Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that Voyage Technology can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 800.618.9844 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Smartphones Android VoIP Business Management Mobile Devices communications Managed Service Upgrade Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Productivity Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Gadgets Miscellaneous Remote Work Server Managed Service Provider AI Information Holiday Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Compliance Training Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Apps Two-factor Authentication Mobile Office Data Security BYOD Vendor Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Networking Gmail Apple App Applications Computing Access Control Information Technology Hacker Tip of the week Avoiding Downtime Office 365 Conferencing Marketing IT Support How To BDR WiFi HIPAA Router Operating System Virtual Private Network Risk Management Health Computers Help Desk Analytics Website Office Tips Retail Augmented Reality Healthcare Storage Managed IT Services Password Bring Your Own Device Big Data Social Vendor Management Solutions Going Green Physical Security Display Cybercrime Printer Paperless Office Windows 11 Customer Service Infrastructure 2FA Monitoring Excel Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability IT Management Settings VPN Employees Meetings Wireless Integration Printing Content Filtering Modem Customer Relationship Management User Tip YouTube Processor Computer Repair Mobile Security Holidays Cryptocurrency Hacking Presentation Data Storage Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage LiFi Wireless Technology Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Outlook Managed IT Service Maintenance Money Downloads Humor Antivirus Word iPhone Licensing Vulnerabilities Sports Entertainment Data Privacy Mouse Safety Images 101 Administration Robot Mobility Telephone System Multi-Factor Authentication Cost Management Application Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Cortana Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Alt Codes IBM Trend Micro Downtime User Error Microchip Internet Exlporer Software as a Service Fraud Meta Hosted Solution Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Typing Database Surveillance Virtual Assistant Outsource IT Media Google Drive Competition Knowledge Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews 5G Tactics Development Hotspot Transportation Small Businesses Google Docs Unified Communications Experience Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Bitcoin Running Cable Shopping User SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Wallet Navigation Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Windows 8 IP Address Laptop Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Drones Evernote Paperless Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Halloween Superfish Bookmark Recovery Hard Drives Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Domains Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Hacks Scary Stories Browsers Smartwatch Refrigeration Fun Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Deep Learning Public Speaking Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables Lithium-ion battery CES Education Trends Supply Chain Management Entrepreneur Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel IT Maintenance Mobile Computing Data Analysis Undo Search Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Best Practice Organization Travel Social Networking Google Maps Smart Devices Ransmoware Buisness Techology Fileless Malware Digital Security Cameras IT solutions Content Remote Working Wearable Technology Memory Vendors Legal Comparison Google Play Be Proactive Business Growth Health IT Unified Threat Management Motherboard Data Breach

Blog Archive