Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that Voyage Technology can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 800.618.9844 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 14 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Hosted Solutions Collaboration Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Facebook Automation Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Remote Work Server Compliance Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Government Data Management Bandwidth Virtualization Business Technology Wi-Fi Windows 10 Blockchain Vendor Apps Data Security Mobile Office Two-factor Authentication Chrome WiFi Budget Tip of the week Apple Employer-Employee Relationship App Managed Services Networking Voice over Internet Protocol Mobile Device Management BYOD Gmail HIPAA Access Control Applications Conferencing Hacker How To Avoiding Downtime BDR Computing Marketing Information Technology Office 365 Augmented Reality Router 2FA Health Storage Password Big Data Bring Your Own Device Retail Help Desk Computers Managed IT Services Operating System Healthcare Website Risk Management Analytics Office Tips Virtual Private Network Printer Solutions Windows 11 Paperless Office The Internet of Things Infrastructure Excel Social Document Management Monitoring Scam Going Green Customer Service Data loss Remote Workers Cybercrime Telephone Patch Management Save Money Remote Monitoring Cooperation Free Resource Vulnerability Project Management End of Support Windows 7 Vendor Management Firewall Microsoft 365 Physical Security Display Money Computer Repair Safety Humor Employees Supply Chain Integration Modem Sports User Tip Processor Mobile Security Mouse Machine Learning Holidays Administration Data Storage Smart Technology Customer Relationship Management Video Conferencing Maintenance Antivirus Managed Services Provider Virtual Machines Professional Services Saving Time Hacking Data Privacy Presentation Settings Wireless Managed IT Service Printing Content Filtering Downloads Wireless Technology iPhone YouTube Licensing Cryptocurrency Robot Entertainment Vulnerabilities Word Images 101 Virtual Desktop LiFi IT Management Data storage VPN Multi-Factor Authentication Meetings Mobility Telephone System Cost Management Outlook Directions Videos Assessment Electronic Health Records Permissions Tech Support Small Businesses Undo Network Management Wasting Time Trend Micro Specifications Security Cameras Displays Hacks Monitors Scary Stories Microchip Fun Internet Exlporer Software as a Service Fraud Websites Outsourcing Deep Learning Username Managing Costs eCommerce Black Friday SSID Workplace Education Application SharePoint Database Surveillance Virtual Assistant Electronic Medical Records Hiring/Firing IT Technicians Virtual Machine Lenovo Cookies Cyber Monday Medical IT Mobile Computing Writing IBM Paperless Proxy Server Reviews Co-managed IT Search Tactics Development Hotspot Transportation Virtual Reality Private Cloud Technology Care Best Practice Server Management Mirgation Hypervisor Superfish Nanotechnology Optimization Identity Theft PowerPoint Business Communications Buisness Shopping Scams IT solutions Addiction Language Employer/Employee Relationships Legal Twitter Error Navigation Hybrid Work Business Growth Competition Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Social Engineering Human Resources Gig Economy Cables Cortana Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Remote Computing Evernote Alt Codes Regulations Compliance Identity User Smart Tech Memes Tablet Google Apps Downtime Bookmark IT Maintenance Hosted Solution Download Net Neutrality Alerts SQL Server Alert File Sharing Business Intelligence Typing Dark Data Financial Data Managed IT History Connectivity IT Break Fix How To IP Address Shortcuts Browsers Smartwatch Ransmoware Knowledge Upload Procurement Azure Google Drive Notifications Travel Multi-Factor Security Tech Vendors Social Network Telework Cyber security CES Recovery 5G Techology IoT Communitications Google Maps Dark Web Be Proactive Workforce Unified Communications Hard Drives Experience Trends Supply Chain Management Google Docs Regulations Unified Threat Management Google Calendar Term Threats Bitcoin Domains Running Cable Customer Resource management FinTech Data Analysis Unified Threat Management Star Wars IT Assessment Microsoft Excel Google Wallet Workplace Strategies Meta Refrigeration Gamification Flexibility Staff Value Social Networking Legislation Amazon Windows 8 Network Congestion Public Speaking Laptop Organization Fileless Malware Digital Security Cameras User Error Smart Devices Drones Lithium-ion battery Outsource IT Content Remote Working Entrepreneur Wearable Technology Memory Motherboard Data Breach Point of Sale Comparison Google Play Environment Media Halloween Health IT

Blog Archive