Joke Collection Website - Blessing messages - The "nine routines" for scammers to use big data for telecom fraud
The "nine routines" for scammers to use big data for telecom fraud
Nowadays, telecom fraud is not just a simple message to inform you of winning the prize, or a trick to call you to the office by the "leader". Take stock of the "nine routines" of telecom fraud through big data analysis to help consumers polish their eyes and see through scams. Most importantly, in today's flood of personal information disclosure, I must have a string in my heart-there is no such thing as a free lunch.
Routine one
"The funds in your account have changed abnormally.
The swindler first steals the victim's online banking login account and password, and creates the illusion that the bank card has money flowing out by buying precious metals and changing the current account to regular account. Then the fake customer service called to confirm whether the transaction was my operation, and agreed to give the user a refund to defraud the user's trust. The scammer will once again create the illusion that the funds in the user's account are returned through the fund transaction in the account. However, due to the transaction fee, the refund amount is generally less than the previous internal transaction amount. Next, the scammer will use the victim's online banking to transfer money, or open a fast payment operation, and select the SMS verification code for verification, so that the victim's mobile phone will receive a verification code message. Finally, the scammer asked the victim to provide the verification code received by his mobile phone immediately on the grounds of limited time refund. Once the victim provides the SMS verification code to the other party, the other party succeeds.
How: Almost flawless. The simplest and most effective way is to call the official customer service phone number of the bank immediately for verification, and don't believe any call that comes in and claims to be customer service.
Nine routines of telecom fraud
Routine 2
"You are suspected of breaking the law."
"You are suspected of money laundering", "You are suspected of illegal fund-raising" and "Credit overdraft is subject to criminal responsibility", all of which are the reasons for pretending to be a public security law to commit fraud. This technique is not new, but because of its great deterrent, people who don't understand this kind of fraud are still easy to be fooled. Nowadays, many scammers pretend to be official customer service numbers through rebranding software, but if the victim really dials back, they can generally see through the scam. There is even an "upgraded version": scammers guide users to place orders by phone on the grounds of giving away free items and mail them in the form of cash on delivery. If the user refuses to sign for the courier or return the goods, the liar will threaten the user with the tone of the public security law and cheat.
How to break it: don't trust strangers' phone calls easily. If someone says he is suspected of committing a crime, he should first call 1 10 to ask. Or ask friends and relatives around you, and you can usually see through the scam quickly.
Routine 3
"Your flight XX has been cancelled."
Booking plane tickets by mobile phone has become the export of online fraud. Liars lied about changing the visa and refunding the ticket, guiding people into phishing websites, making false numbers, and walking into remittance traps. Tencent 2065438+Big Data Report on Anti-Telecommunication Network Fraud in the Second Quarter of 2006 shows that this kind of fraud is as high as 44%, which has become the mainstream of online fraud. Liars can accurately tell the victim's name and flight information, and often cheat in the name of obtaining compensation for change of visa.
How to break it: The ticket refund and change business is handled through the official channels such as the airline's website, telephone, service hall and ticket agent. Don't trust any phone calls and text messages, even if they are completely consistent with my information.
Routine four
"If the goods you bought are out of stock, you can apply for a refund."
The scammer first fully grasps the online shopping information of the victim, gains the trust of the victim by accurately describing the shopping information of the victim, and then obtains the bank card number, password and SMS verification code of the victim. Liars sometimes get relevant information directly by phone, and sometimes let victims open phishing websites and fill in relevant information manually. When the bank card number, password and verification code were leaked at the same time, the swindler successfully transferred the money in the victim's online banking account.
How to break it: In case of abnormal commodity trading or out of stock, you should first consult the official customer service phone number of the shopping website, and don't trust people who call in and claim to be customer service. Online shopping accounts and payment accounts should have separate passwords, which should be complicated enough and be changed regularly.
Routine 5: "Recommend Top Ten Bull Stocks for You"
This kind of deception usually collects deposits or deposits from users in the name of learning stock knowledge and recommending stocks, which is especially effective for those new investors who are eager for success. In fact, formal securities companies generally do not provide paid stock recommendation services to shareholders, nor do they collect deposits or deposits from users in this name. They usually send photos or pictures such as company business license, industrial and commercial certificate or organization code. , just call the official customer service of the securities company to ask.
