Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Tekie Geek a call at (347) 830-7322.

Tip of the Week: Don’t Let Your Old Android Device...
Proper Hard Drive Disposal is An Involved Process
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Flash Tablet Blockchain Unified Threat Management Business Computing Reliable Computing Search Accountants Ransomware Passwords Remote Computing Data Backup Productivity Managed Service Provider Relocation Information LiFi Hacking Username Congratulations Business File Sharing data recovery Staten Island PDF Network Congestion computer support Staten Island Project Management Settings Small Business Banking Budget Content Filtering Software License Big Data Backup Patch Management Password Employer Employee Relationship computer support firms Wi-Fi Powerful Technology Solutions managed services Staten Island Government Cybercrime IT Services Mouse Innovation Staten Island computer support Server IT support New York City Computer Device security Training Network Windows XP Sports G Suite Social Media Society Best Practices Memory Antivirus How To Samsung Staten Island IT support Corporate Profile IT Management it support Devices Language Tech Terms Freedom of Information IT support NYC Hard Drive Data storage staten island managed services Administration Google Screen Reader Vulnerabilities Mobile Security Addiction Data Security Regulation Internet Deep Learning Malware Workstations Windows 10 Microchip computer repair Staten Island Apps Word Access Control Legal Audit Managing Stress Google Calendar Excel Outlook Documents IT support Staten Islans Specifications User Tips Meetings Streaming Media Unified Communications Managed IT Services data recovery managed IT services NYC Business Cards WiFi Bandwidth Hard Drive Disposal tech support Staten Isalnd Phishing Knowledge Two-factor Authentication Bluetooth Remote Monitoring Uninterrupted Power Supply Desktop Workplace Tips Email Collaboration Identity Theft Quick Tips Laptop Emails Communication Lithium-ion battery Nanotechnology Social Law Enforcement Piracy managed it services Retail Browser Domains Rental Service IT Consultant Advertising HTML Cloud Computing Help Desk IT consulting firms Maintenance CrashOverride End of Support Saving Money Hack Webcam Network Management Office Hardware Solutions Data Breach Update Multi-Factor Security Physical Security Cryptocurrency Recovery Chromebook Error News Efficiency Virtual Assistant Downtime Download managed IT services staten island Wireless Headphones Black Market Work/Life Balance Cabling Staffing Cybersecurity Cloud computing Staten Island SharePoint Google Drive Monitoring Network Security Office 365 Smartphone Digital Private Cloud VoIP Conferencing Technology Networking Gmail end-user files Mobility computer support Bring Your Own Device Microsoft Office Managed IT Services Mobile Devices Spyware CCTV Disaster Mobile Technology IT consulting firm Worker Data Management Flexibility IT consulting company Customer Resource management IT services NYC IT consulting NYC IT support Processors Experience malware Hard disk today ’s organizations Privacy Company Culture Artificial Intelligence Hiring/Firing Travel Money Data Holiday Monitors Upload Miscellaneous Wireless Equifax Health Paperless Office Backup and Disaster Recovery Cleaning Unified Threat Management Telephony Startup Google Wallet Web Server CryptoLocker Windows 10 Administrator Smartphones Printing Data Protection Augmented Reality Security BDR Running Cable Content Virtualization Proactive IT BYOD Motion Sickness Writing Notifications Managed IT Apple DDoS Tracking Save Money Computer Malfunction Encryption Drones Time Management datto Automation IT consulting Downloads Google Maps Employer-Employee Relationship IT support firms malware worms Managed Service Telephone Systems Start Menu Music Android Securty Television Mobile Device Education Safety Lenovo Machine Learning Tip of the week Computing VPN Comparison Vulnerability Windows 8 Supercomputer Tactics YouTube Hosted Solutions Websites Legislation Management Public Cloud Text Messaging Business Growth IT services Staten Island IT Support Microsoft tech support Staten Island Database Business Continuity Hacker Redundancy eWaste Disaster Recovery Staten Island tech support email scam Mobile Device Management Printer Going Green Windows computer services Staten Island Computer Care Virus Regulations Best Practice Fake News Business Management Trends Google Docs Access Solid State Drive Botnet Customer Service managed services History Staten Island IT consulting Hardware IT consulting Staten island Computing Infrastructure Outsourced IT Gadgets Virtual Desktop Business Technology Facebook App Software Internet of Things Workers Information Technology Firewall Vendor Management Operating System Social Engineering Social Network Automobile Wireless Technology Virtual Reality Telephone computer support NYC Laptops Robot IT support Staten Island ransomware attacks Twitter Accidental deletion Computers Applications Digital Payment Distributed Denial of Service IT consulting Staten Island Cloud Business Metrics Vendor Mangement Cost Management Touchscreen Document Management Tablets Gamification Bitcoin Productivity Scalability Displays In Internet of Things Microsoft Excel SaaS tech support Emergency Multi-factor Authentication Website Cache Business Mangement 3D Printing data loss Tip of the Week IT services New York City Compliance IBM Alert Service Level Agreement Scam Tech Support Visible Light Communication Cortana Thank You computer services communications Office Tips Hosted Solution computer repair Politics VoIP Software as a Service Upgrade The Internet of Things Tech Term Analytics Hackers Taxes Hacks Spam

Newsletter Sign Up