Joke Collection Website - Blessing messages - Terrible deposit grabbing, a new round of security risks is coming!
Terrible deposit grabbing, a new round of security risks is coming!
Now, if you lose your mobile phone, you will not only lose everything, but also bear huge debts.
For thieves, the mobile phone is no longer the purpose, but the mobile payment in the mobile phone is priceless.
1.
Grab a deposit like a textbook, you can't lose anything without losing your mobile phone!
Recently, the mobile phone of an information security expert named "Old Camel" was stolen, which opened a huge loophole in mobile payment!
In just one day, his bank card, credit card, Alipay, WeChat payment, Meituan payment and Suning Finance were all cracked and suffered heavy losses.
Can you imagine? Theft gangs are so fast and professional that even security experts have been wiped to the ground!
Ordinary people, that can only be fish on the chopping block.
Let's take a quick look at the peak modus operandi of criminals.
It stands to reason that our mobile phones have fingerprints to unlock, and mobile payment is even more password-ridden. How did they pry open this security door?
Get down to business!
First, steal the phone number.
Thieves are only the most basic part of the theft gang. After they steal the mobile phone, they will transfer it to the technical experts at headquarters in lightning speed.
This is because the owner will not immediately report the loss of the mobile phone number, but will call the stolen mobile phone first and try to recover it.
Theft gangs took advantage of this fleeting gap to pull out the mobile phone card and insert it into their own mobile phone at the first time, and stole the owner's mobile phone number just after making a phone call and sending a text message.
This is the first step to success.
Second, take away all the identity information of the owner.
I just got my mobile phone card, so I can't open my wallet directly in mobile payment.
Moreover, wouldn't it be a waste of water if the owner reported the loss of his mobile phone number?
Therefore, the owner's ID card information has become the key second step.
How to operate?
Criminals have fully proved their professional ability.
They open the social security bureau's APP, click the forgotten password, select the SMS verification code to log in, and then open the owner's electronic social security card account.
Inside the account, bank card information such as ID number and social security financial card is readily available.
Mobile phone number+ID information in hand, green light all the way.
Third, prevent loss reporting.
After the owner "Old Camel" realized that his mobile phone was stolen, he quickly reported the loss of his mobile phone number and began a series of rescue measures, such as:
Transfer all the current balance in mobile banking, contact a number of banks to freeze debit cards and credit cards, transfer the funds on Alipay and WeChat, and delete all the bound credit cards. ...
However, he soon found that he met a master.
That night, the criminal gang secretly solved the phone number.
In our mind, I need to go to the business hall with my ID card.
In fact, a phone call can solve it.
Because criminals can get the mobile phone number and ID number, they can just make up a reason for "husband and wife quarreling", which can alleviate the state of reporting loss.
This shows that criminals have clearly understood the telecom business process before committing the crime.
Fourth, unlock the phone and log in to WeChat Alipay.
As mentioned above, with the mobile phone number+ID information, you can get a green light all the way, and then you can unlock the mobile phone.
The criminal gang first calls the customer service of the mobile operator to modify the service password, then modifies the password of the mobile phone manufacturer with the SMS verification code, and finally unlocks the screen and enters the mobile phone.
A steel line that many people think is easy to break through.
After turning on the mobile phone, they can log in to WeChat and Alipay and squeeze the owner off the line.
Fifth, crossing the sea is successful.
As mentioned earlier, the owner "Old Camel" is a safety expert who has been in business for more than ten years. He transferred money in the mobile APP for the first time, and also released the binding with the bank card.
However, the Tao is one foot high and the devil is ten feet high. The criminal has seen through everything.
As we all know, one person can have two AliPay. Criminals just seized this point and registered a new Alipay with the owner's mobile phone number and ID card.
Alipay wants to bind a bank card or a credit card. At this point, the owner has frozen the bank card. What should I do?
No one is always smart.
We all have this experience. In the early years, we had many bank cards, some of which were lost and some of which could not be found. Naturally, these forgotten cards cannot be frozen.
In addition, the owner's credit card is bound to ETC. If it is frozen, the highway can't get on, so he keeps this credit card.
It happened that both of these loopholes were caught by criminals.
They only need their mobile phone number+ID number, and they can find all the debit and credit card accounts of the owner by searching on software such as card manager.
They use the missed credit card to bind the newly registered Alipay, set a payment password that even the owner doesn't know, and you can swipe your card.
Of course, in the case of "old camel", Alipay's risk control system automatically identifies the abnormal operation of criminal gangs and blocks transactions.
However, third-party payment is not limited to Alipay, and there are dozens of payment institutions, such as JD.COM Baitiao, Meituan Payment, Baidu Wallet, Suning Finance and 360 IOUs.