How to break it: don't trust any information about stock recommendation and stock selection, whether it comes from websites, QQ, text messages or telephone calls. It can be verified by calling back the official customer service phone.
Routine 6: "699 yuan free Apple 6S"
Recently, Hunan police reported a new fraud case. A fraud gang sent fake or damaged mobile phones or mobile phone molds to the victims for fraud in the name of "collecting personal income tax of 699 yuan and giving away Apple 6S mobile phones and 700 yuan calling cards for free". In two months, hundreds of people were cheated and the amount of fraud was several hundred thousand yuan.
How to break it: fraud in the name of seemingly legal promotion, you can't take any chances, and there will be no pie in the sky.
Routine 7: "Please receive the newborn allowance in time"
Criminals cheat on the grounds of receiving neonatal allowance, because they can tell the details of the victim and make the deceived believe it. After obtaining the victim's bank account, the scammer usually asks the victim to operate at the ATM and follow the other party's "guidance" to enter the English operation interface. Because the victims can't understand the English prompts on the ATM, they often regard the transfer procedure as an input verification code and eventually fall for it.
How to break it: don't trust such calls or text messages, let alone operate at ATM machines.
Routine 8: Replace the mobile phone card
Recently, the routine of this kind of fraud is usually to bomb the mobile phone with hundreds of spam messages and harassing calls to cover up the reminder message of card replacement service sent by 10086 customer service to the mobile phone number; Then take temporary id card with the victim information to the business hall to reissue the mobile phone card, so that the owner's own mobile phone card is passively invalid; Finally, modify the password of mobile customer service and bank card, and steal the money of bank card bound by mobile APP through SMS verification code.
How to break it: commonly used website passwords and customer service passwords are best different from key business login passwords such as bank passwords, and are revised regularly; Don't click on the links sent by various numbers. If you receive a lot of harassing calls or text messages, don't turn off your phone. Mobile phone security software should be used to block harassing numbers and unbind bank cards immediately. When using public ***WiFi, try not to log in to the bank APP in your mobile phone or use your mobile phone to transfer money.
Routine 9: "Xiao San is pregnant and needs money badly to have an abortion"
This is an active type of fraud for a long time, but recently, a liar who is pregnant and in urgent need of money for abortion cheated more than 80 elderly people. Liars make full use of the characteristics of the old man's distressed son to lure the victim to transfer money. This is a relatively new means, and it is also a constant renovation and improvement of scammers in deception.
How to break it: don't trust the phone call from strangers easily, especially if you have something urgent to pay. Nine routines of telecom fraud
6.5438+0.6 million people are distributed in the black industrial chain.
Dozens of jobs are interlocking.
The drama of telecom fraud is staged every day, and the scripts of fraudsters are constantly being refurbished. Pei Zhiyong, the chief anti-fraud expert of a website, said that telecom fraud has now formed a black industrial chain from upstream personal information grabbing and selling to fraud spoiler. What is staggering is that this chain is becoming more and more industrialized and specialized, the division of labor is becoming more and more detailed, new roles are constantly emerging, and twenty or thirty "jobs" are interlocking.
According to the data of a website's phishing platform, the scale of China's information fraud industry exceeds115.2 billion yuan, and the number of fraudsters exceeds1600,000. Telecom fraud has been successful many times. Security experts believe that the huge amount of telecom fraud, widespread information leakage, perfect industrial chain and systematic training of employees have all become key factors.
It is understood that the fraud industry chain is divided into at least four major links: upstream information acquisition, intermediate wholesale sales, public fraud, and finally sharing stolen goods. In these four links, there are many jobs, such as fishing editing, Trojan horse development, library hacker, fishing retailer, domain name dealer, letter wholesaler, bank card dealer, phone card dealer, identity card dealer, telephone fraud manager, SMS agent, online promotion technician, financial accountant, ATM pony, and middleman who divides stolen goods, which lead the victims into the trap step by step.
- Related articles
- Institutions have been unable to get through SMEs.
- The girl was trapped in the elevator and pressed the alarm for 6 hours. Property: I thought there was a false alarm! Why is the girl trapped?
- My ex said she missed me. Send me a message.
- Complete works of encouraging comments on students
- How to sign an enterprise electronic contract?
- What I want to say to the kindergarten director
- Sentences praising war friendship
- Is it illegal to promote the registration of the app and get the commission?
- How to cancel Dajie.com's account?
- Can Taobao SMS be sent to a customer separately?