Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Prosper Solutions a call at (617) 369-9977.

Tip of the Week: Don’t Let Your Old Android Device...
Proper Hard Drive Disposal is An Involved Process
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

How To Inbound Marketing cloud Encryption Electronic Payment Network Management GDPR Blockchain Reading Staffing Legislation Navigation Augmented Reality Robot Data Technology Tips Twitter Entrepreneur Data Security Reliable Computing Telephone Bandwidth clout services Training Managed IT Services IT Management Upload Hosted Solutions Document Management Paperless Office Taxes Multi-factor Authentication Co-Managed IT Word Managed IT Service User Error IT service Society Relocation Content Mobile Device Business User Tips IP Address Sports Settings Information Technology Licensing Google Play Comparison cloud computing Risk Management Data Warehousing HIPAA Innovation Windows XP Computer Disaster Mobile Computing Rental Service Tactics Current Events Tech VoIP Skype Solid State Drive Micrsooft VPN Physical Security Trends Trending Desktop Hiring/Firing Passwords Bitcoin A.I. Teamwork Bookmark Safety Advertising Flash Communication Government Printing Budget Save Money Administration Automobile Touchscreen Storage Quick Tips Administrator Mobile Technology IT Congratulations PDF cloud storage Assessment Start Menu Users Apple outsource cloud computing Writing Technology hardware Pain Points Monitoring Saving Time Competition Smart Tech Miscellaneous Outlook Firewall Chrome Information Scam Specifications Business Cards Access Managing Stress Processing Best Available In Internet of Things Business Mangement Upgrades Devices Cabling Access Control Data Breach Workplace Tips Audit Windows Text Messaging Displays Business Continuity History Google Maps outsource cloud storage Time Management Experience Office Employer-Employee Relationship Computing Infrastructure Virtual Desktop Social Smartphone Music Gamification Vulnerabilities Electricity Company Culture Help Desk Computers Managed IT Machine Learning Internet of Things Unified Communications BYOD Phone System Drones Net Neutrality Environment Apps Programming Addiction Server Collaboration Privacy Error Spam Processors Username Managed Service Provider Data Loss Social Networking Software License Cryptocurrency Analytics Keyboard Nanotechnology Statistics Enterprise Resource Planning Spyware Device security Compliance Tablet Fileless Malware Computer Accessories CCTV Private Cloud iPhone Big data Google Calendar Virtual Assistant Business Computing Hacking Unified Threat Management Customer Relationship Management Holiday the Internet of Things Chromebook Antivirus cyber security Bluetooth Two-factor Authentication Documents Lithium-ion battery Marketing Citrix Xenapp Virtualization Facebook Tablets Productivity Project Management PowerPoint Windows10 Health IT Consultant Windows 7 Applications Tip of the Week Intranet Redundancy Browser Fleet Tracking Patch Management Alert Retail Service Level Agreement Downtime Supercomputer Identity Theft Recovery Piracy Cybercrime Public Cloud WannaCry Wireless Headphones Tracking Computer Care HTML Legal Deep Learning Mouse Network Security Productuvuty Cache Startup Scalability Best Practice End of Support Managed IT services Value Data Recovery Conferencing uptime Content Filtering Microsoft Excel Avoiding Downtime Securty Maintenance Google Docs Google Wallet Vendor Management Windows 8 Windows 10 Health IT Mobile Devices Network Congestion Computer Malfunction Upgrade Operating System Domains Equifax Mobility Management Emergency IT Plan Wireless Technology Save Time Downloads User Security Cameras Sync MSP Password Gmail WiFi Tech Term Proactive IT Efficiency Webcam Troubleshooting Microchip Freedom of Information Vendor Mangement Hacker Application Computer Repair Office Tips Cost Management Backup Ransomware Entertainment Hackers App Human Resources Wi-Fi 3D Printing Public Speaking Memory Bring Your Own Device Websites IBM News Hosted Solution IT Support Internet Networking Workers Flexibility IT Support Telephony Browsers Shortcut CrashOverride Remote Monitoring Wireless Tech Support Read Excel Uninterrupted Power Supply Customer Service Telephone System Saving Money Hacks Evernote Education Computing Data Backup Distribution eWaste Heating/Cooling Windows Server 2008 Smartphones Business Management Disaster Recovery Streaming Media Data Management Google Drive Cybersecurity Email Unified Threat Management SharePoint Travel Politics Law Enforcement Software as a Service Automation Corporate Profile Electronic Medical Records Hack Gadgets Tech Terms communications Visible Light Communication Backup and Disaster Recovery Tip of the week Data storage Botnet Bata Backup Business Technology Vulnerability Malware Going Green Language UTM Android Emails LiFi Business Growth Screen Reader Printer Social Network Vendor Managed Service CIO Mobile Device Management Directions BDR Television Remote Computing Database Permissions Accountants YouTube Migration Finance Notifications Cleaning Download Motion Sickness G Suite Small Business Microsoft Office Consultation Fake News Social Media Black Market Thank You Monitors Printers Digital Payment Presentation Hard Drive Hard Drive Disposal Meetings Mobile Security Business Metrics Digital Data Analysis Multi-Factor Security Digital Signature Virtual Reality Product Reviews Connected Devices Fiber-Optic Money Gaming Console Books Laptop Worker Regulation switches Messenger Virus Google IT Services Hard Drives Outsourced IT Proxy Server Fraud Analytic email scam Office 365 Asset Tracking Data Protection Microsoft Phishing Customer Resource management Cortana Patching Update Distributed Denial of Service Network Security User Tip SSID File Sharing Windows 10 Business Intelligence Modem Website USB Knowledge Samsung Best Practices VoIP Productivity Telephone Systems Processor Business Owner Regulations Running Cable Term Artificial Intelligence SaaS Dark Web Cost Social Engineering IT consulting Router Healthcare Capital Software Web Server Search Employer Employee Relationship Mobile Payment DDoS Work/Life Balance Banking

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150