ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that ClearView IT can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 866-326-7214 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Smartphones Small Business Microsoft Office Upgrade Mobile Devices Network Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Facebook Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Apps Browser Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Networking Managed IT services Gadgets Windows Workplace Strategy Business Technology WiFi Bandwidth Blockchain Encryption Server App Information Remote Virtualization Spam Mobile Device Management Apple Information Technology Gmail Office History Employee/Employer Relationship Two-factor Authentication Budget Office 365 Cybercrime Conferencing Access Control Big Data Data Security Wi-Fi Health BDR Analytics Cost Management IT Management Training Compliance Document Management Save Money Help Desk Hacking Patch Management Employer-Employee Relationship Vendor Remote Monitoring Hacker Voice over Internet Protocol Remote Computing Customer Service Password Unified Threat Management Firewall Managed Services Data loss Augmented Reality Word Legal IBM Data storage Website Search... Best Practice Applications Retail Alert Project Management BYOD Vulnerabilities Hiring/Firing Computing Money Vendor Management Outlook Hard Drive Mobile Office Sports Social SaaS Windows 7 DDoS Free Resource Chrome Twitter Google Maps Scam Law Enforcement How To iPhone End of Support Education Cortana Printer Content Filtering VPN Mobile Computing Update Marketing Router Running Cable Travel The Internet of Things Virtual Reality Data Breach YouTube Social Engineering Storage Cryptocurrency Paperless Office Antivirus Black Market Maintenance Cleaning Laptop Robot Windows 11 Monitoring Healthcare User Websites Remote Workers Mobility Meetings Chromebook Software as a Service Drones Managed Services Provider Data Protection Computers Bitcoin Automobile Virtual Private Network Telephone How To Current Events Disaster Microchip Flexibility Excel Solutions PowerPoint Administration Lithium-ion battery Tech Terms Images 101 Integration Presentation Specifications Hack Identity Theft Display IT Consultant Notifications Managed IT Digital Unified Communications Virtual Assistant Processors Google Docs Customer Relationship Management Employees Co-Managed IT Bluetooth Taxes Avoiding Downtime Entertainment Distributed Denial of Service Office Tips Holidays Private Cloud Processor Memory Cooperation Video Conferencing Physical Security Wireless Technology eWaste Virtual Machines Politics Machine Learning Settings Computer Repair Downtime Multi-factor Authentication Start Menu Professional Services Safety HIPAA Solid State Drive Downloads Computer Care Virtual Desktop Vulnerability Saving Time Experience Error Financial Data Tablets Monitors IT Visible Light Communication Scams Reading Bookmark Risk Management Google Calendar Term Google Apps Download Windows 8 Supercomputer Piracy Staffing IP Address Virus Telework HTML Relocation Browsers Smartwatch Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Inbound Marketing Comparison Google Play Work/Life Balance Google Drive Upload Procurement Tech Support Software License Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale Competition In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Recovery Network Congestion Cabling Devices Cyber security Shortcuts Electronic Payment Hacks Customer Resource management Organization Reliable Computing Fileless Malware Writing Tablet Smart Devices LiFi G Suite Tip of the week Entrepreneur Application Mouse VoIP Gamification Remote Working Tracking Company Culture Documents Regulations Trend Micro Be Proactive Business Intelligence Phone System Telephone System AI Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Securty Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Worker Accountants eCommerce Modem Workplace Strategies Domains Bring Your Own Device Electronic Medical Records Videos Access Database Surveillance Computer Accessories Time Management Music Public Cloud Managing Costs Equifax SSID Health IT Audit Media Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Public Speaking Botnet Username File Sharing Virtual Machine Micrsooft Startup Optimization Streaming Media Freedom of Information Smart Technology Rental Service Redundancy Reviews Keyboard Navigation 2FA Flash Cache Addiction email scam Teamwork Hard Drives Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor Legislation News Medical IT intranet User Tip Shopping Shortcut Troubleshooting Printing Evernote Paperless Network Management CCTV SQL Server Wireless Heating/Cooling Environment Banking Touchscreen PCI DSS Google Wallet Licensing Deep Learning Emails Humor Windows XP Computer Malfunction Fake News Supply Chain Social Networking Messenger Emergency Proxy Server Gig Economy Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Books Business Owner Tech Human Resources Language Business Mangement Going Green Net Neutrality Society Business Cards

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?