Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

This email appears in the target’s inbox with the subject line “Please read this it can be the most important information in your life,” a clear example of clickbait. However, the story that unfolds is worth accessing the email--or at least, it would be, if we weren’t going to tell you the story here.

Once opened, the recipient will find a message that suggests a great drama is unfolding on the periphery of the recipient’s life. According to the email, the recipient has had a contract put out on their head, the sender of this message being the hitman who is charged with taking them out. As the email says, “I received an order to kill you, because your activity causes trouble to a particular person.”

However, in a twist of events, the contract killer has decided to give their target the opportunity to save themselves after studying them. This is clearly a big deal, as the “business rules” of his or her profession do not allow this kind of activity, and so sending the target this message will destroy a twelve-year-long track record of executions. However, since the contract killer intends for this to be their last job, this rule was one that could be broken.

The apparent assassin then goes into the details of this arrangement. For 0.5 Bitcoin, the assassin will hand over the name of the person who arranged the hit as well as any evidence in their possession to bring to the police.

However, the target should not yet call the police, as it would take longer than the two days the target has for the authorities to investigate. The hired gun ends the letter promising to reach out again once the funds have changed hands, and with a pseudo-apology:

“I really regret that you became my prey.”

Perhaps in part because the letter plays out like an assignment from a creative writing class, and perhaps due to the high, high price implied by 0.5 Bitcoin, the scammer responsible has yet to gain any funds. Don’t be the first person to hand over a few grand.

If you happen to receive one of these emails, make sure that you mark it as spam. This helps inform spam filters that this email is unwanted, and might save someone else from contributing to the responsible party’s cache.

For more information on how to avoid scams and cyberthreats, lean on the professionals at Voyage Technology. Give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup AI Android Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Gadgets Covid-19 Cloud Computing Training Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Managed Services Voice over Internet Protocol Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Office 365 Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Virtual Private Network Risk Management Website 2FA Health Monitoring Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Free Resource Project Management Cooperation Windows 7 Social Microsoft 365 Going Green Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Physical Security Display Windows 11 Printer Paperless Office Infrastructure Video Conferencing Word Smart Technology Managed Services Provider Professional Services Outlook Virtual Machines Machine Learning Money Saving Time Humor Managed IT Service iPhone Safety Maintenance Sports Downloads Antivirus Mouse Vulnerabilities Licensing Data Privacy Entertainment Administration Images 101 Mobility Multi-Factor Authentication Telephone System Robot Customer Relationship Management Cost Management Settings Printing Wireless Employees Content Filtering Integration Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Holidays Virtual Desktop Data Storage Supply Chain Data storage LiFi Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Hard Drives Windows 8 Domains Drones Nanotechnology PCI DSS Navigation Workplace SharePoint Addiction Gig Economy Electronic Medical Records Language Halloween Chatbots Internet Service Provider Teamwork Hiring/Firing Refrigeration Management Public Speaking Lenovo Screen Reader Regulations Compliance Writing Distributed Denial of Service Evernote Paperless Memes Co-managed IT Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Net Neutrality SQL Server Technology Care Hacks Server Management Business Communications Superfish Bookmark Identity Theft Smart Tech Financial Data Fun History IT Scams Deep Learning Download Smartwatch Twitter Alerts Error Procurement Azure Hybrid Work Undo Tech Human Resources Browsers Education Connectivity Telework Social Engineering Break Fix Cyber security Communitications Cables Upload CES Remote Computing Mobile Computing Social Network Supply Chain Management Multi-Factor Security Term Google Apps Tablet IoT FinTech Search Dark Web Alert IT Assessment IT Maintenance Application Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Flexibility Dark Data Google Calendar Value Business Intelligence Shortcuts IBM Legal Data Analysis IT solutions Star Wars Organization How To Microsoft Excel Notifications Staff Smart Devices Ransmoware Business Growth Gamification Digital Security Cameras Travel Social Networking Remote Working Legislation Memory Vendors Google Play Be Proactive Techology Fileless Malware Google Maps Cortana Data Breach Wearable Technology Electronic Health Records Workforce Alt Codes Content Videos Competition Health IT Downtime Unified Threat Management Motherboard Comparison Wasting Time Threats Security Cameras Workplace Strategies Unified Threat Management Directions Hosted Solution Assessment Permissions Trend Micro Software as a Service Meta Typing Network Congestion Specifications Managing Costs Amazon SSID Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud eCommerce Surveillance Virtual Assistant Outsource IT Username Point of Sale 5G Black Friday Virtual Machine Environment Media Medical IT IP Address Google Docs Unified Communications Database Reviews Experience Running Cable Tech Support IT Technicians Development Transportation Small Businesses Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Hypervisor Displays PowerPoint Recovery Tactics Shopping Hotspot Optimization

Blog Archive