Joke Collection Website - Blessing messages - How did the swindler steal your bank card?

How did the swindler steal your bank card?

To ensure the security of personal bank accounts, we should also pay attention to protecting personal information, such as ID number, bank card number and mobile phone number. Once this information is leaked, it is likely to bring you huge losses. The following small series will introduce how scammers steal your bank information and how to prevent it. What should I do if my bank card is stolen? How did the swindler steal your bank card?

Because many people don't understand the rapidly developing third-party payment platform, in their minds, as long as the bank card and password are safe, the account is safe. In fact, to ensure the security of personal bank accounts, we should also pay attention to protecting personal information, such as ID number, bank card number and mobile phone number. Once this information is leaked, it is likely to bring you huge losses.

With the third-party payment platform widely used at present, after the third-party payment is bound by inputting information such as ID number, bank card number and mobile phone number, the transaction can be completed only by inputting the payment password in the subsequent transaction, and the bank card password is not needed at all.

The first two cases provided by the police have one thing in common with the theft of the bank deposit of the working lady: the cardholder's bank card and password have not been leaked. So, how did the criminals succeed?

According to professionals, criminals generally publish some false information by phone or SMS. Common contents include handling large credit cards, increasing the credit card limit, and exchanging points for cash. It's just tempting you with some benefits. If you contact them, it is only four steps away from your account being stolen by criminals.

Step 1: The criminals will ask you to provide your bank card number, ID number and mobile phone number on the grounds of handling business.

Step 2: The criminals use the above information to open an account in your name on the third-party payment platform and bind the bank card.

Step 3: criminals use pseudo base stations to implant Trojan virus into your mobile phone, intercept the transaction verification code and other information sent by third-party payment platforms, or make you actively inform the transaction verification code and other information by deception.

Step 4: Enter the transaction verification code, and criminals can directly spend or transfer money on the third-party payment platform.

Carefully identify the scene of the theft. You may be hired under the following circumstances.

The means of swindlers stealing bank accounts are becoming more and more sophisticated, and the means are constantly being refurbished. From the beginning of sealing the ATM cash outlet with glue, playing with the double spring to change the duplicate card, to the bank customer service phone on holiday on the ATM screen, to installing a hole-probing camera at ATM, to setting up a phishing website on the Internet, and then to stealing mobile banking information with WIFI, the scientific and technological level of scammers has gradually improved. Even the four steps mentioned above can get your bank card without a password, and what scammers steal your bank information?

Scene 1: Use the phone to trick customers into stopping their mobile phones and stealing credit cards.

Liar means: First, steal the personal information of the customer from the phishing website, such as name, ID number, mobile phone number, credit card information, etc., and then dial the customer service number of this mobile phone number through dialing software, such as 10086, 100 10, etc. , and check the ID number with the customer service staff to apply for mobile phone downtime. In this way, although most customers apply for a reminder of changes in mobile phone funds, once the scammer applies to stop paying,

Solution: 1, do not leave all information such as name, ID number, mobile phone number and credit card number in the registration information of any website. 2. The customer service of the credit card sets the telephone inquiry password (don't use the commonly used numbers or birthdays instead). 3. The service of the bank credit card website is set to the service mode of telephone short message+paper statement.

Scenario 2: Using WIFI to steal information from customers' mobile banking.

The liar means: McDonald's, KFC, Starbucks and other places generally have free WIFI, but you need to enter a password. Many criminals use the laziness of users to ask for wireless passwords to build their own WIFI, and its naming is also deceptive. Many of them are similar to Starbucks 1 and McDonald's 1, but many customers don't understand that once they get in touch, they will be easily fished. If it is fishing, the operation records of mobile banking and WIFI login will be copied, analyzed and cracked by criminals. If customers log in to mobile banking, their bank account information will be easily stolen.

Solution: 1 Check the login name of WIFI carefully before logging in. It's best to ask the service staff in the store to avoid being fished. 2. Try not to use WIFI to log in to a bank account or mobile banking in public. 3. Try to install anti-phishing software in your mobile phone.

Scenario 3: Online shopping sets phishing links for credit card fraud.

Liar means: criminals fake website stores, first publish low-priced online shopping goods on the website to attract customers. Once a customer places an order and needs to buy it, he claims that it is temporarily out of stock, then prompts the customer for a refund and sends a refund message or link through the chat screen. Once the customer clicks, the credit card information is stolen immediately, and it is stolen after copying. Although most cardholders think that online shopping needs to pay passwords and mobile phone verification codes, they remind customers that many customers like to use fast payment transactions, which do not need to pay passwords. Most banks only need to provide the customer's CVV2 code (the last three digits of the signature area on the back of the credit card), the expiration date and the mobile phone verification code, and criminals can obtain the mobile phone verification code through dialing software, thus easily stealing the card.

Solution: 1 Online shopping products will be refunded as soon as the merchant says that they are out of stock, but be careful not to click on the link address sent by him. Although payment is fast and convenient at present, online banking is still recommended. 2. Once the link is delayed, you must immediately call customer service to stop credit card payment, and call 1 10 for help as needed.

Scenario 4: Bank card cloning of credit card reader

Cheater means: some unscrupulous traders sometimes swipe their cards twice when customers are not paying attention. Before brushing the POS machine, they secretly brushed it on another POS machine. By swiping this card, the machine immediately records the information on the customer card. When the POS machine is swiped again, the customer's password is peeked and recorded. After the customer left, the shopkeeper used an empty bank card to input the card information, and immediately made a clone card of this bank card on the spot and stole it, which made the customer suffer huge losses.

Solution: 1 Never ask the clerk to swipe the bank card on your behalf when spending by credit card. 2. If there is an abnormal SMS prompt, you must call the bank customer service phone immediately to find out the reason.

Scenario 5: After returning to China, the bank asks you to change your card.

The liar means: Last April, a customer took advantage of the Qingming small holiday and went to Malaysia to play. After I returned to Hangzhou, I immediately received a customer service call from CCB Credit Card Center to remind the customer of the risk of credit card consumption in a merchant in Malaysia and offered to replace her credit card for free. Coincidentally, Mr. Li, who had been to Thailand in the same month, also received a card replacement suggestion from the Industrial Bank Credit Card Center after returning to China. The phenomenon of credit card theft in Southeast Asia has always been very serious, because in shopping malls in Southeast Asian countries, each brand counter has an independent POS machine, and it is easy for individual POS machines to be tampered with, thus stealing cardholder information. When you swipe your card at some smaller merchants, the risk of card theft is double.

Solution: 1 When spending money by credit card in Southeast Asian countries, it is relatively possible to reduce certain risks by choosing regular large shopping malls. You'd better change your credit card at the issuing bank after you come back from the tour. 3. In addition, unlike magnetic stripe cards, cardholders may wish to apply for a financial ic card (chip card) because of its higher safety factor and less possibility of data being copied in the card.