301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Washington Works. Give us a call at 301-571-5040.

Mobile Security Showdown: Cellular Network vs. Wi-...
Tip of the Week: Do You Know What Your Android Per...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 22 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Malware Hackers Privacy Email Network Security Software Business Backup Ransomware Productivity Microsoft Mobile Devices User Tips Android Smartphone Small Business Managed IT Services Google Windows 10 Internet Computer Managed Service Provider Office 365 Efficiency Cloud Computing Hosted Solutions Data Management Encryption Business Continuity Business Management Communication IT Services Smartphones Productivity Hardware Data Recovery Browser Disaster Recovery Social Media Tip of the week Server Outsourced IT Work/Life Balance Workplace Tips Remote Monitoring Save Money Phishing App Holiday Antivirus IT Support Hosted Solution Data Backup Windows Unified Threat Management Apps Cybersecurity Money Facebook Big Data Virtual Reality Innovation Risk Management How To Windows 10 SaaS Infrastructure Paperless Office Government BYOD Password IT Management Word Artificial Intelligence Saving Money Alert Health Document Management Samsung Tech Term Computing Two-factor Authentication Bandwidth Taxes Data Politics Managed IT Services Tech Support Identity Theft Websites Maintenance Business Technology Botnet Automation Employer-Employee Relationship HIPAA Chrome Mobile Security Collaboration Twitter Wi-Fi Scam Computer Care Robot Vulnerability Data loss Mobile Device Recovery Training File Sharing Remote Computing VPN Physical Security Hacker Telephone Systems Data Security Server Management Virtual Private Network Office Firewall Automobile Mail Merge Licensing IT Solutions Digital Tracking VoIP Mouse Gadget Techology Identity Emoji Bluetooth Microsoft Excel Hard Disk Drive Spam Travel Address Cooperation Upgrades Spyware Mobile Device Management Avoiding Downtime Tablet G Suite Unified Threat Management Electronic Medical Records Internet of Things Motion Sickness Staff Time Management Comparison Augmented Reality User Error Compliance Legal Blockchain Office Tips Notifications Gmail Social How To Network Management Specifications IT Consultant Regulations Sports Managed IT Permissions Budget Gadgets Supercomputer Meetings Wearable Technology Analytics Printer Touchscreen Black Friday IT Support Administrator Outlook Fraud Corporate Profile IT Budget Webcam Lenovo Access Control Cyber Monday Cabling Education Upgrade Machine Learning Black Market Shortcut Virtualization WannaCry Wireless Digital Payment Point of Sale Crowdsourcing Superfish Applications Firefox SharePoint Smart Technology Search Cleaning Relocation Patch Management Hotspot Monitors Staffing Downloads IT Technicians Personal Information Vendor Management Update Heating/Cooling Distributed Denial of Service Disaster Private Cloud Downtime Passwords Language Cortana Network Multi-Factor Security Web Server Networking Mirgation Servers Managed IT Service Uninterrupted Power Supply IBM Error Computing Infrastructure YouTube WiFi Google Calendar Microsoft Office Cameras Storage Computer Repair Quick Tips Chromebook Break Fix Customer Relationship Management Communications Cybercrime Processors Alerts Settings GPS Legislation CCTV Law Enforcement Chatbots Google Drive Statistics Dark Web Solid State Drive Mobile Office Domains Hard Drives Public Speaking CrashOverride Lithium-ion battery Emergency Safety The Internet of Things Hiring/Firing Competition Fun Users Miscellaneous VoIP Presentation 5G Wireless Technology Marketing IP Address Website Customer Service