BNMC Blog

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Yeah, There’s a Reason Some Scams are So Obvious

Yeah, There’s a Reason Some Scams are So Obvious

We’ve all seen them: the scam emails that are so obviously a scam, you have no idea why a scammer or a cybercriminal would even bother sending them. It just so happens that there is a very good reason that criminals continue to use these transparent attacks, as they have done for centuries.

Advance-Fee Fraud and Its Origins

Believe it or not, those emails have their roots in the 18th and 19th centuries, where scammers wrote letters to their targets begging for some small financial assistance in exchange for a significant reward. Rather than a Nigerian prince seeking escape from political turmoil, one such attempt featured a wealthy Spanish prisoner that needed to be smuggled out of Spain and required some investment to bribe the guards. These scams continued over the years, appearing in French investigator Vidocq’s memoirs and reports of other transnational scams exist from 1922.

Today, these advance-fee scams are most recognizable in the form of the Nigerian Prince scam, as referenced above… and thanks to the Internet, they are far more prevalent, as there aren’t even postal costs to prevent scammers from using them on a widespread basis.

Why These Scams are Notoriously Obvious

One would think that, as a scam that has become the go-to example of a scam, cybercriminals would have abandoned it long ago—or at least worked to make them more convincing. So, why are these scams still around, and still so transparent?

In 2012, a researcher for Microsoft named Cormac Herley asked the same question and conducted a project to find the answer. His conclusion was brilliantly simple: these scams allowed hackers to weed through potential victims to find the ones most susceptible to their efforts.

Cyberattacks aren’t free for cybercriminals to carry out. So, just as anyone who invests in something would want, they want to see the greatest return for that investment. In a cybercriminal’s terms, this translates to the highest number of successfully scammed people who comply with their demands. Just like in any business, a cybercriminal will want to minimize the number of false positives (in this case, targets that never send over any money). Looking at it from an economic perspective, the higher the number of false positives the cybercriminal invests in, the lower the net payout for them.

After compiling statistics and going through the numbers, it became apparent to Herley that cybercriminals use the now-infamous word “Nigeria” in their scams to eliminate these false positives more effectively. Essentially, by using that word early on in their interaction with a potential victim, cybercriminals were able to shrink their target pool to only the most gullible or naïve people they had found.

By cutting out the false positives early in the game, scammers could minimize their investment without sacrificing any payoff. All the grammatical errors, misspelled words, and far-fetched tales just serve to eliminate the people who ultimately wouldn’t be fooled anyway. For more detail, you can find documentation of Herley’s process here.

How to Keep Your Business Safe

Of course, not all scams operate this way, so it is still important for you and your team to know what to keep an eye out for. The Federal Bureau of Investigation provides the following list of rules to follow to avoid scams:

  •  If something sounds too good to be true, it is safe to assume it is.
  • If you receive correspondence from someone asking for money or information, go through the proper steps to confirm the message’s legitimacy through other means, like a phone call.
  • Have a professional go over any agreement you’re about to enter so that you can fully understand what it says.

At BNMC, we agree, and would like to add that it is also crucial that your team is able to recognize phishing messages like these and knows how to handle them.

To learn more ways to help ensure your business’ cybersecurity, make sure that you subscribe to our blog, and don’t hesitate to call us directly. We’re more than happy to help you figure out how to improve your cybersecurity. Call 978-482-2020 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 09 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hackers Hosted Solutions Efficiency Software Computer Business Malware Data Google Communication Small Business IT Services Workplace Tips IT Support Mobile Devices Hardware Internet Cloud Computing Tech Term Smartphone Managed IT Services Data Recovery Android Backup Innovation Ransomware Mobile Device Outsourced IT Users Windows Smartphones Information Phishing Upgrade Saving Money Disaster Recovery Facebook Data Backup Miscellaneous Network Microsoft Office Business Management Browser Windows 10 VoIP Server Cybersecurity Social Media communications Office 365 Business Continuity Productivity Managed IT Services Windows 10 Passwords Internet of Things Data Management Gmail Quick Tips Gadgets Word Vulnerability Remote Monitoring App Artificial Intelligence Mobile Office Infrastructure Encryption Managed Service Chrome Managed Service Provider Apps BYOD Company Culture IT Support Money Settings Tip of the week Remote Workers Information Technology Save Money Google Drive Employer-Employee Relationship Networking Virtual Reality Access Control Analytics VPN Remote Work Applications Website Government Router Virtual Private Network Computers Hacker Data storage Unified Threat Management Big Data Conferencing Employee-Employer Relationship Display Spam Collaboration Firewall WiFi Maintenance Avoiding Downtime Robot Antivirus Development Bandwidth Automation Content Filtering COVID-19 HIPAA YouTube BDR Risk Management Education Apple Storage IT Management Data Security Paperless Office Business Technology Office Tips Wi-Fi Password Touchscreen Compliance Business Intelligence iOS Virtualization Laptop Managed IT Holiday How To The Internet of Things Tablet Data loss Telephone Systems Retail Alert Regulations desktop Managed Services Outlook Augmented Reality Computing Downtime MSP Two-factor Authentication Marketing Managing Stress Bring Your Own Device Operating System Social OneNote Monitors LiFi Managed IT Service Vendor Management Data Breach Humor Customer Relationship Management Scam Chromebook Hosted Solution Document Management IT Administration Best Practice Windows 7 Wireless Solid State Drive Software as a Service Mouse Break Fix Social Network End of Support Search Going Green Training Mobile Security Remote Computing Hard Disk Drive SaaS Printing Server Management Logistics Hotspot Virtual Desktop Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing PCI DSS Sports Legal Hybrid Cloud Microsoft Excel Spying Windows 8 National Security Techology IT Technicians Optimization Unified Communications Security Cameras Drones Profiles Smart Technology Connectivity Students Lenovo Dark Data Inventory Update Staff Leominster Human Error Memory Statistics Modem FinTech Analysis Asset Management Language Value Mobile Device Management Virus Downloads Battery Deep Learning Scalability Mail Merge Blockchain Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Politics IoT Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools Meetings Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Digital Permissions Memes Health Private Cloud Computing Infrastructure Professional Services LED Threats Office Samsung Social Networking Migration Consulting Address Star Wars PowerPoint User Error Management Chatbots eWaste Laptops Budget Patch Management Tech Support Typing Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Spyware Alerts USB File Sharing Co-Managed IT Current Events Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Fraud Cost Management Onboarding GDPR Time Management Printer Policy Twitter Halloween Identity Continuity Managed Services Provider Websites Slack Cryptocurrency Hard Disk Drives Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Emergency Holidays Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Wires Corporate Profile Messaging Google Docs Assessment Automobile Digital Signage Hacks Data Warehouse Network Management Procedure Scary Stories Solar G Suite Entertainment Vendor Dark Web Distribution Monitoring Bitcoin Solid State Drives Network Congestion Running Cable Work Dell Shortcuts Google Wallet Mobile Management Cyber Monday Smart Tech Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation Printers IT Consultant Cameras Mobile Data Recovery How To Tracking Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Electronic Medical Records Financial Notifications Error Physical Security Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Botnet Personal Information Supercomputer CrashOverride Cortana 3D Printing Regulation Motion Sickness Staffing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3