Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

Understanding Advance-Fee Fraud

The kind of scam that we’re referencing, officially known as advance-fee fraud, has been around for centuries. Many scams were conducted in the 18th and 19th centuries that involved letters sent to victims requesting a small amount of money, with the promise of a large reward in return. One such scam, known as the Spanish Prisoner, purported that the writer was trying to help smuggle a wealthy captive out of a prison in Spain and needed money to bribe the guards.

The famed French investigator Eugene Francois Vidocq included an account of a similar letter in his memoirs, and transnational scams have been charted from 1922.

The name “Nigerian Prince scam” comes from perhaps the most famous example, where a royal seeking to escape from some danger requests assistance in transferring their great wealth—with a significant cut going to the person who assists them, of course.

Once the Internet entered the equation, these scams became even more prevalent, as there were no longer postal costs restricting the number of messages that these scammers can send.

Why Are These Scams So Sloppy?

As we’ve established, these scams are something of a modern punchline. The premise of the scam alone has become an instant red flag for most people, which begs the question: why is it still used at all?

A few years ago, in 2012, a Microsoft researcher named Cormac Herley wanted to find out, and so he underwent a research project to dig into the tactics of the cybercriminals who launch these transparent advance-fee fraud scams. His research revealed a fascinatingly simple concept: these scams are effectively a hacker’s litmus test for promising victims.

Here’s the crux of the matter. False positives (or an incorrect assumption that something worked) influence tests and analyses of all kinds. For an attacker, they are anyone who is targeted but doesn’t ultimately take the bait. As cyberattacks require some investment from the perpetrator, the greater the number of false positives they target, the less worth their time a scam will be.

Through many complicated mathematical formulas and the analysis of assorted cybercrime statistics, Herley found that by mentioning “Nigeria” in the very beginning of a scam, it was possible for cybercriminals to only attract the most gullible people from the very beginning. This meant that the investment that was necessary for the rest of the scam was more likely to pay off.

By optimizing their target pool through outlandish stories and obvious spelling and grammar errors, scammers are simply taking the most economical option.

You can see Herley’s research article here for the full equations and details.

Protecting Your Business

However, this doesn’t mean that all scams are so obvious, so it is important that you and your team are aware of what to keep an eye out for. The Federal Bureau of Investigation has a few suggestions to help you and your users keep an eye out for advance-fee scams that Voyage Technology can get behind:

  • If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

As for your business, your team needs to be able to spot the warning signs that a message isn’t all that it says to be. This kind of activity is now known as phishing and comes in many forms.

To learn more about phishing and other threats (and how to keep them from becoming a problem for your business), subscribe to our blog! Of course, we’re always available at 800.618.9844 to discuss your business’ cybersecurity needs as well. Give us a call today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 06 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Covid-19 Gadgets Cloud Computing Training Managed Service Provider Outsourced IT Remote Work Server IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Blockchain Virtualization Wi-Fi Vendor Data Security Apps Managed Services Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Office 365 Password Managed IT Services HIPAA How To Applications BDR Computing Physical Security Hacker Information Technology Conferencing Avoiding Downtime Marketing Access Control Office Tips Analytics Augmented Reality Retail Storage Bring Your Own Device Big Data Router Operating System 2FA Help Desk Computers Virtual Private Network Risk Management Website Health Healthcare Cooperation Free Resource Firewall Document Management Project Management Windows 7 Microsoft 365 The Internet of Things Scam Data loss Solutions Social Going Green Patch Management Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Monitoring Customer Service Cybercrime Excel Display Printer Remote Workers Managed IT Service Paperless Office Telephone Infrastructure iPhone Licensing Word Outlook Vulnerabilities Machine Learning Entertainment Data Privacy Money Humor Images 101 Maintenance Telephone System Multi-Factor Authentication Safety Mobility Antivirus Sports Cost Management Mouse Administration Employees Integration User Tip Modem Mobile Security Processor Robot Customer Relationship Management Settings Holidays Printing Wireless Content Filtering Data Storage Hacking IT Management Smart Technology Supply Chain Presentation VPN YouTube Meetings Video Conferencing Managed Services Provider Cryptocurrency Saving Time Virtual Machines Professional Services Wireless Technology Computer Repair Virtual Desktop Data storage Downloads LiFi Hard Drives Windows 8 Laptop Websites Browsers Smartwatch Connectivity IT Break Fix Scams Upload Procurement Azure Hybrid Work Domains Drones Electronic Medical Records Social Network Telework Cyber security SharePoint Multi-Factor Security Tech Human Resources Dark Web Cables Refrigeration Halloween CES IoT Communitications Trends Supply Chain Management Public Speaking Lenovo Writing Virtual Reality Customer Resource management FinTech Regulations Lithium-ion battery Google Calendar Term Google Apps Microsoft Excel IT Maintenance Hacks Server Management Entrepreneur Scary Stories Private Cloud Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Superfish Identity Theft Fun Deep Learning Twitter Organization Social Networking Legislation Shortcuts Ransmoware Undo Error Fileless Malware Digital Security Cameras Smart Devices Social Engineering Content Remote Working Wearable Technology Memory Vendors Education Remote Computing Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Mobile Computing Directions Videos Assessment Electronic Health Records Search Wasting Time Threats Tablet Application Best Practice Alert Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Managed IT Buisness File Sharing Microchip Dark Data Internet Exlporer Software as a Service How To Username Managing Costs Amazon IBM Legal IT solutions Business Growth Notifications eCommerce Black Friday SSID Virtual Assistant Outsource IT Travel Database Surveillance Cortana IT Technicians Virtual Machine Environment Techology Media Google Maps Alt Codes Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Competition Downtime Unified Threat Management Tactics Development Mirgation Hypervisor Displays Unified Threat Management Hosted Solution Typing Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Network Congestion Addiction Knowledge Management PCI DSS Chatbots Google Drive User Error Navigation User Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Point of Sale 5G Service Level Agreement Internet Service Provider Experience Regulations Compliance Identity IP Address Google Docs Evernote Paperless Unified Communications Bitcoin Network Management Running Cable Tech Support Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Google Wallet Monitors Download Net Neutrality Financial Data History Business Communications Recovery

Blog Archive