crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Integrated Business Technologies. Give us a call at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Backup Hackers Hosted Solutions Malware Mobile Devices Email IT Support Business Small Business Software Hardware Network Communication Server Smartphones Data Upgrade Windows Mobile Device Management VoIP Business Continuity Google Virtualization Computer Efficiency Microsoft Office Disaster Recovery Miscellaneous Mobile Office Vendor Management Innovation Gadgets Holiday Social Media Android Smartphone User Tips Quick Tips Mobile Computing Outsourced IT BYOD Windows 10 Passwords Browser WiFi Network Security Ransomware Best Practice Remote Monitoring Bring Your Own Device Spam Remote Computing Users The Internet of Things Trending Operating System Internet of Things Wireless Technology Data Management Apple Managed IT services Data Backup Going Green History Alert Firewall Content Filtering Tech Support Artificial Intelligence Information Technology Current Events Gmail Managed IT Analytics IT Solutions Save Money Lithium-ion Battery Unified Threat Management IT Consultant Big Data Office Printer Encryption Humor Saving Time Avoiding Downtime Maintenance Hard Drives App Customer Relationship Management Facebook Windows 8 Antivirus Automation Digital Payment Mobile Device Office Tips Retail VPN Risk Management Phishing Apps Application IT service Virus Business Growth Fax Server Phone System Employer-Employee Relationship Outlook Customer Service Health Hacking Computers Collaboration Marketing Excel Two-factor Authentication Router Cloud Computing Data Recovery Document Management Recovery PowerPoint Money Social Networking Infrastructure Running Cable Licensing Tablet Tech Term Training Chrome Project Management Applications Managed IT Services iPhone User Error Co-Managed IT Administration Website Augmented Reality Office 365 Data Security Password Cybersecurity Government Proactive IT Computer Repair Mouse Presentation Inbound Marketing Budget Net Neutrality Social IBM Hacker Compliance Programming User File Sharing Analyitcs Regulations Wearable Technology Education Display Bandwidth Alerts Safety Specifications Redundancy Settings Hosted Solution Wireless Flexibility Save Time Cybercrime Data storage Intranet Help Desk Wi-Fi Paperless Office Hiring/Firing Business Intelligence Data loss Robot Unified Communications Printing End of Support LiFi Statistics Computing HIPAA Piracy Competition Network Congestion Tip of the week Sports Downtime Mobility Point of Sale Search Scam Virtual Desktop USB Business Owner Files Mobile Security Migration Heating/Cooling Downloads Software Tips Legal Distributed Denial of Service Consumers Vulnerability Crowdfunding Private Cloud Alt Codes Hotspot Technology Laws Chatbots Multi-Factor Security YouTube IP Address Managed IT Service Virtual Private Network Public Cloud Typing Conferencing Language Unified Threat Management Identity Refrigeration Google Calendar Disaster Google Drive PC Care Break Fix How To Sync Cryptocurrency Value Computing Infrastructure Access Control eBay Cost Management Legislation Digital Signature IT Support Google Docs Macro Remote Support Leadership Dark Web Memory Mobile Device Managment Skype Bitcoin Streaming Media Laptop New Additions Cooperation SharePoint Text Messaging Motherboard Print Server communications Work Station Data Warehousing Documents Business Technology Productivity LinkedIn Gaming Console Hacks Halloween Congratulations Staff Entrepreneur Video Surveillance Modem Undo Software as a Service Law Firm IT Windows 8.1 Update Recycling 5G Microsoft Excel PDF Networking People Travel Best Available Scary Stories Operations Cookies Technology Tips IT Management Virtual Reality Blockchain Identity Theft Nanotechnology Domains Comparison Windows 10 Monitors Bluetooth SaaS Online Currency Adminstration Deep Learning Fun Permissions Techology 3D Google Wallet IT Technicians Word Computer Accessories Public Speaking Black Friday Writing Cortana Fraud eWaste Disaster Resistance Drones Mirgation Buisness Cyber Monday Server Management Social Engineering Telephony Company Culture Identities Twitter Knowledge Internet Exlporer Environment IT Consulting Backups Storage Scheduling CIO Touchscreen Smart Technology Samsung Debate Solid State Drive Experience Troubleshooting Data Breach

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code