Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Haber Group. Give us a call at 866.625.3560.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Hackers Malware Business Business Computing Internet Computer Hosted Solutions Microsoft Software Backup Windows 10 Ransomware IT Services Network Security Android Mobile Devices Smartphone Google User Tips Data Management Hardware Small Business Productivity Windows Browser Business Continuity Server Gmail Cloud Computing Data Artificial Intelligence Phishing Internet of Things Managed Service Provider App Encryption Facebook Office 365 Upgrade Smartphones Saving Money Efficiency Data Recovery Infrastructure Outsourced IT Social Media Disaster Recovery Word Tip of the week Business Management Managed IT Services Remote Monitoring Workplace Tips Innovation Data Backup Office Tips Microsoft Office Government Spam IT Support Big Data Miscellaneous Money Communication Windows 10 Firewall Customer Service Passwords Apple Two-factor Authentication Settings Content Filtering IT Support Tech Term Robot Risk Management Productivity IT Management Employer-Employee Relationship WiFi Cybersecurity Antivirus Chrome Data storage Bandwidth Business Technology HIPAA Data loss Outlook Automation BYOD IBM Wireless Search Apps Mobile Security Customer Relationship Management Mobile Device Wi-Fi Administration Hacking VoIP Password Scam Mouse Tablet Presentation Vulnerability Avoiding Downtime Hacker Network Office Holiday Storage Wireless Technology VPN Recovery Hosted Solution Data Security Website YouTube Virtual Private Network End of Support communications Server Management Managed IT Services Printing Telephone Systems Save Money Maintenance Virtual Reality Computing Google Drive Augmented Reality Safety SaaS LiFi The Internet of Things Unified Threat Management Monitors Analytics Users Drones SharePoint Router Network Management Social Managed IT Service Sports Managed IT Fraud Education Lenovo Applications Digital Humor Deep Learning Downloads Modem Computer Care Touchscreen Shortcut User Disaster Vendor Management Hacks Break Fix Superfish IT Technicians Spyware Budget sip Writing Bring Your Own Device Multi-Factor Security Cookies Competition Training Patch Management Hotspot Automobile Uninterrupted Power Supply Dark Web Buisness 5G IT solutions Mirgation Paperless Office telephony Retail Best Practice Google Calendar Nanotechnology Language Solid State Drive Net Neutrality Networking Chatbots Cortana How To Marketing Remote Computing IT service Social Engineering Business Growth Legislation Heating/Cooling Downtime Computing Infrastructure Hard Disk Drive Current Events FCC IP Address Legal Identity Firefox Politics BDR Dark Data Alt Codes Comparison Cybercrime Servers Mobile Office Alerts Collaboration Going Green Title II Techology Hard Drives Knowledge Tech Support Google Maps How To Typing Specifications Document Management Mobile Device Management Mail Merge Licensing File Sharing Online Operating System Network Congestion Unified Communications Unified Threat Management Compliance Refrigeration Experience Samsung Websites Cryptocurrency Black Friday Public Speaking Running Cable Identity Theft Statistics Lithium-ion battery Virtual Desktop Address Cooperation Microsoft Excel Computers User Error Regulations Quick Tips Bitcoin Cyber Monday Laptop Bluetooth Staff Corporate Profile Information Technology Blockchain Google Docs Display Fun Printer Social Networking Undo VoIP Windows 8 Smart Technology Halloween Wearable Technology Application WannaCry Gadgets Google Wallet Permissions Access Control Motherboard Virtualization Time Management Cabling Distributed Denial of Service Scary Stories Digital Payment Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security CrashOverride Twitter Gadget Staffing Administrator Personal Information Mobile Computing Web Server Screen Reader GPS Computer Repair Cameras Processors Smart Tech Tracking Health CCTV Alert Connectivity Domains Electronic Medical Records Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Emergency Update IT Consultant Relocation Unsupported Software