What is this scam?

I received this message on Linkedin.

Hello David. This is Chun. I found some U.S. software projects. To start project my client wants to send laptop. Can you receive it and turn it on please? So I can work remotely? I can pay some money for this?

What he’s saying doesn’t make much sense. Why would he need me to host a laptop for him to work on remotely? He obviously has his own computer.

But I can’t figure out the scam. It seems unlikely but could this be someone trying to plant connected laptops around the country for nefarious purposes?

Probably the beginning of a longer scam – they send this to thousands of accounts and assume those who respond are more gullible and more likely to accede to further requests, whether for money, gift cards, bank info, etc.

Probably, the next part is something like, “I sent the laptop, but it’s stuck in customs unless someone provides a SSN to prove they’re supposed to pick it up. Can you give me your SSN, so I can tell them you’re authorized to pick up the laptop?”

Or:

“I’m sending you a 2000 dollar money order to purchase this 1200 dollar laptop. Please purchase it, send me 500 back, and keep the rest as your fee.”

Of course, the money order is fraudulent and you end up on the hook for the whole thing.

All of these suggestions make sense. I can’t really play with this scammer since he knows my name. I’ll just report him and reject the contact request.

Or maybe the scammer is using the laptop for hacking, knowing that it can be traced to your address?

You could create a brand new throwaway email address with a fake name and reply from that one. The scammer is unlikely to bother attempting to connect up the replies with the addresses they actually spammed.

In case they’re more clever than average, don’t quote any of the original message when you respond from the other address, in case there was tracking steganography embedded in it.

A post was merged into an existing topic: Anything’s Troll Post Replies

In order for them to work remotely, the laptop will have to be connected to a network - your network.
Now a hacker has a laptop connected to your network.

Another angle: Sometimes, they direct you to buy from a particular vendor.