ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that ClearView IT can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 866-326-7214 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Browser Windows 10 Apps Managed Service IT Support Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Gadgets Artificial Intelligence Networking Managed IT services Windows Workplace Strategy Spam WiFi Mobile Device Management Information Bandwidth Business Technology Encryption App Virtualization Blockchain Remote Server Employee/Employer Relationship Office 365 Budget Apple Information Technology History Gmail Office Two-factor Authentication Data Security Conferencing BDR Cybercrime Health Big Data Analytics Access Control Wi-Fi Patch Management Hacker Remote Monitoring Voice over Internet Protocol Cost Management Compliance Vendor Employer-Employee Relationship IT Management Training Document Management Help Desk Hacking Save Money Remote Computing Data loss BYOD Money Computing Vendor Management Customer Service Project Management Hard Drive Unified Threat Management Firewall Mobile Office Augmented Reality Search... Applications Managed Services Word Best Practice Legal IBM Vulnerabilities Website Retail Alert Data storage Hiring/Firing Outlook Password Cleaning Chrome Windows 11 Robot Paperless Office Antivirus Maintenance Social Mobile Computing Sports SaaS DDoS Remote Workers Marketing Data Breach Windows 7 Websites Twitter Running Cable Free Resource iPhone Meetings Education Cortana Mobility Law Enforcement End of Support Content Filtering Storage Printer How To Google Maps Monitoring Scam Router Healthcare VPN The Internet of Things YouTube User Travel Virtual Reality Update Social Engineering Cryptocurrency Black Market Laptop Taxes Excel Cooperation Politics Downtime Video Conferencing Settings Safety Machine Learning Virtual Machines Computer Repair PowerPoint Solid State Drive Physical Security Virtual Desktop Administration Professional Services Virtual Assistant Experience Presentation Specifications Chromebook Drones IT Consultant Start Menu Automobile Computer Care Managed Services Provider Downloads Customer Relationship Management Disaster Processor Virtual Private Network Vulnerability Co-Managed IT How To Entertainment Software as a Service Microchip Current Events Lithium-ion battery Data Protection Flexibility Solutions Multi-factor Authentication Hack Identity Theft Processors Integration Notifications Images 101 Unified Communications Display Saving Time HIPAA Google Docs Bluetooth Tech Terms Bitcoin Distributed Denial of Service Employees Computers Avoiding Downtime Managed IT Office Tips Memory Telephone Digital Private Cloud Wireless Technology Holidays eWaste Flash Social Network Virtual Machine intranet Access Time Management Public Cloud Telephone Systems Reviews Wireless Business Growth Data Analysis Optimization Shortcut Screen Reader Heating/Cooling Trends Teamwork Environment Mobile Technology 2FA Security Cameras Windows XP Data Storage Customer Resource management Hypervisor Audit Social Networking Inbound Marketing Devices Spyware Tip of the week File Sharing Banking Shopping Google Wallet Fileless Malware Medical IT Gamification SQL Server Redundancy Company Culture Supply Chain Messenger Paperless Deep Learning PCI DSS Telephone System Licensing Regulations Cache Backup and Disaster Recovery Unified Threat Management Workers Business Metrics Gig Economy Hosted Solution Directions Humor Electronic Payment Internet Service Provider Content Azure Desktop Workplace Books Business Communications CCTV Language Regulations Compliance Society Electronic Medical Records Managed IT Service Printing Accountants Database Touchscreen Phone System Staffing Memes Monitors Net Neutrality IP Address Visible Light Communication Emergency Scams Reading Computer Malfunction Human Resources Financial Data Windows 8 Health IT Equifax Vendor Mangement Tactics Hard Drive Disposal Samsung Risk Management IT Displays Advertising Username Uninterrupted Power Supply Cables Relocation Webcam Google Apps Freedom of Information Work/Life Balance Telework Tech Support Startup Business Mangement Computer Accessories Addiction Microsoft 365 email scam Tablets Smartwatch Recovery Navigation Communitications Competition Procurement Mobile Security Point of Sale News In Internet of Things Supercomputer LiFi FinTech User Tip Google Calendar Entrepreneur Legislation Network Management Virus Shortcuts Hacks CES Documents Network Congestion Evernote IT Assessment Application Writing Supply Chain Management Value Business Intelligence Reliable Computing Motion Sickness Fake News Organization Proxy Server Cyber security Comparison Emails Google Drive Service Level Agreement Computing Infrastructure Be Proactive Securty Smart Devices Remote Working Domains Management Knowledge Troubleshooting Device security Corporate Profile Scalability Microsoft Excel Administrator Employer Employee Relationship Text Messaging AI Proactive IT Trend Micro Television Wireless Headphones Telephony Going Green Transportation Business Cards Cabling Workplace Strategies Bring Your Own Device Digital Security Cameras Tech Electronic Health Records Error Wasting Time Tablet G Suite Tracking Music Bookmark eCommerce Mouse Modem VoIP Public Speaking Download Piracy Videos Term Surveillance Streaming Media Managing Costs Business Owner HTML Web Server Botnet Digital Payment Browsers SharePoint Keyboard Nanotechnology SSID Hard Drives Upload Employer/Employee Relationships Software License Worker Smart Technology Rental Service Media Micrsooft Google Play Development

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?