Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Voyage Technology. Give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Efficiency Phishing Privacy Workplace Tips Computer Google Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Communication Small Business Smartphones Mobile Device Workplace Strategy communications Android Business Management Mobile Devices VoIP Saving Money Smartphone Managed IT Services Microsoft Office Managed Service Browser Data Recovery Social Media Passwords Upgrade Network Backup Disaster Recovery Tech Term Internet of Things Automation Remote Cloud Computing Covid-19 Remote Work Managed Service Provider Artificial Intelligence Server Facebook Miscellaneous Windows Encryption Gadgets Spam Outsourced IT Employee/Employer Relationship Holiday Windows 10 Information Government Data Management Business Continuity Windows 10 Wi-Fi Business Technology Blockchain Productivity Current Events Virtualization Compliance Two-factor Authentication Apps Bandwidth Data Security App Mobile Device Management Gmail Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Budget Networking Office Vendor Apple Mobile Office Computing Conferencing Access Control Information Technology Office 365 Hacker How To BDR Avoiding Downtime Applications Website Marketing BYOD Help Desk Operating System Virtual Private Network Training WiFi Health Risk Management Big Data Analytics Office Tips Retail Augmented Reality Computers Storage Password Managed IT Services HIPAA Router Bring Your Own Device Patch Management Save Money Remote Monitoring End of Support Vulnerability Going Green Vendor Management Monitoring Firewall Display Cybercrime Printer Paperless Office Windows 11 The Internet of Things Infrastructure Telephone Remote Workers Social Excel Healthcare Tip of the week Document Management Cooperation IT Support Free Resource Project Management Customer Service Windows 7 Scam Data loss Microsoft 365 AI Solutions Processor Robot Employees Mobile Security Integration Word Smart Technology IT Management Meetings Settings Holidays VPN Wireless Printing Data Storage Content Filtering Saving Time Safety Computer Repair YouTube Video Conferencing Managed Services Provider Managed IT Service Cryptocurrency Virtual Machines Professional Services Downloads 2FA Supply Chain Licensing Virtual Desktop Entertainment LiFi Data storage Machine Learning iPhone Outlook Vulnerabilities Customer Relationship Management Maintenance Money Telephone System Cost Management Antivirus Humor Images 101 Hacking Multi-Factor Authentication Mobility Presentation Sports Data Privacy Mouse Wireless Technology Modem User Tip Administration Best Practice Database Trend Micro Shortcuts Security Cameras Travel Techology Google Maps Recovery Buisness Software as a Service Ransmoware IT Technicians Vendors Cookies Managing Costs Cyber Monday Hard Drives Legal Proxy Server IT solutions Unified Threat Management Business Growth Tactics eCommerce Be Proactive Hotspot SSID Domains Virtual Assistant Unified Threat Management Surveillance Workforce Mirgation Threats Nanotechnology Cortana Virtual Machine Refrigeration Alt Codes Network Congestion Reviews Addiction Workplace Strategies Language Medical IT Public Speaking Transportation User Error Lithium-ion battery Physical Security Management Downtime Development Meta Chatbots Hosted Solution Amazon Screen Reader Hypervisor Distributed Denial of Service Entrepreneur Point of Sale Typing Shopping Service Level Agreement Optimization Computing Infrastructure PowerPoint Employer/Employee Relationships Outsource IT Identity PCI DSS Environment Smart Tech Knowledge Media Navigation Network Management Undo Google Drive Tech Support Bookmark Monitors Gig Economy Download Alerts 5G Teamwork Internet Service Provider Small Businesses Browsers Unified Communications Regulations Compliance Displays Connectivity Experience Break Fix Evernote Google Docs Websites Bitcoin Upload Running Cable Memes SQL Server SharePoint Multi-Factor Security Application Google Wallet Electronic Medical Records Social Network Net Neutrality Outsourcing Financial Data IoT History Dark Web Windows 8 Writing Smartwatch Trends Laptop IT Workplace Lenovo IBM Regulations Azure Google Calendar Drones Virtual Reality Customer Resource management Procurement Hiring/Firing Data Analysis Telework Star Wars Cyber security Paperless Microsoft Excel Tech Server Management Private Cloud Identity Theft CES Gamification Halloween Communitications Co-managed IT Staff Superfish Social Networking Legislation Twitter Supply Chain Management Technology Care Fileless Malware FinTech Business Communications Term Competition Error Hacks Social Engineering Content Scary Stories IT Assessment Scams Wearable Technology Hybrid Work Motherboard Fun Value Comparison Remote Computing Health IT Flexibility Directions Deep Learning Organization Assessment Human Resources Permissions Tablet User Digital Security Cameras Smart Devices Cables Memory Specifications Alert Education Remote Working Microchip Dark Data Internet Exlporer Data Breach Google Apps Fraud Google Play Managed IT File Sharing IP Address Mobile Computing How To Videos Username Electronic Health Records IT Maintenance Business Intelligence Search Wasting Time Black Friday Notifications

Blog Archive