Our team at iT5 aims not only to help clients choose the right computer equipment, but also to protect them from the increasing number of online scammers. We present you with a clear and practical example from a real-life situation, including detailed explanations that help understand the risks.
Received alleged business proposal via email:
Hi,
I am Chloe, purchasing manager of Ecim Group Europe.
Please is it possible to provide an immediate quote to us with your 2025 price list?
We need your best possible price so as to enable us make a decision on our requirements this second quarter.
Awaiting your feedback?
Best regards,
Chloe Moreau
1. Strange Email Address
Sender: gradestin@cai.ddnsgeek.com – the domain ddnsgeek.com belongs to free, publicly available temporary services intended for testing or personal projects. Professional companies do not use such domains. The email structure: gradestin – a random username, cai – a non-descriptive subdomain.
2. Non-existent Company
"Ecim Group Europe" is not found in official business registries or search engines. The company has no website, contact details, company code, or any other traces. Legitimate companies always leave a digital footprint online.
3. Poor Language Quality
Phrases such as "enable us make", "Please is it possible", "Awaiting your feedback?" indicate that the email was written using automatic translation tools or the author is not a native English speaker. In international business communication, emails are expected to be written correctly.
4. Lack of Specific Details
There is no mention of what goods are being sought, their quantity, or technical requirements. Professional purchasing managers provide clear information about their needs.
5. Scammer's Tactic
This is known as the "urgent price" scheme. Scammers deliberately create a sense of urgency to prompt you to act quickly without proper verification. The typical sequence is: a request to immediately provide an invoice, to send goods to an "unspecified warehouse", and to pay for alleged services, customs, or other fees.
DDNS (Dynamic DNS) allows anyone to quickly create subdomains, which is why it is often used for temporary schemes or even scam servers. Such addresses are uncontrolled and can be easily changed or deleted.
1. Check the email address – verify if it is an official domain (e.g., @imone.lt, @imone.com) rather than a suspicious ddnsgeek.com.
2. Look for company traces – check if the company has a website, contact information, or registration details.
3. Assess the language quality – in business correspondence, errors such as "Awaiting your feedback?" or "enable us make" are unacceptable.
4. Do not disclose information – do not provide prices, contracts, or invoices until you are sure it is a genuine client.
5. Consult with experts – if in doubt, contact iT5 for an evaluation of the situation.
Our goal is not only to help you find the right equipment, but also to protect you from online scams.
iT5 – more than just computer hardware: reliable solutions and security for your business.