Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Prosper Solutions has been serving the Chelsea area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Prosper Solutions a call at (617) 369-9977.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Bitcoin Competition iPhone Business Continuity Username Computer Phone System Phishing Writing WiFi Samsung Keyboard PowerPoint Data Warehousing Network Management Business Intelligence Training Hard Drive Wi-Fi Bata Backup Social Media Identity Theft Electricity Windows 8 Recovery Backup and Disaster Recovery Tip of the Week Product Reviews Fake News Skype Information Content Filtering Devices Proactive IT In Internet of Things Lithium-ion battery Congratulations Outlook Nanotechnology Data Backup Hard Drive Disposal Supercomputer Analytics Data App Application Remote Monitoring Conferencing Website Audit Browser Travel Connected Devices Workplace Tips Uninterrupted Power Supply switches Hack Blockchain Windows10 Data Loss communications YouTube Password Pain Points Technology Communication Multi-Factor Security Finance Apps Digital Signature Remote Computing Alert Streaming Media MSP Word Cabling Equifax Web Server Managed Service Provider Smartphone Permissions Cleaning Securty uptime Outsourced IT Printer Hacking Processors Fraud Distributed Denial of Service Consultation Computer Accessories Managed IT services Webcam Applications Mobility cloud storage IT Plan Mobile Device Tech Terms Corporate Profile User Storage Screen Reader Enterprise Resource Planning Heating/Cooling Computing Infrastructure Update Encryption Big data Google Data storage Service Level Agreement Windows 7 Upload Micrsooft Rental Service CrashOverride Relocation Ransomware Television Maintenance Bandwidth Vendor Mangement Public Cloud Search Bring Your Own Device Email Unified Threat Management Reading Citrix Xenapp Flexibility outsource cloud storage Two-factor Authentication Network Congestion Twitter Hosted Solution Websites File Sharing Passwords Presentation Innovation Virus Troubleshooting Deep Learning HIPAA Holiday Statistics Content Messenger Google Wallet Current Events Addiction Entrepreneur Workers Firewall Microsoft Hackers Experience Specifications Windows XP Data Protection Monitoring Solid State Drive Compliance Physical Security email scam Managed IT Data Management Risk Management the Internet of Things cloud Unified Threat Management Memory Legislation Budget Books Business Growth Social Engineering Business Technology Office Tips Work/Life Balance Motion Sickness Tactics Regulations Data Breach USB Gaming Console Licensing clout services Avoiding Downtime Privacy Evernote Saving Money Entertainment Productivity Vulnerability hardware Small Business Gmail Music Android Employer-Employee Relationship Microchip cyber security Business Mangement Taxes Business Owner Mobile Devices Antivirus Help Desk Running Cable Google Drive Black Market Database VoIP Intranet Healthcare outsource cloud computing Gamification Device security Hacker Bluetooth Private Cloud Mobile Device Management Efficiency Piracy Migration Language Machine Learning Google Docs Environment CCTV Printing Mobile Security HTML Law Enforcement Fiber-Optic Chromebook Networking Virtualization IT Services BYOD Legal Save Time Visible Light Communication Digital Payment Emergency Startup Telephony IT Support Facebook Excel Assessment Security Desktop Chrome Google Maps Miscellaneous Network Vulnerabilities Worker Best Available Automation Spyware Telephone Systems IT Analytic Human Resources cloud computing Office IP Address Scalability 3D Printing Business Metrics Malware Augmented Reality Patch Management Computer Repair Wireless Technology Windows 10 Robot Save Money Thank You Google Calendar Programming Redundancy Computing User Tips Business Management Accountants Access Control Public Speaking Tablets Flash News Cryptocurrency Project Management Safety Unified Communications Administrator Touchscreen Disaster Recovery Apple Access Multi-factor Authentication Administration Banking VoIP Internet Business Computing Mobile Technology G Suite Data Recovery Staffing Managing Stress Collaboration Disaster Hiring/Firing Software as a Service BDR IT service Displays Sports Going Green Tech Term Teamwork SharePoint Freedom of Information Best Practices Comparison Meetings Monitors Managed IT Services Computer Malfunction Quick Tips Automobile Start Menu Office 365 Laptop Cost Management LiFi Domains Windows Server 2008 Advertising Router VPN Virtual Desktop Text Messaging Virtual Assistant Time Management SaaS Windows Gadgets Server Digital DDoS Scam Cybercrime CIO Document Management Capital Business Cards Software Money Upgrade Operating System Data Security History Net Neutrality Cache Tech Support Trends Mobile Computing Retail Virtual Reality Information Technology Read Education Settings Download Mobile Payment Best Practice Social Networking Smartphones Downtime Customer Service End of Support Vendor Management How To Computer Care IBM Microsoft Office Tablet Technology Tips Backup Sync Mouse Company Culture Trending User Error Microsoft Excel Tip of the week Drones Emails Internet of Things Co-Managed IT Hard Drives Downloads eWaste Value Productuvuty Botnet Upgrades Paperless Office Tracking Reliable Computing Smart Tech Government Patching Politics Customer Relationship Management Cortana Cybersecurity Software License Spam Health Employer Employee Relationship Hosted Solutions Business Artificial Intelligence Productivity PDF Inbound Marketing Electronic Payment Notifications Marketing Documents Shortcut Knowledge Social IT Support WannaCry Saving Time IT Management Management Windows 10 Society Hacks Network Security Wireless IT consulting UTM Computers Wireless Headphones IT Consultant

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150