Forget the Nigerian spam scam; now it's a take-off on Three Kings
'This one is much easier to fall for,' says a Symantec researcher
Computerworld - A twist on the classic Nigerian e-mail scam that steals from the plot of the George Clooney movie Three Kings is hitting in-boxes, Symantec Corp. said Monday.
In these e-mails, a U.S. soldier based in Iraq claims that he has found a horde of cash or gold, a plot point central to the 1999 film. The e-mail explains that the total "haul," which is often pegged at $750 million but can vary wildly from spam run to spam run, has been split among the men who found it. The soldier's take: $20 million. Unfortunately, after he was cashiered from the army and returned to Iraq to work as -- tugging at the heartstrings -- a humanitarian worker, he was injured by a roadside bomb and now is on his deathbed.
"The doctors have told me point blank that I would die at any moment," the soldier writes in the spam message.
All the recipient has to do to collect the millions -- or sometimes only half, with the other going to a charity -- is give up an e-mail address and phone number.
"You are now being e-mailed by a soldier, an American soldier who wants to share his new-found wealth," said Kelly Conley, a researcher at Symantec, on the security group's blog. "He is an American, so it's not like you're sending your money to the great unknown of a stranger or foreigner, right? This one is much easier to fall for."
In traditional Nigerian schemes -- dubbed that because they typically originate from the West African country -- scammers claim that they need help in moving money to the U.S. The messages promise recipients a share in return for an upfront fee, and therein lies the scam.
"All of a sudden the game changes," said Conley. "It's no longer written in poor English, where you deal with a stranger for the purpose of purely obtaining cash for personal gain. Instead it's [an] injured American soldier who wants to share his fortune with you and charity."
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts