crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Integrated Business Technologies. Give us a call at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Internet Cloud Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Software Mobile Devices Data IT Support Network Hardware Small Business Communication Server Smartphones Computer VoIP Upgrade Efficiency Business Continuity Google Windows Disaster Recovery Mobile Device Management Innovation Microsoft Office Virtualization Data Backup Tech Term Outsourced IT Miscellaneous Mobile Office Vendor Management Social Media Holiday Gadgets Quick Tips Passwords BYOD User Tips Network Security Android Smartphone Browser Mobile Computing Productivity Internet of Things Windows 10 Managed IT services WiFi Bring Your Own Device Data Recovery Remote Monitoring The Internet of Things Ransomware Best Practice Spam Users Remote Computing Artificial Intelligence Alert Wireless Technology Data Management Save Money Trending Operating System Apple History Gmail Customer Relationship Management Unified Threat Management Encryption Office Collaboration Going Green Content Filtering Firewall App IT Support Router Big Data Analytics Printer Tech Support IT Solutions Lithium-ion Battery Facebook IT Consultant Current Events Information Technology Cloud Computing Managed IT Maintenance Mobile Device Hard Drives Applications Employer-Employee Relationship Website Windows 8 Humor Two-factor Authentication Saving Time Antivirus Paperless Office Avoiding Downtime Phishing Document Management IT service Fax Server Digital Payment Chrome Business Growth VPN Outlook Wi-Fi Risk Management Health Customer Service Government Hacking Marketing Computers Managed IT Services Excel Compliance Phone System Bandwidth Project Management Cybersecurity Automation Apps Office Tips Application Retail Virus Licensing Data Security User Error File Sharing Co-Managed IT PowerPoint Social Networking Healthcare Infrastructure Tablet Office 365 Password iPhone Inbound Marketing Managed Service Administration Regulations Presentation Augmented Reality Files Budget Proactive IT Computer Repair Point of Sale Mouse Recovery Training Money Unified Communications Net Neutrality Running Cable Help Desk Social IBM End of Support Settings Tip of the week LiFi Cost Management Wireless Computing Cybercrime Save Time Wearable Technology Conferencing Hiring/Firing Display Alerts Remote Workers Statistics Intranet Vulnerability Information Competition Business Intelligence Scam Network Congestion Data loss Blockchain HIPAA Recycling eWaste Downtime BDR Redundancy Search Piracy Virtual Desktop USB Business Owner Machine Learning Internet Exlporer Flexibility Hosted Solution Sports Hacker Storage Data storage User Programming Mobility Smart Technology Mobile Security Company Culture Analyitcs Twitter Robot IoT Education Windows 10 Safety Specifications Printing Star Wars Gaming Console Software Tips Managed IT Service Digital Signature Language Virtual Reality Features Geography Asset Tracking Identity Memory Mobile Device Managment Google Calendar Monitors Laptop Utility Computing Break Fix Server Management Computing Infrastructure SaaS Techology Deep Learning Electronic Health Records High-Speed Internet OneNote Documents Legislation Google Wallet Writing Halloween Entrepreneur Dark Web Cooperation Chromebook Disaster Resistance PC Care Cyberattacks Undo Development 5G Employee-Employer Relationship PDF Motherboard Adminstration Value People G Suite Drones eBay Social Engineering Scary Stories Buisness Hard Drive 3D Data Warehousing Patch Management Staff Remote Support IT Consulting Leadership Identities Read Only Cables Skype Modem Streaming Media Travel Software as a Service New Additions Backups Text Messaging CIO Cache Print Server Microsoft Excel Operations Work Station Politics Data Breach Solid State Drive Bookmarks Domains Wires Fun LinkedIn Cookies Meetings Technology Tips Congratulations Legal Video Surveillance Word Management Law Firm IT Windows 8.1 Update Virtual Private Network Scheduling Telephony Technology Laws Alt Codes Favorites Public Speaking Cortana Monitoring Best Available Nanotechnology Comparison Permissions YouTube Enterprise Resource Planning How To MSP IT Technicians Unified Threat Management Typing Instant Messaging Knowledge Environment Screen Reader Identity Theft Black Friday Google Drive Assessment Fraud How To Mobile Bluetooth Proactive Online Currency Mirgation Samsung Access Control Cryptocurrency Google Docs Experience Troubleshooting Smart Tech Debate Cyber Monday IT Management Computer Accessories Consulting Heating/Cooling Managing Stress Remote Monitoring and Management Consumers Business Technology Crowdfunding Private Cloud SharePoint Bitcoin Connectivity Network Management Macro communications Managed Services Provider Enterprise Content Management IP Address WPA3 Migration Public Cloud Downloads Hacks Distributed Denial of Service Disaster Hotspot Touchscreen Networking E-Commerce Refrigeration Vulnerabilities Fleet Tracking Chatbots Sync Multi-Factor Security

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code