Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Prosper Solutions a call at (617) 369-9977.

Tip of the Week: Don’t Let Your Old Android Device...
Proper Hard Drive Disposal is An Involved Process
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, October 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Artificial Intelligence LiFi Knowledge Disaster Recovery Relocation Project Management Current Events IP Address Networking Pain Points Proactive IT Bookmark HIPAA MSP Citrix Xenapp Disaster Cost Augmented Reality Micrsooft Nanotechnology Mobile Computing Business Computing Data Security Distribution Marketing Solid State Drive Data Loss Compliance Touchscreen iPhone Gmail Business Growth Technology Tips IT Management Meetings Username Technology Startup Entertainment Paperless Office User Error Productuvuty Office Specifications Computer Accessories Password Data Recovery Analytic Phone System Healthcare Electronic Medical Records Society outsource cloud computing Running Cable Cost Management Access Control Web Server Proxy Server switches Desktop Patching Workplace Tips Government Motion Sickness Fraud Network Security Customer Resource management cloud computing Microsoft Excel Managed Service Wireless Headphones Smartphones Evernote Two-factor Authentication Update Mobility the Internet of Things Windows Processors Audit Entrepreneur Distributed Denial of Service Virtualization Managing Stress Hackers Accountants Legislation Windows10 Tracking G Suite Network Flash Trending VPN Storage Remote Monitoring Advertising Browser Mobile Device Management File Sharing Vulnerabilities Error Skype uptime Office Tips Holiday Spyware Data Management cyber security Fleet Tracking BYOD IT Consultant Hacker Reliable Computing Cybersecurity Monitoring Robot Google Wallet Bata Backup User Tips Time Management Virtual Desktop Excel Business Mangement Software Vendor Mangement IBM Apps Experience Document Management Administrator Music Mouse BDR Digital Payment Legal Productivity Deep Learning News Collaboration SharePoint WannaCry Corporate Profile Small Business cloud Smartphone Hacking Human Resources Word Virtual Reality Hard Drives Read Search clout services Computer Repair Innovation Physical Security Bitcoin Bandwidth Backup Best Practices Backup and Disaster Recovery Browsers IT Tech Support Business Technology Website Efficiency Business Intelligence Apple Internet of Things Cleaning Emergency Printing Avoiding Downtime VoIP Software as a Service Programming Intranet Settings Travel Server Equifax Best Practice Maintenance Productivity Download Bring Your Own Device Remote Computing Supercomputer Customer Relationship Management Automobile Mobile Devices Migration Alert Drones Device security Windows 7 In Internet of Things Work/Life Balance Windows Server 2008 Teamwork Vendor Management How To Health Customer Service USB Mobile Technology Tech Term Help Desk Workers Data Warehousing Information Big data Websites Business Owner Machine Learning Regulation Telephone Systems YouTube email scam Private Cloud Telephone System Application cloud storage Social Network Data Backup Ransomware Business Metrics Competition Windows 8 Start Menu Documents Administration Gaming Console Unified Threat Management outsource cloud storage IT Services Screen Reader Google Drive Redundancy History IT Plan Computer Care User Tip Unified Threat Management Presentation Google Maps Upgrades Uninterrupted Power Supply Dark Web eWaste Addiction Environment Microsoft Wireless Data Analysis Memory Gamification User Managed IT Services Hosted Solution Chromebook Google Employer-Employee Relationship Safety Mobile Device CCTV Passwords Twitter Social Media Public Speaking Save Time Fiber-Optic Freedom of Information Database Inbound Marketing Encryption Text Messaging Windows 10 Tip of the week Applications Sports Keyboard Management Business Cards Smart Tech Computing Electronic Payment Communication Virus Managed Service Provider Managed IT services Wireless Technology Tactics Bluetooth CIO Information Technology Going Green Windows 10 Managed IT Microsoft Office Data Software License Politics Consultation Windows XP Visible Light Communication Rental Service Hack Devices Computers VoIP Cabling Chrome Privacy A.I. IT service Congratulations Emails Assessment Outlook Office 365 Patch Management Troubleshooting Botnet Spam Messenger Co-Managed IT App Company Culture Retail Taxes Data storage 3D Printing Black Market CrashOverride Access Capital Worker Notifications Cryptocurrency Saving Time Gadgets IT consulting Save Money Telephone Business Upload Multi-Factor Security Quick Tips End of Support Language Content Internet Value DDoS Books Hard Drive Disposal Risk Management Statistics Sync Vendor Flexibility PDF Writing Cache Health IT Digital Social Networking Laptop Data Breach Samsung Computer Service Level Agreement Connected Devices Network Congestion Business Continuity Securty Business Management Computing Infrastructure Television Google Docs Monitors Wi-Fi UTM Analytics Miscellaneous Net Neutrality Domains Tablet Saving Money Vulnerability WiFi Facebook Hosted Solutions Reading Social Engineering Social Antivirus Outsourced IT Regulations Heating/Cooling Enterprise Resource Planning Public Cloud Electricity Data Protection Streaming Media Education Displays Tech Terms Scalability Webcam Trends Training communications Router Budget Hacks Banking Thank You Cortana Automation Product Reviews Lithium-ion battery Shortcut Downloads Downtime Conferencing Cybercrime Tablets Content Filtering Network Management Asset Tracking Law Enforcement Computer Malfunction Android HTML Tip of the Week Google Calendar Unified Communications Finance Permissions Money Email IT Support Printers Employer Employee Relationship Firewall Virtual Assistant Staffing Operating System Malware Comparison SaaS Security Recovery Scam Multi-factor Authentication IT Support Hiring/Firing Digital Signature hardware Best Available Identity Theft Piracy Telephony Printer Hard Drive Upgrade Microchip Phishing Fake News Licensing Mobile Security Blockchain Mobile Payment PowerPoint

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150