KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give KT Connections a call at 605-341-3873.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Internet Business Computing Network Security Cloud Google software User Tips Efficiency Ransomware Backup Business Data Mobile Device Management IT Support Microsoft Computer Android IT Support Small Business Productivity Gmail Network VoIP Money Facebook Hardware Managed IT Services Mobile Devices Phishing Smartphone Windows Hosted Solutions cybersecurity Windows 10 Cloud Computing Data Management Internet of Things Microsoft Office Operating System Data Security IT Management Business Continuity Alert Artificial Intelligence communications Managed IT Services Unified Communications Social Media Robot Smartphones Antivirus Outlook Nextiva Passwords Update IT Services Communication Hard Drive Cost Management Data storage Outsourced IT Encryption Upgrade security cameras Business Management Networking Disaster Recovery Bandwidth BDR End of Support data breach vulnerability Office 365 Apple Server Innovation Start Menu WiFi Law Enforcement YouTube botnet News Best Practice Events Data Protection Word Scam Event Marketing Lunch and Learn Automation Data Recovery Local Buzz Spam Bitcoin vulnerabilities Holiday South Dakota Browser security solutions Social Engineering Data Backup Digital Google Wallet Firewall Access Control Google Docs Save Money Document Management SaaS Saving Money Legal Patch Management Information Technology Collaboration Productivity IoT Cryptocurrency Remote Monitoring Hacking Project Management Analytics Drones Big Data Customer Service The Internet of Things Search History Apps IBM Politics Gadgets Google Maps BYOD Windows 10 App Information Security Computer Care Webcam Sarbanes-Oxley Act Business Security camera IT Solutions Writing Administration botnet attack Freedom of Information Government Sports eWaste LastPass Conference Business Technology Microsoft Bookings Email Security Communications Wireless Technology Chamber of Commerce Budget End User Testing Printing communication device Remote Computing Running Cable Time Management macbook Uninterrupted Power Supply Attorneys Black Market Cybercrime LiFi Fake News Virtual Reality Hack Computing Infrastructure Disaster booking process Phone System Society Streaming Media Downloads business owner Cabling Unified Threat Management Managed Services Retail Visible Light Communication DDoS attacks Microsoft Excel Memory Event Hardware as a Service Windows 8 Windows XP Solid State Drive Google Calendar communication solutions DDoS Corporate Profile Business Growth Website Compliance Virtualization security precautions Programming Knowledge identity theft Mixer HaaS Network Congestion Tech Support Rebrand Business Communications Worker Business Comunications Deep Learning Blockchain Dell ’s Sonicwall Global Management System Cloud Backup VPN Microsoft Office 365 Press Release Advertising Rapid City Tech Terms media experience Vendors File Sharing Vendor Mangement Touchscreen Office Printer Applications Virtual Desktop Unified Threat Management Comparison Web Servers Excel Password Virtual Machines Microsoft Office 365 features Local Technology How To IoT Devices information Community Involvement Workers Business Mangement Physical Security Websites Vendor Management Tips and Tricks Penetration Testing Specifications face Internet 101 Tip of the week Risk Creep Sales Tax Access Flash Download Samsung Software as a Service Monitors Internet Connected Devices Phishing Scams Television enterprise productivity software surveillance cameras Virtual Assistant IT for Oil Companies Redundancy Cortana Spyware Hosted Solution Content Filtering Laptop Audit Settings healthcare Tablets Google Drive Cleaning Virus Displays IT Consultation Mouse Trend Micro Mobile Device password manager LastPass AtomBombing Risk Management Mobility Managed IT Distributed Denial of Service Tablet Maintenance tool Telephony Workplace Tips Law IT IT Assessment Proactive IT SharePoint Fast food Google Play Store Hard Drive Disposal user confidence Kaseya Managed Service Provider Bluetooth appointment Cache Quick Tips Social SOX Fortinet VoIP Office Tips Lawyers IT Strategy Music Business Cards Education IT Security email scam Kaseya Connect Emergency Safety Experience Users Private Cloud Miscellaneous Microchip IT Consultant Protection In Internet of Things Books network security professionals Motion Sickness Training CrashOverride Telephone Systems Reading Playbook Machine Learning Hiring/Firing Bring Your Own Device Employer Employee Relationship Downtime Health Administrator Banking Relocation Digital Payment breach methods Hacker 3D Printing Piracy base infrastructure Public Cloud Taxes Marketing Hacks Software License Automobile security solution Paperless Office Work/Life Balance Notifications Business Metrics end-of-support date holiday season Wi-Fi Rental Service collaboration capabilities Chromebook UTM Flexibility CCTV holidays Documents IT service Web Server Threat management Reliable Computing Meetings scammers Text Messaging PDF Twitter Ordinary Computers Emails Scalability Computing scams Tracking quantum computers G Suite Computer Malfunction Travel Language Processors Supercomputer Employer-Employee Relationship Sync Messenger Phone Systen