In order to facilitate the pull-up, they all launched a quick binding card, which can easily bind the bank card with an ID number and SMS verification code.
It doesn't matter if the bank card has no money. There are many peer-to-peer loans.
In fact, criminals tied the card through a third-party app, applied for a loan in the name of the owner, and then successfully cashed out by purchasing virtual card currency and online recharge.
This means that even if you transfer the money, you can't escape the debt that fell from the sky.
2.
A new round of property security risks is coming!
There is a fact that you may not know. The "old camel" is just the tip of the iceberg among the victims of stealing mobile phones and swiping bank cards.
At present, the number of mobile phone users in China is close to 654.38+0 billion, and the phenomenon of stolen brushes caused by lost mobile phones is becoming a new round of property security risks.
2065438+September 2009, Shanghai cracked the first major case of stealing mobile phones and swiping bank cards in China. Since then, this new type of crime has officially surfaced.
At that time, the police suddenly received many reports of credit card theft. After investigation, it turned out that all the victims' mobile phones in Sichuan were stolen.
After stealing the mobile phone, the criminal gang first unlocks it, then uses the SIM card to find the owner's ID card and bank card information on Ctrip, and then uses the identity information to call the operator to change the password of the mobile phone service, thus gaining control of the mobile phone.
After the owner reissued the mobile phone number, he found that the bank card was looted.
Compared with the "old camel" case, it is really the same technique and the same formula.
On the National Day this year, a man's mobile phone in Guangxi was stolen, and for half a day, 1.2 million yuan was missing.
The criminal cracked his mobile phone password and payment password in the same way, and then bought 25 Apple and Huawei mobile phones in JD.COM, all using Suba.
When the police arrived at the delivery address, the building was empty.
360 has a statistic. In the first half of 2020 alone, 360 received a report that the mobile phone brush was stolen from 156 1, and the per capita loss exceeded 10000 yuan.
Undoubtedly, at the moment when mobile payment is highly convenient, mobile phones have become the most coveted fat of criminals while becoming property cabinets.
3.
Resume: 1 100 million people's property security war
?
The professional methods of criminal gangs are thought-provoking and frightening.
Looking back, let's look at their textbook-like means:
First of all, the first-line thieves wait for the scene, select a specific person to steal the mobile phone and hand it over to the technical specialist.
They chose to hang up the mobile phone number when the owner couldn't make up the card after work in the business hall, giving the team a whole night's crime time.
Secondly, the technical specialist is responsible for stealing the ID card and bank card, modifying the password of the mobile phone manufacturer, unlocking the owner's mobile phone and fully seizing the initiative.
Then, they entered the mobile phone and transferred all the balances of bank cards, WeChat and Alipay.
Finally, if there is no money in the mobile phone, then register the online loan account as the owner and bind the bank card.
After the loan is successful, you can either cash in by buying virtual card currency or transfer money directly through mobile banking.
Have you found out that in this process, criminal gangs have not pointed guns at anyone, but have always used normal commercial operations.
What does this mean?
It shows that there are huge loopholes in mobile payment and mobile payment, such as unlocking screen, convenient binding card, verification code login and so on. These extremely important levels and operations, as long as the phone is lost, will all fall.
This poses a question to the rule makers:
When designing mobile payment, is security important or convenience the first?
For them, this is worthy of reflection and introspection.
What should ordinary people pay attention to?
First, the mobile phone should have not only the password of screen saver, but also the password of SIM card, so that criminal gangs can't pull out the card and continue to use it.
Second, don't be delusional when your mobile phone is stolen-report the loss of your mobile phone card at the first time. As we said at the beginning, you can buy your mobile phone again if you lose it, but your identity information is leaked and all your belongings are streaking.
Third, never leave your ID card and bank card photos in your mobile phone.
Fourth, try to cancel the bank cards that are not used at ordinary times. When freezing bank cards, all of them must be frozen, leaving no opportunity for criminals.
Finally, it is hoped that the relevant state departments will quickly improve the detailed rules for risk control supervision of mobile payment, which involves 654.38 billion people and trillions of property. This is no joke!
- Previous article:Who can help me make up a riddle about Spring Festival greetings?
- Next article:What about Kunming Information Port Media Co., Ltd.?
- Related articles
- What is the code of ICBC credit card SMS withdrawal?
- Children's greetings to their mother's birthday.
- Friend space message greeting
- Today is sentence-making-using today is sentence-making.
- Do you dare to accept the express delivery from Beijing Xinfadi?
- Warm-hearted discourse circle of friends in the current epidemic situation
- 2023 New Year's Day holiday notice template (7 general)
- Is the notice of proof really from the Higher People's Court?
- How long did it take to send text messages in Shanghai?
- The mobile phone can't send text messages to the phone.