Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Tekie Geek has been serving the Staten Island, Brooklyn, Queens, Bronx, New York City, Long Island and New Jersey area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Tekie Geek a call at (347) 830-7322.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tech Terms Data Protection Workplace Tips Excel Documents Recovery Outlook Communication managed IT services NYC Browser Remote Monitoring it support Spam computer support Staten Island Google Wallet IT support Staten Islans Deep Learning Mobile Device Management YouTube Technology Language Telephony Motion Sickness Twitter Business Computing SaaS How To VoIP Automobile BYOD Cybercrime data recovery Hardware Downtime Virtual Assistant Windows XP Safety tech support Staten Isalnd Business Continuity Displays Best Practice Big Data computer support firms Legal Upgrade G Suite Public Cloud Internet Gadgets Virtual Reality Private Cloud communications Meetings Streaming Media Lenovo Health Social Media Automation Settings Patch Management Network Congestion Managed IT Hardware Solutions Vendor Mangement Maintenance Webcam Cache End of Support Staffing Fake News Uninterrupted Power Supply Wi-Fi Congratulations In Internet of Things Backup Robot Banking App computer support NYC Drones Experience Smartphones Hard Drive Disposal Proactive IT Thank You Government Taxes Digital Customer Service Domains Access Download Microsoft Office Data Management data recovery Staten Island Mobile Technology IT consulting NYC Staten Island IT consulting Lithium-ion battery Audit IT Support Mobile Devices computer support Accidental deletion Managed IT Services CryptoLocker Knowledge Cloud Computing Money Hacker Hard Drive Laptops Augmented Reality Web Server Business Mangement Bring Your Own Device Virtualization Tip of the week PDF IT consulting Staten Island Password Efficiency Social Engineering SharePoint Flash Emergency malware Hard disk Education managed services Save Money Printer ransomware attacks Cloud computing Staten Island staten island managed services Business Management Hacks Virtual Desktop Printing Ransomware Network Security Help Desk Data Security Business Metrics Microchip Productivity IT support Staten Island eWaste Tech Support Start Menu malware worms Windows 10 IT services NYC Cost Management Outsourced IT tech support Windows 10 Mobile Security Innovation computer repair Staten Island Passwords Cybersecurity Smartphone IT consulting Staten island Tracking computer repair Black Market Data Breach Social IT support firms IT consulting firm Vulnerabilities Memory Staten Island computer support Quick Tips Apple IT services Staten Island Writing Employer-Employee Relationship Time Management Small Business Bluetooth Downloads Touchscreen Samsung Two-factor Authentication managed it services Tip of the Week Google Docs Computer datto LiFi Applications Disaster Recovery VPN Scam Managed Service Provider Solid State Drive Google IT Services Rental Service Windows Unified Threat Management Productivity Administration Chromebook Notifications CCTV Computer Care Computer Malfunction Bitcoin Business Growth DDoS Data storage User Tips Networking Firewall Budget Travel Work/Life Balance Analytics Network Update Encryption managed IT services staten island Microsoft Excel Server Operating System Specifications Digital Payment Bandwidth Hiring/Firing Tablets Law Enforcement Supercomputer History Collaboration Android end-user files today ’s organizations email scam Retail Wireless VoIP CrashOverride Privacy IT support NYC Securty Comparison computer services Staten Island Email Computing IT consulting firms IT support New York City Compliance Powerful Technology Solutions Workstations Company Culture Distributed Denial of Service Hosted Solutions Reliable Computing Virus Advertising Computing Infrastructure IT Consultant Music Holiday Cortana Society News managed services Staten Island Hack Word Software License Staten Island tech support Telephone Systems Paperless Office Phishing Document Management Hackers Hosted Solution Saving Money Vendor Management Search Scalability 3D Printing Processors File Sharing Antivirus Office 365 Apps Sports Project Management IT consulting WiFi Website Best Practices Physical Security Text Messaging Tablet Cleaning Laptop Training Business Technology Flexibility Internet of Things computer services Gmail Administrator Software as a Service Security Unified Communications Desktop Politics Workers Spyware Business Cards Information Technology Running Cable Corporate Profile Mobile Device IT Management Disaster Microsoft Employer Employee Relationship Monitors Freedom of Information Business Redundancy Google Maps Google Drive Content Filtering Google Calendar tech support Staten Island Machine Learning Remote Computing Office IT services New York City Artificial Intelligence Staten Island IT support Data Cloud Cabling IT support Blockchain Data Backup Cryptocurrency data loss Identity Theft Vulnerability Piracy Unified Threat Management Software Wireless Technology The Internet of Things Botnet Office Tips Windows 8 Miscellaneous Alert Television BDR Relocation IT consulting company IBM Facebook Access Control Websites Visible Light Communication Managed IT Services Mobility Malware Mouse Hacking Worker

Newsletter Sign Up