Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that Voyage Technology can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 800.618.9844 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management VoIP Smartphones communications Managed Service Upgrade Mobile Devices Disaster Recovery Browser Data Recovery Managed IT Services Social Media Microsoft Office Windows Remote Tech Term Network Internet of Things Current Events Automation Artificial Intelligence Facebook Productivity Covid-19 Gadgets Cloud Computing AI Server Remote Work Managed Service Provider Miscellaneous Holiday Outsourced IT Information Employee/Employer Relationship Encryption Spam Office Windows 10 Compliance Training Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 IT Support Tip of the week Conferencing WiFi How To BDR Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System HIPAA Microsoft 365 Physical Security Display Printer Solutions Paperless Office Infrastructure Monitoring Windows 11 Firewall Document Management 2FA Telephone Excel The Internet of Things Scam Data loss Remote Workers Social Cooperation Going Green Patch Management Save Money Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Customer Service Cybercrime Multi-Factor Authentication Presentation VPN Mobility YouTube Meetings Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Employees Data storage Integration LiFi Word Smart Technology Outlook Machine Learning Holidays Money Saving Time Humor Data Storage Supply Chain Managed IT Service Video Conferencing Safety Maintenance Downloads Managed Services Provider Antivirus Sports Professional Services Virtual Machines Mouse Licensing Administration Entertainment iPhone Robot Telephone System Vulnerabilities Cost Management Customer Relationship Management Data Privacy Settings Wireless Printing Content Filtering Images 101 Hacking IT Management Network Congestion Specifications Organization Shortcuts Google Drive User Error Microchip Ransmoware User Internet Exlporer Knowledge Fraud Digital Security Cameras Smart Devices Remote Working Memory Vendors Username Point of Sale 5G Black Friday Data Breach Google Play Be Proactive Electronic Health Records IP Address Google Docs Workforce Unified Communications Database Experience Videos Wasting Time Threats Bitcoin Network Management Running Cable Tech Support IT Technicians Security Cameras Workplace Strategies Cookies Monitors Cyber Monday Trend Micro Google Wallet Proxy Server Software as a Service Meta Recovery Tactics Hotspot Managing Costs Amazon Hard Drives Windows 8 Laptop Websites Mirgation SSID Nanotechnology eCommerce Domains Drones Surveillance SharePoint Virtual Assistant Outsource IT Addiction Electronic Medical Records Language Virtual Machine Environment Refrigeration Management Media Halloween Chatbots Medical IT Screen Reader Writing Distributed Denial of Service Reviews Public Speaking Lenovo Development Lithium-ion battery Transportation Small Businesses Service Level Agreement Virtual Reality Computing Infrastructure Hypervisor Displays Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity PowerPoint Identity Theft Smart Tech Fun Shopping Optimization Superfish Bookmark Employer/Employee Relationships Outsourcing Deep Learning Download Twitter Alerts PCI DSS Undo Navigation Error Workplace Education Connectivity Social Engineering Break Fix Gig Economy Browsers Internet Service Provider Teamwork Hiring/Firing Upload Remote Computing Multi-Factor Security Regulations Compliance Mobile Computing Social Network Evernote Paperless Co-managed IT Tablet IoT Search Dark Web Memes Net Neutrality SQL Server Technology Care Application Best Practice Trends Alert Dark Data Google Calendar Financial Data History Managed IT Customer Resource management Business Communications Buisness File Sharing Regulations Scams IT solutions Star Wars How To Microsoft Excel Smartwatch IT IBM Legal Data Analysis Procurement Azure Hybrid Work Business Growth Gamification Notifications Staff Legislation Telework Cyber security Tech Human Resources Travel Social Networking Cables Google Maps Cortana CES Communitications Techology Fileless Malware Supply Chain Management Alt Codes Content Wearable Technology Comparison FinTech Competition Health IT Term Google Apps Downtime Unified Threat Management Motherboard IT Maintenance Hosted Solution Assessment Permissions IT Assessment Unified Threat Management Directions Flexibility Value Business Intelligence Typing

Blog Archive