Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that Voyage Technology can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 800.618.9844 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Communication Data Backup Smartphone Saving Money Passwords Business Management VoIP Smartphones Android Mobile Devices communications Backup Managed Service Data Recovery Upgrade Managed IT Services Browser Disaster Recovery Social Media Microsoft Office Windows Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Remote Work Miscellaneous Current Events Gadgets Productivity Server Managed Service Provider Outsourced IT Holiday Information Employee/Employer Relationship Encryption Spam AI Windows 10 Data Management Business Continuity Government Compliance Office Training Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Business Technology Data Security Apps Two-factor Authentication Mobile Office Chrome Gmail Budget Apple Networking Managed Services App Voice over Internet Protocol Employer-Employee Relationship Mobile Device Management Vendor Applications WiFi How To Conferencing BDR BYOD Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Tip of the week Augmented Reality Retail Storage Password Help Desk Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Computers Virtual Private Network Risk Management Website Health HIPAA Office Tips Analytics Router Firewall Document Management Windows 11 2FA The Internet of Things Scam Monitoring Data loss Excel Social Remote Workers Going Green Patch Management Telephone Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions IT Support Money Humor User Tip Modem Processor Mobile Security Holidays Safety Maintenance Antivirus Sports Mouse Data Storage Smart Technology Supply Chain Video Conferencing Administration Managed Services Provider Virtual Machines Professional Services Saving Time Managed IT Service Robot Downloads Customer Relationship Management Settings iPhone Printing Licensing Wireless Content Filtering Hacking IT Management Vulnerabilities Entertainment Presentation VPN YouTube Meetings Data Privacy Physical Security Cryptocurrency Images 101 Wireless Technology Computer Repair Mobility Telephone System Multi-Factor Authentication Cost Management Virtual Desktop Data storage LiFi Word Outlook Employees Machine Learning Integration Public Speaking Lenovo Username Managing Costs Amazon Writing Virtual Reality Black Friday SSID Lithium-ion battery eCommerce Hacks Server Management Database Surveillance Entrepreneur Scary Stories Private Cloud Virtual Assistant Outsource IT Superfish Identity Theft IT Technicians Virtual Machine Environment Fun Media Cookies Twitter Cyber Monday Medical IT Proxy Server Reviews Deep Learning Undo Tactics Development Error Hotspot Transportation Small Businesses Education Mirgation Hypervisor Displays Social Engineering Nanotechnology Optimization Remote Computing PowerPoint Shopping Mobile Computing Addiction Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Tablet Chatbots Search Screen Reader Alert Distributed Denial of Service Workplace Gig Economy Application Best Practice Managed IT Service Level Agreement Internet Service Provider Buisness File Sharing Computing Infrastructure Teamwork Hiring/Firing Dark Data Evernote Paperless IBM Legal Regulations Compliance IT solutions Identity How To Smart Tech Memes Notifications Co-managed IT Bookmark Business Growth Download Net Neutrality Travel Alerts SQL Server Technology Care Business Communications Techology Financial Data Google Maps History Cortana Alt Codes Connectivity IT Break Fix Scams Browsers Smartwatch Competition Upload Procurement Downtime Unified Threat Management Azure Hybrid Work Multi-Factor Security Tech Human Resources Unified Threat Management Social Network Telework Hosted Solution Cyber security Typing IoT Communitications Dark Web Cables CES Trends Supply Chain Management Network Congestion Knowledge Google Calendar Term Google Apps Google Drive User Error Customer Resource management FinTech User Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Point of Sale Staff Value Business Intelligence 5G Experience Legislation Shortcuts IP Address Google Docs Organization Unified Communications Social Networking Bitcoin Network Management Smart Devices Running Cable Tech Support Ransmoware Fileless Malware Digital Security Cameras Google Wallet Content Remote Working Wearable Technology Memory Vendors Monitors Comparison Google Play Be Proactive Health IT Recovery Motherboard Data Breach Hard Drives Windows 8 Assessment Electronic Health Records Laptop Websites Permissions Workforce Directions Videos Domains Drones Wasting Time Threats Electronic Medical Records Specifications Security Cameras Workplace Strategies SharePoint Trend Micro Refrigeration Internet Exlporer Software as a Service Halloween Fraud Meta Microchip

Blog Archive