Joke Collection Website - Blessing messages - How do fraudsters know personal information?

How do fraudsters know personal information?

Fraud gangs obtain our personal information in the following ways: The most common reason is that the unit that holds personal information is not confidential, which leads to disclosure. For example, some 4S shops selling cars lack corresponding secrecy system, which easily leads to the disclosure of personal information of car owners, which is also one of the reasons for the endless fraud of car tax refund.

Extended data:

What will the professional technical team of scammers do?

First of all, the ability of the technical team members of scammers can reach the ability of forging pseudo base stations, making Trojan viruses, phishing websites, phishing apps, and virtual number dialing.

It may be said here that many fans don't understand. What effect can pseudo base stations achieve? How can a liar secretly know our information?

1. 1 Means of data collection for fraudsters

1. 1. 1 The scammer's data collection method will generally get your mobile phone number through pseudo base station sniffing or harvest some basic online data such as personal post information, Q&A, WeChat, QQ, email, etc. Exposed by the internet through crawler technology.

1. 1.2 The scammer lures you by obtaining the mobile phone number and email address. Generally speaking, phishing websites or phishing links are generally disguised phishing websites, public security notices, account security warnings, etc. Click the link here to get the geographical location. Generally, the pc can't get much, but it can be implanted with cookie trojans.

1. 1.3 At this time, if you click in, you will not judge whether it is a phishing website. At this time, you fill in the account number and information, which is equivalent to providing the information to the liar yourself. Therefore, if you encounter such emails and text messages, don't fill in sensitive information at will. In any case, the platform will basically not ask you to fill in information such as bank cards and ID cards, so you should learn to distinguish such routines when surfing the Internet.

1. 1.4 Collect your personal data through rogue software. This rogue software may not be real rogue software, or it may be software disguised as a game. The scammer's technical team covered and rewritten the original game software and released it in an unknown application store, called the cracked version. At this time, people who like Bai Piao to a great extent are recruited, and you will hardly find out what he has done in the background, or even forbid permission. So don't always think about the cracked version, it is better and safer to choose the genuine one.

1. 1.5 free wifi. Liars will use wifi to collect data. Wifi can detect what we are doing, what websites we go to and what videos we watch in real time. All these can be achieved through technical means. For this reason, scammers will set up some free wifi in many public places and collect data through this WiFi. So after going out, reduce the use of free wifi that can log in without entering a password.

1. 1.6 website hijacking, and in some regular websites, the script Trojan with expired browser version is implanted. Generally speaking, you are constantly prompted to upgrade your browser, but the browser is the latest version, and the downloaded browser apk is another software. Generally, it is more common when browsing websites on mobile phones.

1. 1.7 Collect your personal information through viruses. There are only rogue apps in mobile phones, and there are only various types of Trojans and viruses in computers. A PC usually masquerades as a process, not as an exe client software. Such a process hacker can keep a housekeeper and a 60-year-old man from being discovered. Therefore, when using a computer, the best choice is to download and install the software through the housekeeper's shop or 60 stores, which must be audited. The mobile phone is relatively safe, and the unknown apk will not be implanted with viruses without downloading and installing it.

1.2 After the scammer gets all your basic information, he starts to analyze your data and psychology through your network usage records.

1.2. 1 You will have a basic understanding of your life from your usage record of the app and the search keywords of the search engine.

1.2.2 Then infer what you are doing recently through your other exposed social platforms, such as personal official WeChat account, friends circle, post bar, Zhihu, Baidu Know, etc. Any psychological and data analysis team that has any psychological desire or give up will implement accurate fraud scheme customization for you.

1.2.3 Finally, make a fake ID card, collect and calculate your name and ID number, and give you fishing bait. If the bait is on, and they are sure of the information, then the fraud scheme tailored for you will be implemented by the implementation team! In fact, everyone's personal information is basically exposed. These are not necessarily collected by scammers, just browsing specific platforms or websites.

1.3 How do scammers cheat you through various numbers?

1.3. 1 First of all, scammers can use pseudo base stations to disguise other numbers to call you. This situation is basically that there are fake pseudo base stations in your area. Generally, this pseudo base station can be realized by desktop computers, notebooks and other devices.

1.3.2 If the pseudo base station cannot be used, the scammer can call you continuously through the virtual dialing system developed by his team. By this time, you may have streaked in front of the liar team.

Legal basis: People's Republic of China (PRC) Criminal Law.

Article 266 Whoever defrauds public or private property in a relatively large amount shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention or public surveillance, and shall also or solely be sentenced to fixed-term imprisonment of not less than three years but not more than 10 years, and shall also be sentenced to fixed-term imprisonment of not less than 10 years or life imprisonment, and shall also be fined or confiscated. Where there are other provisions in this Law, such provisions shall prevail.

Article 192 Whoever illegally raises funds by fraudulent means for the purpose of illegal possession shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years; if the amount is huge or there are other serious circumstances, he shall be sentenced to fixed-term imprisonment of not less than seven years or life imprisonment and shall also be fined or confiscated. If a unit commits the crime mentioned in the preceding paragraph, it shall be fined, and the directly responsible person in charge and other directly responsible personnel shall be punished in accordance with the provisions of the preceding paragraph.