Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Tekie Geek a call at (347) 830-7322.

Tip of the Week: Don’t Let Your Old Android Device...
Proper Hard Drive Disposal is An Involved Process
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Database Malware it support IT support firms Hackers Touchscreen Screen Reader Mobile Devices IBM Knowledge How To Processors BDR Mobile Device Facebook Update Managed Service Data Security Alert Telephone System Proxy Server Blockchain Writing IT support Staten Island Business Cards LiFi Network Management Spyware Internet IT support Staten Islans Browsers Workers Hardware Solutions Google Wallet email scam Antivirus Cloud WiFi Google Maps Web Server Mobility Document Management Bluetooth Upgrade Proactive IT Save Money Search Virtualization Best Practices Management Memory Audit Bookmark Microsoft Excel Cortana Technology Worker Reliable Computing Computer Disaster Recovery Conferencing today ’s organizations Networking Desktop Communication Mobile Device Management Laptops Vendor Management Regulation Excel Rental Service Black Market computer services computer support Staten Island Emails Deep Learning Employer-Employee Relationship Error Computers Virus Accountants Freedom of Information ransomware attacks Server Lenovo Website Telephone Systems Law Enforcement Workplace Tips Unified Threat Management Government Managed Service Provider Legislation Telephone Gadgets Managed IT Services Monitors staten island managed services data recovery CryptoLocker Software License Best Practice Trends Virtual Desktop Staten Island IT support Tracking Machine Learning Business Growth Tablet Software Travel IT consulting Social Media Cloud Computing Supercomputer Windows 10 Computing Thank You Comparison Data Internet of Things Managing Stress Fake News managed services Vendor Mangement Software as a Service G Suite Printers Staffing Information Technology Security Experience Small Business Emergency Chromebook Wireless Headphones IT consulting company Language Going Green Wireless Outsourced IT Google Docs VPN Cabling computer support firms Legal Notifications Botnet Office tech support Staten Isalnd Virtual Assistant Network Downloads Information managed services Staten Island Budget Unified Communications Remote Computing Lithium-ion battery Hacks Staten Island computer support IT Consultant IT support Username 3D Printing Tech Support Health IT Displays Education Word Hiring/Firing Streaming Media IT Services Productivity Operating System Data Backup Business Technology Tech Term IT consulting Staten Island Download HTML Laptop IT consulting Staten island Android CrashOverride Solid State Drive Phishing Politics data recovery Staten Island VoIP Analytics Managed IT Quick Tips Printing Google Calendar Digital Websites Nanotechnology Google Drive Cybercrime Access App Documents User Tips Network Congestion Hosted Solutions Company Culture Artificial Intelligence Business managed IT services staten island computer services Staten Island Drones Uninterrupted Power Supply PDF BYOD Tech Terms Taxes Social Engineering Privacy Flash Device security Tactics Customer Resource management Hosted Solution Smartphones Data Protection Devices Data Management Securty Hacker Microsoft Office Tips The Internet of Things Business Metrics SharePoint Computer Malfunction IT services NYC Big Data Business Management Gamification Saving Time Apple DDoS Wi-Fi Training Television Vulnerability Maintenance File Sharing Cost Management Wireless Technology Virtual Reality tech support Collaboration Encryption Piracy Congratulations Powerful Technology Solutions User Tip Access Control IT Support Windows Multi-factor Authentication Telephony Administration Cloud computing Staten Island Vendor Password Banking Music IT Management Work/Life Balance IT consulting firm Tip of the Week Cache Two-factor Authentication Employer Employee Relationship malware Hard disk Staten Island tech support Relocation Miscellaneous In Internet of Things Applications Start Menu Electronic Medical Records Specifications YouTube Windows 8 IT support New York City Motion Sickness Scam Cleaning Cryptocurrency Distributed Denial of Service Corporate Profile Efficiency Productivity Multi-Factor Security Project Management Firewall Apps Staten Island IT consulting Help Desk Public Cloud Backup and Disaster Recovery Health eWaste Physical Security Downtime Tablets Identity Theft Automation Workstations IT support NYC Business Computing Accidental deletion Meetings VoIP end-user files Unified Threat Management Twitter Social Network Sports Disaster Visible Light Communication Regulations Service Level Agreement Webcam Computer Care IT consulting firms Automobile Remote Monitoring Domains Hack Saving Money Running Cable malware worms Flexibility IT consulting NYC Smartphone Browser Money IT services New York City Samsung Scalability Monitoring Time Management News Entertainment Administrator Private Cloud Hacking tech support Staten Island Patch Management Windows XP computer support Society Office 365 Paperless Office Backup Data Analysis History Social Microsoft Office Gmail Vulnerabilities computer support NYC Equifax Content Filtering End of Support Mobile Technology Customer Service data loss IT services Staten Island Business Continuity Outlook Upload Recovery SaaS computer repair Data storage Cybersecurity Hard Drive Disposal communications computer repair Staten Island Bitcoin Printer Mouse Tip of the week Business Mangement Managed IT Services Settings Digital Payment managed it services Data Breach Advertising Windows 10 Compliance Augmented Reality Microchip Hardware Email CCTV Text Messaging Innovation Passwords managed IT services NYC Google Redundancy Hard Drive Bandwidth Holiday Mobile Security Network Security Addiction Content Safety datto Retail Robot Bring Your Own Device Startup Ransomware Spam Computing Infrastructure

Newsletter Sign Up