Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Telesys Voice and Data. Give us a call at (800) 588-4430.


No comments yet
Already Registered? Login Here
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Windows 10 Computer Managed Service Provider Data Backup Productivity Ransomware Backup Innovation Mobile Devices Business Continuity Outsourced IT Android Hardware Smartphone Google Disaster Recovery Managed IT services Upgrade Social Media Efficiency User Tips Data Recovery Browser Communication IT Support Workplace Tips Data Small Business Cloud Computing IT Support Managed IT Services Business Management Smartphones App Data Management Phishing Holiday Microsoft Office Server Office Remote Monitoring Internet of Things Miscellaneous Facebook WiFi communications Network Paperless Office Office 365 Password Windows Apps Passwords Encryption Cybersecurity Save Money Artificial Intelligence VoIP Tech Term Gmail Big Data Spam Windows 10 Unified Threat Management Document Management Hosted Solution Recovery Apple Robot Employer-Employee Relationship Risk Management Saving Money Collaboration Bandwidth Firewall Customer Relationship Management Content Filtering Chrome Tip of the week Downtime Wi-Fi Avoiding Downtime Office Tips How To Government Customer Service Mobile Device Management Money Analytics Operating System Work/Life Balance Remote Computing Word Hacker Compliance Managed IT Infrastructure Vendor Management Going Green Telephone Systems Alert Applications Printing Data storage Social Windows 7 Health Computing Website Vulnerability Hacking Help Desk Mobile Computing Virtual Reality Data Security Training Tech Support Two-factor Authentication SaaS Settings BYOD IT Management The Internet of Things Computers Mobile Device Antivirus Business Growth Redundancy Presentation Healthcare Project Management Data loss File Sharing BDR Managed Service Education Business Technology Outlook Cybercrime Automation Physical Security Net Neutrality Taxes Proactive IT solutions Smart Technology Safety Retail Botnet Wireless Technology Remote Monitoring and Management Best Practice Samsung HIPAA Software as a Service Patch Management Wireless Lithium-ion battery Solid State Drive Router Mobile Security Scam Business Owner Meetings Identity Theft Storage Marketing Computer Care YouTube Unified Communications VPN Assessment Server Management Competition Licensing LiFi Virtual Private Network Digital Payment Access Control Consultation Information Technology Upgrades Maintenance Automobile Budget Humor End of Support Augmented Reality Laptops Analyitcs Mouse IBM Running Cable Tablet Legal Display Bring Your Own Device Search Specifications Twitter Sports IT service Politics Regulations Monitors Cortana Travel Google Drive Virtualization Administration User Websites Recycling Batteries Typing Lenovo Digital Motion Sickness Tracking Wearable Technology Bookmarks Google Docs Unified Threat Management Buisness Shortcut iPhone Uninterrupted Power Supply Motherboard Voice over Internet Protocol Writing Management Remote Work Personal Information Cryptocurrency Internet Exlporer Superfish Knowledge Spyware IT Consultant Favorites business communications systems Distributed Denial of Service Machine Learning Social Engineering Enterprise Resource Planning File Management Computer Repair Bitcoin Experience data services How To Cleaning WPA3 Notifications IT Technicians Conferencing Internet Protocol Technology Tips Heating/Cooling Managed IT Service Hard Disk Drive Relocation Modem Manufacturing Mobile Telephone Electronic Medical Records Windows 8 Hotspot Google Wallet Networking User Error Firefox Webcam Supercomputer Servers Domains Fleet Tracking PowerPoint Crowdsourcing Mirgation Employees Dark Data VoIP streamlines Comparison Break Fix 5G Entrepreneur Private Cloud Cookies Gadgets IT Budget Company Culture Mobile VoIP Language Drones Printer Application Consumers Point of Sale Public Speaking Asset Tracking Migration Zero-Day Threat business network infrastructure Users Black Friday Dark Web Error Nanotechnology Proactive Maintenance Vulnerabilities Computing Infrastructure Techology Statistics eWaste Software Tips Remote Workers Chatbots Backup and Disaster Recovery Cyber Monday Data Warehousing Mail Merge IoT Processor IT Sevices Web Server Geography Update Alerts Disaster Resistance Laptop SharePoint Hard Drives Bluetooth Environment Information Identity RMM Virtual Desktop flu season 3D Printing Microsoft Excel Address Corporate Profile Administrator Utility Computing Cameras Cables Chromebook Cooperation Proactive IT Halloween Downloads Quick Tips Refrigeration Troubleshooting History Monitoring Law Enforcement Procurement Network Congestion Fort Worth Active Directory Unsupported Software Deep Learning Blockchain Fun WannaCry CCTV Wires Emoji Staff IT Consulting Scary Stories Multi-Factor Security Time Management Mobility Cabling Electronic Health Records Phone System Gadget Remote Worker flu shot Cost Management Windows Server Mobile Data Permissions Hacks Staffing Flexibility Data Breach Google Calendar Network Management Undo Fort Worth IT IP Address Professional Services Hard Drive User Management Alt Codes Fraud Current Events VoIP GPS G Suite Google Maps MSP Processors Operations Cyberattacks Technology Laws Legislation Touchscreen DFW IT Service Mobile Office Disaster Social Networking Virtual Assistant

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...