computers Microsoft Excel Star Wars Training Fun Quick Tips User Error Gadgets Application Multi-Factor Security Mirgation Voice over Internet Protocol Uninterrupted Power Supply Dark Web Nanotechnology Downtime Google Wallet Staff Automobile Business Intelligence Bluetooth Business Growth Virtualization Scary Stories Corporate Profile Current Events Retail Language USB Optimization Cyber Monday Social Networking Solid State Drive Display Blockchain Cost Management VoIP Legal Users Google Calendar Chatbots IP Address Cybercrime FinTech Net Neutrality Screen Reader How To Networking Drones Printer Wearable Technology Company Culture Alt Codes Dark Data Sports WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling IT service Heating/Cooling Hard Drives Smart Technology Motherboard Remote Computing Hard Disk Drive Social Permissions Assessment Education Time Management Legislation Identity Mobile Office MSP FCC Smart Tech Firefox Access Control Managing Stress Cabling Typing User Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste BDR Servers Deep Learning Humor Refrigeration Distributed Denial of Service Router Development Hacks Public Speaking Fraud Internet Exlporer Politics Network Management Operating System Comparison Chromebook Mobile Device Management Running Cable Competition Title II Connectivity Virtual Desktop Techology Budget SharePoint Collaboration Cables Managed IT Cryptocurrency Modem Buisness Digital Lenovo How To Licensing Continuity Google Maps Bring Your Own Device sip Managed IT Service Laptop Charging Mail Merge Value Tech Support Document Management IT solutions Smart Office Touchscreen Specifications Compliance Lithium-ion battery Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel Notifications G Suite CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget Domains GPS Update IT Consultant Unsupported Software Computer Repair Processors Cameras Relocation Tracking Meetings Cleaning Mobile Data Health Alert CCTV Private Cloud Emoji Webcam