facebook linkedin twitter

Computerware Blog

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Computerware a call at (703) 821-8200.

Tip of the Week: Don’t Let Your Old Android Device...
Proper Hard Drive Disposal is An Involved Process


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 12, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Workplace Tips Network Security Backup Hosted Solutions Managed Service Provider Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration VoIP IT Support IT Support Data Backup Quick Tips Smartphones communications Mobile Devices Network Business Continuity Microsoft Office Gadgets Cybersecurity Social Media Android Data Recovery Disaster Recovery Upgrade Communication Mobile Office Server Phishing Smartphone Virtualization Mobile Device Management Miscellaneous Holiday Vendor Management Ransomware Windows 10 Managed IT Services Windows Outsourced IT Passwords Tech Term Apps Operating System Users Unified Threat Management Mobile Device Remote Monitoring Internet of Things Facebook Automation BDR Remote Computing Apple Data Management Mobile Computing Analytics BYOD Managed IT services Windows 10 WiFi Artificial Intelligence Cloud Computing The Internet of Things Marketing Training History Firewall Browser Save Money Encryption App Alert Big data Help Desk Spam Business Technology Office Information Technology Office 365 Health IT Consultant Two-factor Authentication Bandwidth Maintenance Printer Content Filtering Going Green Budget Access Control Gmail Windows 7 Bring Your Own Device Antivirus Government Managed IT Cybercrime Hard Drives Saving Time Computers VPN Tech Support Cost Management Virus Lithium-ion Battery Information Best Practice Healthcare Wireless Technology Windows 8 Outlook Recovery Managed Service Hiring/Firing Search Employer-Employee Relationship Retail Humor iPhone Hacking Project Management Travel Networking Education IBM Update Phone System Augmented Reality Computing Customer Service It Management Data Security Blockchain Money Data Loss Document Management Remote Work File Sharing Avoiding Downtime Data Breach Covid-19 Password Hard Drive Value Legal Hacker Mobility Twitter Voice over Internet Protocol Intranet Regulations Risk Management Customer Relationship Management Current Events SaaS PowerPoint Wireless Save Time Applications Law Enforcement Downtime Vendor Storage Website Patch Management Administration Compliance Solid State Drive Data storage Conferencing Proactive IT Computer Repair Running Cable Flexibility Social Networking Cryptocurrency Laptop Cortana Monitoring Business Growth Google Maps Digital Websites Social Engineering Management Excel Paperless Office Software as a Service Vulnerabilities Meetings Sports User Net Neutrality Disaster Private Cloud Virtual Desktop Hosted Solution Business Intelligence End of Support Social Wi-Fi Telephony Digital Payment Robot Cooperation Securty DDoS Machine Learning Router Telephone Systems Comparison Tablet Fax Server Scam Company Culture Black Market Word eWaste Professional Services Identity Theft Inbound Marketing Evernote Statistics Google Docs Programming Memory Experience Virtual Assistant Network Congestion Integration Politics Pain Points Monitors Virtual Reality Cleaning Emails Multi-factor Authentication Office Tips Processors Start Menu Tech Terms Automobile Chromebook Managed Services Provider Streaming Media Telephone USB Mobile Technology Presentation YouTube Computing Infrastructure Hack Uninterrupted Power Supply How To Smart Devices How To Unified Communications Settings Download Specifications Safety Vulnerability Managed Services Employee/Employer Relationship Chrome Managed IT Service Bitcoin Co-managed IT Gaming Console User Error Documents Data Protection Microchip Taxes Webcam Entertainment Text Messaging IT service Teamwork Heating/Cooling Distributed Denial of Service Computer Accessories Processor Distribution Downloads Lifestyle Trending Public Cloud Licensing Bluetooth Mouse Redundancy Cost Solutions Public Speaking Data Analysis Touchscreen Employees News Financial Data Skype Devices Deep Learning VoIP eCommerce Electronic Health Records Sync Archive Fraud Tactics Work/Life Balance Consultation SQL Server Notifications CCTV UTM Leadership Content GDPR Knowledge Managing Risk Microserver Memes Adminstration Visible Light Communication Pirating Information Shortcut Managing IT Services Business Metrics Computer Malfunction IT Plan Enterprise Resource Planning Troubleshooting Tech Hypervisor Reliable Computing Point of Contact Legislation IT consulting Error Entrepreneur Technology Tips HIPAA Fileless Malware Hybrid Cloud Fake News Telework Accountants A.I. Environment Audit Holidays Get More Done Surveillance In Internet of Things email scam Addiction Proxy Server Azure Data Warehousing Printer Server Remote Workers CIO Electronic Payment Modem Strategy Turn Key IT Advertising Flash Competition Virtual Private Network Motion Sickness Recycling Migration Staffing Connected Devices Google Wallet Business Owner Term Emergency Hard Drive Disposal Scalability Analytic Wireless Headphones Windows XP Electronic Medical Records Access Transportation Trojan Network Management Society IP Address Directions Display Microsoft Excel Organize FinTech Messenger Tracking Product Reviews Upselling Equifax Fleet Tracking Displays Recording Computer Care Optimization Development Application Dark Web Google Drive Free Resource Windows Server 2008 Data Storage Rental Service Device security MSP Micrsooft Human Resources SSID Read Video Surveillance Procurement Web Server Desktop Saving ZTime Finance Drones Processing Cabling Nanotechnology Social Network Health IT Spyware Mobile Payment Business Cards Service Level Agreement Wasting Time Books Workers Startup Asset Tracking Electricity Logistics Printing Virtual Machines Video Conferencing Administrator Device Management Digital Signature Bookmark Webinar PCI DSS Supercomputer Business Managemenet Harddrive Username Cyber security Communitications Content Management Unified Threat Management Backup and Disaster Recovery Permissions Debate Language Television Supply Chain Management Gamification Google Play Telephone Service Worker GPS Screen Reader Customer Resource management cache Employer/Employee Relationships online Currency External Harddrive Piracy Upload Music Managing Costs Reading Samsung Smart Tech switches Writing WannaCry Microsoft 365 Internet Service Provider Browsers Time Management Freedom of Information Regulations Compliance Employer Employee Relationship HTML Upgrades PDF Corporate Profile Medical IT Trend Micro IT Assessment G Suite Fiber-Optic Database User Tip Assessment Proactive Maintenance SharePoint Remote Working Hacks Physical Security LinkedIn Mobile Security Thin CLient Security Cameras Threats 3D LiFi Ebay Telephone System Best Available Keyboard Banking Botnet Smart Phones Software License Trends Domains Navigation Virtual Machine Tip of the week Relocation Tablets Multi-Factor Security Google Calendar Best Practives Regulation Printers 3D Printing Capital Productuvuty Personal Information Financial Managing Stress CrashOverride