Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Voyage Technology. Give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Phishing Email Workplace Tips Google Computer Collaboration IT Services Users Hosted Solutions Quick Tips Ransomware Mobile Device Cybersecurity Microsoft Small Business Workplace Strategy Data Backup Communication VoIP Saving Money Android Smartphone Business Management Smartphones communications Mobile Devices Data Recovery Backup Passwords Managed Service Managed IT Services Social Media Microsoft Office Upgrade Browser Disaster Recovery Network Tech Term Internet of Things Remote Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Server Managed Service Provider Remote Work Windows Miscellaneous Gadgets Outsourced IT Information Productivity Current Events Encryption Employee/Employer Relationship Spam Holiday Windows 10 Office Government Data Management Business Continuity Compliance Blockchain AI Wi-Fi Windows 10 Training Virtualization Business Technology Data Security Mobile Office Two-factor Authentication Apps Bandwidth Apple Networking App Mobile Device Management Vendor Gmail Chrome Managed Services Employer-Employee Relationship Budget Voice over Internet Protocol Hacker How To BDR Avoiding Downtime BYOD Computing Applications Information Technology Access Control WiFi Office 365 Tip of the week Conferencing Bring Your Own Device Computers Managed IT Services Website Marketing Operating System HIPAA Router Virtual Private Network Risk Management Health Help Desk Big Data Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Scam Customer Service Data loss Windows 11 Cooperation Free Resource Project Management 2FA Windows 7 Going Green Patch Management Excel Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Firewall Display Printer The Internet of Things Paperless Office Infrastructure Monitoring Social IT Support Document Management Remote Workers Telephone Mouse iPhone Hacking Licensing Presentation Entertainment Administration Vulnerabilities Wireless Technology Images 101 Supply Chain Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Word Wireless Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Safety Data Privacy Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Customer Relationship Management Managed IT Service Maintenance Antivirus Sports Downloads Browsers Smartwatch Amazon Education Connectivity IT Social Engineering Break Fix Remote Computing Azure Upload Procurement Mobile Computing Social Network Telework Outsource IT Cyber security Multi-Factor Security Tech CES Environment Tablet IoT Communitications User Media Search Dark Web Alert Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Small Businesses Buisness File Sharing Regulations Dark Data Google Calendar Term Legal Data Analysis IP Address Displays IT solutions Star Wars IT Assessment How To Microsoft Excel Notifications Staff Value Business Growth Gamification Flexibility Organization Outsourcing Travel Social Networking Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Recovery Cortana Alt Codes Content Remote Working Hard Drives Workplace Wearable Technology Memory Health IT Domains Hiring/Firing Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Paperless Typing Refrigeration Co-managed IT Wasting Time Public Speaking Technology Care Trend Micro Network Congestion Specifications Security Cameras Knowledge Physical Security Fraud Google Drive User Error Microchip Lithium-ion battery Internet Exlporer Software as a Service Business Communications Username Scams Managing Costs Entrepreneur Hybrid Work Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Google Docs Unified Communications Database Surveillance Human Resources Bitcoin Network Management Undo Cables Running Cable Tech Support IT Technicians Virtual Machine Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Tactics Development Google Apps Windows 8 IT Maintenance Laptop Websites Mirgation Hypervisor Drones Shopping Business Intelligence Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships SharePoint Addiction Application Shortcuts Management PCI DSS Ransmoware Halloween Chatbots Navigation Lenovo Gig Economy IBM Vendors Screen Reader Writing Distributed Denial of Service Be Proactive Virtual Reality Computing Infrastructure Teamwork Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Workforce Scary Stories Private Cloud Identity Evernote Superfish Bookmark Threats Identity Theft Smart Tech Memes Fun Workplace Strategies Twitter Alerts SQL Server Deep Learning Download Net Neutrality Financial Data Competition Meta Error History

Blog Archive