Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that Voyage Technology can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 800.618.9844 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Collaboration Users Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service VoIP Business Management Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Managed IT Services Social Media Windows Microsoft Office Tech Term Current Events Network Remote Internet of Things Productivity Artificial Intelligence Facebook Automation AI Covid-19 Gadgets Cloud Computing Managed Service Provider Remote Work Miscellaneous Server Outsourced IT Information Holiday Compliance Encryption Employee/Employer Relationship Spam Training Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication IT Support Mobile Office Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Tip of the week Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Risk Management Virtual Private Network Computers Health Healthcare Help Desk Analytics Website Office Tips Document Management Free Resource Project Management Windows 7 Firewall Telephone Scam Data loss Microsoft 365 The Internet of Things Solutions Cooperation Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime 2FA Physical Security Customer Service Excel Display Printer Paperless Office Infrastructure Remote Workers Monitoring Money Saving Time Humor Vulnerabilities Word Data Privacy Managed IT Service Images 101 Maintenance Downloads Antivirus Sports Multi-Factor Authentication Mobility Mouse Licensing Safety Administration Entertainment Employees Integration Robot Telephone System Cost Management Settings Wireless Printing Holidays Content Filtering IT Management Customer Relationship Management YouTube Meetings Data Storage VPN Supply Chain Video Conferencing Cryptocurrency Modem Hacking User Tip Managed Services Provider Processor Virtual Machines Presentation Professional Services Computer Repair Mobile Security Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Outlook iPhone Machine Learning Cyber security Screen Reader Hard Drives Tech Human Resources Writing Distributed Denial of Service Telework Lenovo CES Communitications Service Level Agreement Domains Cables Virtual Reality Computing Infrastructure Supply Chain Management Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Refrigeration Term Google Apps Fun FinTech Superfish Bookmark IT Assessment Deep Learning Download Public Speaking IT Maintenance Twitter Alerts Flexibility Lithium-ion battery Value Business Intelligence Error Education Connectivity Shortcuts Social Engineering Break Fix Entrepreneur Organization Browsers Digital Security Cameras Smart Devices Upload Ransmoware Remote Computing Multi-Factor Security Remote Working Mobile Computing Social Network Memory Vendors Data Breach Tablet IoT Undo Google Play Be Proactive Search Dark Web Videos Electronic Health Records Best Practice Trends Workforce Alert Dark Data Google Calendar Managed IT Customer Resource management Wasting Time Threats Buisness File Sharing Regulations Trend Micro IT solutions Star Wars Security Cameras Workplace Strategies How To Microsoft Excel Legal Data Analysis Software as a Service Business Growth Gamification Meta Notifications Staff Application Legislation Managing Costs Amazon Travel Social Networking eCommerce Google Maps SSID Cortana Techology Fileless Malware Surveillance Alt Codes Content IBM Virtual Assistant Outsource IT Wearable Technology Media Comparison Health IT Virtual Machine Environment Downtime Unified Threat Management Motherboard Unified Threat Management Directions Hosted Solution Assessment Medical IT Permissions Reviews Development Typing Transportation Small Businesses Network Congestion Specifications Hypervisor Displays Google Drive User Error Microchip Optimization Internet Exlporer Competition PowerPoint Knowledge Fraud Shopping Username Employer/Employee Relationships Outsourcing Point of Sale Navigation 5G Black Friday PCI DSS Google Docs Unified Communications Database Workplace Experience Gig Economy Internet Service Provider Bitcoin Network Management Teamwork Hiring/Firing Running Cable Tech Support IT Technicians User Cookies Evernote Paperless Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Memes Tactics Co-managed IT Hotspot Net Neutrality Windows 8 IP Address SQL Server Technology Care Laptop Websites Mirgation Nanotechnology Business Communications Financial Data Drones History SharePoint IT Addiction Scams Electronic Medical Records Language Smartwatch Procurement Management Azure Hybrid Work Halloween Chatbots Recovery

Blog Archive