Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Symmetric Engineering Group. Give us a call at (813) 749-0895.

Mobile Security Showdown: Cellular Network vs. Wi-...
Tip of the Week: Do You Know What Your Android Per...


Already Registered? Login Here
No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Managed IT Services Cloud Technology IT Infrastructure Management Email Business Computing Business Continuity IT Companies in Tampa Privacy Malware Hackers Internet Business Mobility IT Support Services Business IT Solutions Hosted Solutions I.T. Management Microsoft Productivity IT Professional Services Custom Business Solutions Managed Service Provider Software Business Outsourced IT Mobile Devices Business Applications Computer IT Management IT Business Solutions Data Backup Network Security Ransomware Technology Consultants Managed IT Service in Florida Windows 10 Business IT Support Data Managed IT Managed IT Service Data Recovery Android Internet of Things Windows Managed Services in Florida Google I.T. Support Tech Term User Tips Backup Disaster Recovery I.T. Services IT Support Services in Tampa IT Risk Management Dynamic Solutions Cloud Computing Browser Data Management Smartphone Remote Monitoring IT Outsourcing in Tampa Communication IT Services in Florida Innovation Encryption Managed Services IT Service Gmail Small Business IT Support in Tampa Hardware Managed Services in Tampa Bay Holiday Artificial Intelligence Workplace Tips Server Cybersecurity Microsoft Office Productivity Social Media Upgrade BYOD IT Managed Services Smartphones App Mobile Device Management Tampa IT Support Save Money Firewall Network Vendor Management Applications IT Services in Tampa Office 365 Phishing Mobile Device Tech Companies in Tampa Business Management Paperless Office IT Outsourcing Unified Threat Management Business IT Support Services Apple Collaboration Risk Management IT Support Managed Service in Tampa Small Business IT Solutions Chrome IT Outsourcing in Florida Facebook Computer Networking Antivirus Operating System Infrastructure Efficiency IT Service Management Data Computer Services Tip of the week Compliance IT Company Business Plan Passwords IT Vendor Management Bring Your Own Device Website Content Filtering BDR Word Two-factor Authentication Customer Relationship Management Bandwidth Settings Document Management IT Management Services Data loss IT Company Project Management The Internet of Things VoIP Miscellaneous Vulnerability Saving Money Remote Computing Robot Data Security Managed IT Services Analytics Mobile Computing Big Data Money Telephone Systems Computer Hardware Repair Hosted Solution Windows 10 Employer-Employee Relationship Wireless Technology Retail Automation IT solutions WiFi SaaS Government Unified Communications Data storage Regulations Alert IT Consulting Training Redundancy Solid State Drive Virtualization Patch Management LiFi Digital Payment Server Management Augmented Reality Mobile Security IT Support Helpdesk Wireless File Sharing Managed IT Outsourcing Network Congestion Microsoft Virtual Server Hosting in Tampa and Florida Spam Network Management Smart Technology IT Management Service Apps Tablet Business Continuity Services Administration Wi-Fi Blockchain Recovery Help Desk Information Technology Virtual Private Network End of Support Presentation Assessment Router VPN Laptop Maintenance Business Technology Business Application Mobility Google Drive IBM YouTube Virtual Reality Computer Support Flexibility Office Tips IT Companies in Florida Computer Network Services Mouse Outlook Net Neutrality Search communications I.T. Company Customer Service Computer Networking Services IoT Uninterrupted Power Supply HIPAA Budget User Error Virtual Desktop Licensing Computing Monitors Storage Scam Internet Exlporer Office Writing Vulnerabilities Safety Data Warehousing Marketing History User Hard Disk Drive Server Hosting in Florida SharePoint IT Technicians Backups Domains Time Management Enterprise Resource Planning Technology Tips Nanotechnology Bitcoin Best Practice Software Tips USB Microsoft Business Solutions Data Breach Cortana Cooperation Business Growth Google Wallet Competition How To Samsung Business Continuity Service Providers Dark Data Networking Education IT Support Companies in Tampa Technology Consulting Firms Digital Signature Current Events Hard Drives Hard Drive Specifications Social Networking Social Engineering Geography Microsoft Excel Chromebook Disaster Avoiding Downtime Tampa IT Services Downloads Mirgation Alt Codes Managed it Services in Tampa Information Technology Consulting Travel Identity Theft Legal Public Speaking Careers Mobile Screen Reader Server Hosting Windows 8 Heating/Cooling Professional Service Technology Laws Knowledge Staff IT Vendor Management in Tampa Sync Computer Care Drones Firefox Black Friday Buisness Motherboard Statistics Consulting Services Fun Hotspot IT Support and Solutions Going Green VoIP Health Care IT Services Cache High-Speed Internet Managed Services in Floirda Files Gadgets Top IT Outsourcing Company Outsourced Computer Support Multi-Factor Security Migration Typing Managed Service Providers IT Consulting Services Programming Touchscreen IT Service in Tampa Jobs Company Culture Hacker Distributed Denial of Service Downtime Smart Tech Cabling IT Managed Service Provider Unified Threat Management Experience Operations Deep Learning Network Support in Florida Mobile Device Managment Cyber Monday Trending Google Maps IT Consulting Service Bluetooth Service IT Techology Language IT Managed Service in Tampa Printing Cost Management Digital Computers Business IT Solutions Recycling Development Lenovo Permissions Co-managed IT IT Company in Tampa Websites Star Wars Google Calendar Halloween Chatbots Tech Company in Tampa Tech Support Managing Stress Break Fix Connectivity Politics Mail Merge Printer Wearable Technology Health Consultation eWaste CIO Modem Password IT Solutions for Small Business Disaster Resistance Computing Infrastructure Help Desk Support in Tampa Spyware Display Full Service IT Cables Superfish Fraud Managed Service in Florida Social Hacking Corporate Profile Utility Computing Legislation Scary Stories Identity Google Docs Data Technology Enterprise Content Management Dark Web Users Healthcare IT Address Application Access Control Identities G Suite Save Time Quick Tips Management Software as a Service Cookies Server Hosting in Tampa Cryptocurrency Humor Shortcut Microsoft Affiliate Program Proactive IT Alerts Help Desk Support Automobile Undo Servers Wires IT Tech Support Machine Learning Hacks WannaCry Intranet Healthcare Comparison Sports Computer Repair Update Black Market Personal Information Managed Servers Work/Life Balance Lithium-ion Battery Mobile Data Business Appplications Administrator Cleaning Web Server How To Relocation Cybercrime Law Enforcement Notifications Upgrades Private Cloud IT Consultant Cameras Refrigeration Thank You Emergency Running Cable Motion Sickness Gadget Staffing 3D Printing Error CCTV Congratulations 5G I.T. Managament Virus Meetings Electronic Medical Records IP Address GPS Crowdsourcing Public Cloud Saving Time Taxes Botnet Twitter Webcam Supercomputer Mobile Office Telephony Tracking Unsupported Software Hiring/Firing CrashOverride Point of Sale IT Budget Emoji Physical Security Processors

Latest Blog Entry

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at ...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login