Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that Voyage Technology can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 800.618.9844 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 02 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Network Security Hardware Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Data Backup Smartphone Productivity Managed Service Android Upgrade Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media AI Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Marketing Access Control Applications Office 365 Storage Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Computers Virtual Private Network Risk Management Router Website Health Analytics Office Tips Augmented Reality 2FA Help Desk Retail Excel The Internet of Things Scam Data loss Remote Workers Social Telephone Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Project Management Vulnerability Vendor Management Windows 7 Customer Service Cybercrime Physical Security Microsoft 365 Display Solutions Printer Paperless Office Infrastructure Windows 11 Firewall Document Management Monitoring Maintenance Video Conferencing Safety Managed Services Provider Antivirus Sports Saving Time Virtual Machines Professional Services Mouse Administration Managed IT Service Downloads iPhone Licensing Robot Entertainment Vulnerabilities Customer Relationship Management Settings Data Privacy Wireless Printing Images 101 Content Filtering Hacking IT Management Telephone System Multi-Factor Authentication Mobility Presentation VPN YouTube Meetings Cost Management Cryptocurrency Wireless Technology Computer Repair Employees Virtual Desktop LiFi Integration Data storage User Tip Modem Word Processor Mobile Security Outlook Machine Learning Holidays Money Humor Data Storage Smart Technology Supply Chain Deep Learning Twitter Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Undo Error Management PCI DSS Education Gig Economy Social Engineering Screen Reader Distributed Denial of Service Workplace Remote Computing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Mobile Computing Regulations Compliance Tablet Bookmark Search Smart Tech Memes Co-managed IT Application Best Practice Alert Download Net Neutrality Alerts SQL Server Technology Care Dark Data History Business Communications Managed IT Buisness File Sharing Financial Data IT solutions Browsers Smartwatch How To Connectivity IT Break Fix Scams IBM Legal Business Growth Notifications Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Travel Social Network Telework Google Maps CES Cortana IoT Communitications Dark Web Cables Techology Alt Codes Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Competition Downtime Unified Threat Management Hosted Solution Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Unified Threat Management Staff Value Business Intelligence Typing Gamification Flexibility Organization Network Congestion Social Networking Legislation Shortcuts User Fileless Malware Digital Security Cameras Knowledge Smart Devices Ransmoware Google Drive User Error Wearable Technology Memory Vendors Content Remote Working Health IT 5G Motherboard Data Breach Comparison Google Play Be Proactive Point of Sale Unified Communications Directions Videos Experience Assessment Electronic Health Records Permissions Workforce IP Address Google Docs Wasting Time Threats Bitcoin Network Management Running Cable Tech Support Monitors Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Recovery Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Hard Drives Windows 8 Laptop Websites Username eCommerce Black Friday SSID Domains Drones Electronic Medical Records Database Surveillance Virtual Assistant Outsource IT SharePoint IT Technicians Virtual Machine Environment Media Refrigeration Halloween Proxy Server Reviews Writing Cookies Cyber Monday Medical IT Public Speaking Lenovo Virtual Reality Tactics Development Hotspot Transportation Small Businesses Lithium-ion battery Mirgation Hypervisor Displays Hacks Server Management Entrepreneur Scary Stories Private Cloud Shopping Fun Nanotechnology Optimization PowerPoint Superfish Identity Theft

Blog Archive