Joke Collection Website - Blessing messages - The latest news on telecommunications fraud in Xiangfan 2016
The latest news on telecommunications fraud in Xiangfan 2016
The Xiangyang police announced that they had successfully cracked the "6·30" series of telecommunications fraud cases using the "four detections and one integration" integrated combat model, and 15 suspects were arrested.
In this case, the victims were located in about 300 counties (cities) and districts across the country, and the criminal suspect’s computer desktop contained various information about more than 10,000 victims. Professional teams are responsible for designing Trojan viruses, analyzing victim information, querying and completing bank card information, handling various bank cards, money laundering, etc...
Thousand-mile pursuit
This year 6 On the afternoon of March 30, Li, the person in charge of a company in Xiangzhou District (all the victims in the article have changed surnames), just sent a text message to Mr. Zhang, the person in charge of the head office, and made an appointment for a place to eat in the evening. A few minutes later, "Mr. Zhang" replied to the text message and said: "I need to borrow 20,000 yuan for an urgent matter. Pay it to so-and-so's account."
Li then arranged for the accountant Ma to transfer the 20,000 yuan to the account. on the designated bank account. But within a few minutes, "Mr. Zhang" sent another text message, saying that he wanted to borrow another 30,000 yuan, which was also transferred to the same account. Li immediately became suspicious and called Mr. Zhang. He discovered that he had encountered telecommunications fraud and immediately called the police.
An investigation by the Xiangzhou Criminal Police Brigade found that Mr. Zhang’s mobile phone had received a strange text message. After clicking on the link, he was infected with a Trojan horse virus and his phone went silent. The text message was intercepted and sent by a telecommunications fraud gang. .
The Xiangyang police immediately established the "6·30" task force, led by the Municipal Criminal Investigation Detachment, with the Xiangzhou Criminal Police Brigade as the main investigator, and various police departments cooperated in investigating the case.
The task force investigated and found that 20,000 yuan was paid into an ICBC account in Beijing, and the head of the household was named "Liang Lei." On the day the money was entered into the account, it was transferred to the account of "Li Lu" and was taken away in Binyang, Guangxi.
Relevant videos confirmed that the man who withdrew money had repeatedly withdrawn money from local teller machines. Fan Qijiang, deputy captain of the Xiangzhou Criminal Police Brigade, led the team to Binyang. With the assistance of the local police, after searching and waiting for more than a month, the suspect Long was finally identified in early August.
On August 6, the police arrested Long at his home. At that time, Long was studying the victim’s information to create fraudulent information containing viruses.
Cut off the chain
The arrest of Long revealed the tip of the iceberg of the black industry chain of telecommunications fraud. Based on Long’s confession, the police clarified the relevant links of this black industry chain:
The first section was controlled by Lu. He bought ID cards from the local black market and hired locals with similar looks to hold these ID cards. The ID cards were used to apply for mobile phone cards and bank cards, and then the ID cards, mobile phone cards, bank cards and passwords were packaged and sold to Long's fraud gang at a price of four to five hundred yuan a set.
The second section is about Gao, a programmer with the online name "Pawn Shop". He is responsible for making Trojan viruses and renting the virus and its background program to Long for 1,000 yuan a week. Other fraud gangs such as Du and Song also rented Trojan viruses from Gao.
The third section is about the Long fraud group. They send a large number of text messages with Trojan viruses in bulk. Once someone clicks on them, they can immediately obtain the address book, text messages and other information on their mobile phones. If the victim's text message contains bank card information related to remittance, consumption, repayment, etc., they will analyze and judge the content of the victim's text message, and generally pretend to be the victim and send various fraudulent messages to friends on his address book to commit fraud. .
The fourth section is about Zhang’s family from Guangdong. Long provided the incomplete bank card information to Zhang, who completed the information, and Zhang then bound the third-party payment provided the bank card information to Long. Zhang's family once made a profit of 600,000 yuan in one month.
The fifth section is about "Qian Duoduo" Chen, a netizen from Hangzhou, Zhejiang. He is responsible for quickly transferring money from his account through online banking, and often splits the large amounts of money fraudulently obtained into multiple cards. , special personnel will withdraw the money from ATMs in various places, or launder the money by purchasing game cards, phone cards, online payments, etc., and transfer it to the account of Long's fraud gang.
The task force found that the account of "Liang Lei" controlled by Long had transactions with at least 12 other accounts every day, including Lu, Gao, Zhang, Chen and others.
After Long was arrested, the police of the task force successively closed the net. By late November, 15 people involved in the case were arrested one after another.
Remediate quickly
Yesterday, Zhang Yaoming, a policeman from the task force, said that the most critical thing to prevent this type of telecommunications fraud is that links in text messages from unknown sources must not be included. Click.
He said that the text messages compiled and sent by Long and others took advantage of people's curiosity, such as "Your lover did such a thing", "Something happened to your family", "Class reunion photos are stored in "Here", etc. If you click on such a link, the Trojan virus will quickly invade and directly put your phone into a silent state. Your address book and text messages will all be obtained and intercepted by the fraud gang.
In the "6·30" case, after the text message sent by Li to Mr. Zhang was intercepted, the fraud gang immediately analyzed the content of the text message. If they thought that the other party might be fooled, they would send various fraud messages with different contents. It will be compiled and distributed soon.
How to prevent yourself from clicking on these links?
The police said that if you click on the link by mistake, you must flash your phone as soon as possible. Citizens who have bank cards or third-party payment software bound to their phones should go to the bank as soon as possible to change their passwords, change cards, and unbind them. Wait for remedial work, and if necessary, you can first apply to freeze relevant accounts to avoid further losses.
- Previous article:March 8 women's day greetings
- Next article:I can't press the apple button. What's going on here?
- Related articles
- Will Apple miss the SMS when its phone is turned off?
- A harbinger of my husband's ex-wife
- Tomb-Sweeping Day pictures _ Tomb-Sweeping Day pictures, Tomb-Sweeping Day pictures _ Tomb-Sweeping Day pictures.
- Do not display mobile phone short message punching
- Why is the unit "jiao" in RMB called "gross" and "yuan" called "block"?
- 7. Advanced typical deeds of township epidemic prevention and control
- Someone gave me a mobile phone with the number 134. Every time a text message comes, there is a +86 before the number, and then the other party's number. What happened? Is it a foreign mobile phone?
- In fact, 100 10 is the most annoying message, but many softwares can't stop it 100 10. How to break it?
- Where can I apply for an sp business license?
- The girl who handed the note to the driver in Gansu to confess her love was found. Why would this girl be nice to the driver?