crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Integrated Business Technologies. Give us a call at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 19 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions IT Support Business Email Small Business Malware Mobile Devices Network Hardware Software Smartphones Data Communication Windows Server Upgrade Business Continuity Mobile Device Management VoIP Virtualization Microsoft Office Efficiency Disaster Recovery Google Mobile Office Computer Miscellaneous Holiday Vendor Management Gadgets Social Media Android Quick Tips Innovation Mobile Computing WiFi Smartphone Windows 10 BYOD User Tips Best Practice Bring Your Own Device Outsourced IT Passwords Remote Monitoring Browser Trending Operating System Apple Users Spam Internet of Things Wireless Technology The Internet of Things Firewall Content Filtering Remote Computing History Managed IT services Alert Network Security Going Green Information Technology Current Events IT Consultant Data Backup Unified Threat Management Big Data Printer Office Analytics Data Management IT Solutions Save Money Lithium-ion Battery Managed IT Avoiding Downtime Ransomware Maintenance App Hard Drives Artificial Intelligence Customer Relationship Management Gmail Windows 8 Tech Support Humor Facebook Saving Time Apps Application Automation Virus Office Tips Antivirus Retail Phishing Fax Server IT service Digital Payment Outlook Health Business Growth Risk Management Encryption Employer-Employee Relationship Customer Service Marketing Excel Hacking Computers Phone System Data Recovery Collaboration Two-factor Authentication Cybersecurity Budget Proactive IT Training Computer Repair Mouse Recovery Money Net Neutrality Running Cable Social User Error Co-Managed IT Mobile Device VPN PowerPoint Tablet Office 365 Router Password Inbound Marketing iPhone Administration Presentation Business Owner Robot Unified Communications Sports Mobility Printing Hacker User Point of Sale Programming Redundancy End of Support Government LiFi Analyitcs Computing Help Desk Education Project Management Document Management Specifications Safety Settings Licensing IBM Files Wireless Chrome Cybercrime File Sharing Save Time Data Security Wi-Fi Managed IT Services Social Networking Hiring/Firing Display Alerts Applications Website Statistics Scam Intranet Competition Business Intelligence Tip of the week Bandwidth Network Congestion Downtime Hosted Solution Augmented Reality Search Data storage Piracy Virtual Desktop USB Online Currency Samsung Permissions Hacks Experience Troubleshooting Debate Virtual Private Network Computer Accessories SaaS Black Friday Heating/Cooling Access Control Consumers Crowdfunding Fraud Macro Cyber Monday SharePoint Company Culture Twitter Software Tips Internet Exlporer IP Address Monitors Downloads Gaming Console Touchscreen Telephony Smart Technology Deep Learning Refrigeration Disaster Mobile Security Google Wallet Writing Networking Multi-Factor Security Distributed Denial of Service Cost Management Digital Signature Memory IT Support Hotspot Drones Social Engineering Laptop Buisness Wearable Technology Google Calendar Private Cloud Managed IT Service Identities Documents Conferencing Language Backups Halloween CIO Entrepreneur Techology Adminstration Legislation 3D Public Cloud Break Fix PC Care Solid State Drive Undo 5G PDF Value People Data loss Computing Infrastructure Legal eBay Compliance Scary Stories Disaster Resistance Remote Support Sync Dark Web Leadership Alt Codes Skype Streaming Media Windows 10 New Additions Text Messaging Regulations YouTube Print Server IT Consulting Software as a Service Work Station Mobile Device Managment Data Warehousing Typing Domains Fun LinkedIn Scheduling Congratulations Google Drive Video Surveillance How To Word Law Firm IT Data Breach Windows 8.1 Update Technology Tips Recycling Productivity Microsoft Excel Cryptocurrency Public Speaking Cortana Best Available eWaste Google Docs Flexibility Technology Laws Comparison Travel Blockchain Bitcoin Knowledge Environment Vulnerability communications Bluetooth Unified Threat Management

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...