Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scam Leverages Email from a Reluctant Contract Killer

Scam Leverages Email from a Reluctant Contract Killer

To many, email scams have become a joke. Sitcoms have throwaway punchlines that reference a character getting an email from a rich uncle in Nigeria, or some friend needing funds to get home from an overseas trip. One of these scams may not at first seem to be amusing, as it threatens the recipient’s life, but if read further, proves to be quite the drama.

Upon accessing their inbox to find an email with the subject: “Please read this it can be the most important information in your life,” the target opens the message to discover that there has been an evil plot taking shape to do them in. While this email is completely a scam, it is entertaining enough to review here, if only to show how creative cybercriminals can be.

The email itself informs the recipient that the sender, a professional hitman, has been hired to execute them. According to the email, this order was passed to the contract killer because the recipient’s “activity causes trouble to a particular person.” However, after studying the target, the hitman has had a change of heart and is therefore offering the target a chance to save themselves--something that will blackball the hitman and ruin the reputation built on twelve years of successful contracts.

The recipient then learns that the hitman was looking to get out of the game anyway, and so this offers a mutually beneficial solution. For 0.5 Bitcoin (worth well over $5000), instead of carrying out the kill, the assassin will instead turn over the name of the person who hired them, along with incriminating evidence to bring to the police. Of course, the hitman warns, the target should not go immediately to the police, as their investigation would take longer than the two days the target has to accept the arrangement.

Finally, the hitman promises to make contact again once the funds have been transferred, and apologizes for their career, stating:

“I really regret that you became my prey.”

Despite (or perhaps due to) the letter reading like the synopsis of a summertime Hollywood blockbuster, the scammer responsible has yet to collect any funds in the online wallet they provide in their letter. Of course, this may also be in part because of the demand of the 0.5 Bitcoin, which isn’t exactly pocket change.

Now that you know this, don’t be the first to hand over a few thousand dollars for an empty threat. Instead, if you happen to receive one of these emails, mark it as spam. This will help teach the spam filters that this is an unwanted email, and might help to keep it from reaching someone else’s inbox.

For more information to help you dodge the scams that cybercriminals leverage, give Decatur Computers Inc. a call at 217-475-0226.

Tip of the Week: Don’t Let Your Old Android Device...
Proper Hard Drive Disposal is An Involved Process
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Cybersecurity Android Tech Term Smartphone Business Management Malware User Tips Internet Google Email Small Business Managed IT Services Ransomware Software Backup Artificial Intelligence Innovation Productivity Data Windows 10 Data Recovery Data Backup Efficiency Cloud Business Technology Cybercrime IT Management Business Phishing Communications Cost Management Saving Money App Hardware Antivirus Blockchain IT Services Mobile Device Management Gadgets Collaboration Patch Management Network Computer Outsourced IT Data Security Hard Drive Encryption Update Managed IT Services Operating System Disaster Recovery Facebook Internet of Things Maintenance BDR Bitcoin Data Protection Remote Monitoring Alert Microsoft Office Social Engineering Automation Spam Word Apps Gmail Digital Document Management Vulnerabilities Bandwidth Scam Laptop SaaS Websites Holiday Money Social Media Search Smartphones Touchscreen Tech Terms Save Money Business Continuity Project Management Data loss Hacking Access Control Microsoft Passwords Start Menu Law Enforcement Mobile Device Browser Data Breach Office 365 Windows VPN Applications Data Management Server Cryptocurrency Administration Printer Uninterrupted Power Supply Mobile Security Mobility Accountants Mobile Devices DDoS Corporate Profile Cleaning Worker Mouse Time Management Managed IT Paperless Office Two-factor Authentication Training eWaste Password Content Computers Cloud Computing Information Technology Computer Care Samsung Unified Threat Management Database History Multi-factor Authentication Google Calendar Equifax Robot Nanotechnology Mobile Technology Unified Threat Management Excel Outlook Tactics IBM Device security Startup Hosted Solutions Disaster Automobile Vendor Mangement Augmented Reality SharePoint Best Practice Tip of the week Access Network Management Addiction Website Google Docs Employer-Employee Relationship Computing Infrastructure Business Mangement Screen Reader Virtual Reality Unified Communications Distributed Denial of Service Unsupported Software Redundancy Spyware Service Level Agreement Machine Learning Budget Legislation Networking Knowledge Tablet Communication Company Culture Printing Freedom of Information Software as a Service Cortana Analytics Going Green HTML Virtualization Business Cards How to Conferencing Identity Theft Government News Comparison Upgrades Virtual Assistant Download Apple Google Drive Virus Chromebook Desktop Legal Fake News Managed Service Provider Big Data Upload Devices Emails Running Cable Downtime Google Maps Telephony YouTube Backup and Disaster Recovery Solid State Drive Downloads WiFi Telephone Systems Hard Drive Disposal Emergency Trends Compliance Bluetooth Cabling Piracy IT Support Specifications VoIP Settings VoIp Wireless Microsoft Excel Regulations Consultant email scam Vulnerability Gamification Wireless Headphones Software License Audit Television Managing Stress CrashOverride BYOD Multi-Factor Security Office Users Office Tips Windows 10 Marketing Twitter

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.