Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Haber Group. Give us a call at 866.625.3560.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 January 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Hackers Privacy Malware Email Business Internet Microsoft Hosted Solutions Computer Business Computing Windows 10 IT Services Backup Android Ransomware Software Smartphone Small Business Google User Tips Productivity Hardware Network Security Windows Data Management Mobile Devices Data Browser Phishing Business Continuity Internet of Things Facebook App Office 365 Upgrade Saving Money Smartphones Gmail Cloud Computing IT Support Word Artificial Intelligence Data Recovery Managed Service Provider Outsourced IT Encryption Workplace Tips Tip of the week Managed IT Services Remote Monitoring Efficiency Microsoft Office Big Data Office Tips Miscellaneous Data storage Social Media Cybersecurity Money Firewall Government Customer Service Disaster Recovery Two-factor Authentication Server Apple Windows 10 Settings Content Filtering Employer-Employee Relationship Robot Risk Management WiFi IT Support Innovation Productivity Spam Telephone Systems Save Money Chrome Maintenance Analytics IBM Wireless SaaS Bandwidth Apps Data Backup Outlook Customer Relationship Management Hacking Antivirus Wi-Fi Search Unified Threat Management Monitors Passwords Administration Presentation Automation Hacker VoIP Avoiding Downtime Office Password Mouse Wireless Technology Recovery Mobile Device Network Hosted Solution Scam Tablet YouTube Vulnerability communications Holiday Business Management Printing Safety Virtual Private Network Computing Google Drive End of Support The Internet of Things Managed IT Services IT Management LiFi Halloween Black Friday Statistics Users Websites Windows 8 Google Wallet Virtual Reality Microsoft Excel Address Quick Tips Computers User Error Scary Stories Cyber Monday Bluetooth Drones Blockchain Corporate Profile VoIP Display Printer User Sports Smart Technology Social Education Permissions Competition WannaCry Time Management Humor Deep Learning Access Control Distributed Denial of Service Digital Payment Cabling Hacks 5G Budget Business Technology Data loss Network Management sip BYOD Bring Your Own Device SharePoint Buisness Managed IT Service Managed IT Fraud Marketing Infrastructure IT solutions Lenovo Digital Computer Care Touchscreen telephony Best Practice Communication IP Address Downloads Break Fix Shortcut Mobile Security Disaster Vendor Management Website Cortana Superfish Spyware Training Storage Business Growth Writing Mobile Office Multi-Factor Security Downtime Dark Web Hard Drives Patch Management Hotspot Automobile Uninterrupted Power Supply Current Events Legal Dark Data Alt Codes Retail Mobile Device Management Cybercrime Google Calendar Net Neutrality Refrigeration Language Solid State Drive Going Green Public Speaking Knowledge Networking How To Legislation Heating/Cooling IT service Typing Social Engineering Lithium-ion battery Augmented Reality FCC VPN Computing Infrastructure Hard Disk Drive Firefox Operating System Unified Communications Experience Data Security Comparison Servers Politics BDR Cryptocurrency Running Cable Fun Virtual Desktop Title II Undo Alerts Collaboration Techology Specifications Application Server Management Gadgets Google Maps Bitcoin How To Laptop Information Technology Online Virtualization Mail Merge File Sharing Google Docs Samsung Network Congestion Unified Threat Management Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update Emergency IT Consultant Relocation Unsupported Software Chromebook Meetings Cleaning Private Cloud Mobile Data Emoji Webcam Work/Life Balance Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Twitter Domains Paperless Office CrashOverride Staffing Gadget Administrator Personal Information Remote Computing Web Server GPS Computer Repair Processors Cameras Tracking Health CCTV Alert Document Management Tech Support Electronic Medical Records Licensing