Joke Collection Website - Public benefit messages - What are the online fraud methods?

What are the online fraud methods?

At present, online fraud incidents occur frequently, and fraud means are escalating. The majority of netizens should be vigilant, enhance their awareness of network security, and summarize several common fraud methods:

Pseudo-part-time fraud: a scam that uses part-time advertisements for practical training, such as "recruiting students for part-time jobs (non-intermediary)", "recruiting college students to distribute leaflets" and "recruiting students for part-time jobs to distribute leaflets (students are preferred)", which means that you are allowed to participate in the training of their company, but you have to pay a training fee ranging from several hundred yuan.

Crazy online fraud: Post some examples on the Internet, such as: "Invest in XX, start a business and start a family!" What is the false information that "online chatting and posting can make money with a monthly salary of 10,000 yuan"? In fact, the purpose of a liar is to get you registered and then let you join the so-called project. After joining, you will receive a certain joining fee.

Brush fraud: spread a large number of part-time advertisements of "Tik Tok agent" and "Taobao brush" in the circle of WeChat friends, and establish multiple WeChat groups to defraud everyone to pay a certain amount of "agent deposit" and "membership fee".

Asking for commodity fraud: usually contact netizens first, establish relationships with each other, and defraud each other's trust; After gaining the trust of the other party, they will ask for a flower basket (or similar items) on the grounds of opening a company and remit money to the other party.

Bar fraud: use online dating chat to lure people to meet them, and then take them to unknown bars, restaurants or other entertainment places to collude with unscrupulous merchants to defraud and blackmail them.

Carefully arranging fraud: falsely claiming to get to know foreign netizens for various reasons, carefully arranging, simulating the airport situation with recordings, colluding with associates to impersonate airport staff to defraud members' trust, and then committing fraud.

Shopping-oriented financial fraud: employees of overseas securities, investments or large companies will cheat others of a large amount of economic property with low input and high reward, and induce shopping consumption through sales promotion.

Loan application fee fraud: providing low-interest housing or car loans online, the application conditions are quite relaxed. As long as you pay the loan application fee, you will be guaranteed to get a loan. As a result, after the application fee was collected, there was no news.

Loan interest fee fraud: fraud under the pretext of paying interest fees in advance. When the interest is remitted to the other party's card, the other party disappears.

Fraud by swiping a bank card: use the website to collect personal information, swipe the borrower's bank card on the grounds of checking water, and then ask the borrower to provide the bank card number and SMS verification code to swipe the borrower's own assets online.

Stealing personal information fraud: the network cheats the borrower's basic information by proving the borrower's repayment ability, and then transfers the money on the card to other accounts through various means.

Pretending to be a leader's fraud: the fake leader calls the person in charge of the grassroots unit on the grounds of selling books and commemorative coins, and asks the deceived unit to pay the order and handling fee until the bank account number is specified.

Fraudulent impersonation of relatives and friends: using Trojan horse programs to steal the password of the other party's network communication tools, intercepting the other party's chat video materials, and impersonating the account owner to defraud relatives and friends in the name of "serious illness, car accident" and other urgent matters.

Fraudulent impersonation of public security law: Criminals impersonate public security law staff to call the victims, asking them to transfer their funds to national accounts to cooperate with the investigation on the grounds that the identity information of the victims has been stolen and they are suspected of money laundering and drug trafficking.

Fraudulent identity fraud: pretending to be "Gao Fushuai" or "Bai Fumei", adding friends to defraud feelings and trust, and then defrauding money for various reasons such as financial difficulties and family difficulties.

Fake purchasing fraud: pretending to be a regular WeChat merchant, using discounts and overseas purchasing. Taking this as bait, and after the buyer pays, he asks for extra payment on the grounds that "the goods are detained by the customs and need to pay customs duties".

Refund fraud: pretending to be Taobao customer service, calling or texting, falsely claiming that the goods taken by the victim are out of stock and need a refund, and luring buyers to provide bank card number, password and other information to implement fraud.

Cheap shopping fraud: release transfer information of used cars, used computers, etc. The victim defrauded money by paying down payment, transaction tax and handling fee.

Courier signing fraud: pretending to be a courier to call the victim, saying that you need to sign for the courier but you can't see the information clearly, and you need the victim to provide it, and then deliver the "goods" to your door. After the victim signed for it, he called and said that he had signed for it and had to pay, otherwise the company would find trouble.

Credit card application fraud: Some people find it difficult to apply for a credit card because their credit history is poor. This scam is aimed at this consumer, saying that it is to provide them with a "letter-free" credit card, and as long as the applicant pays the application fee, it is guaranteed to issue him a credit card. As a result, the applicant paid the application fee and still couldn't get the credit card.

Posting false love transmission: posting fictitious posts such as finding people, helping others and being trapped on the Internet in the form of "love transmission", causing well-intentioned netizens to forward them. In fact, the contact number left in the post is a fraudulent phone number.

Like fraud: pretending to be a merchant to post "like and win prizes" information, requiring participants to send their personal information such as their names and telephone numbers to social platforms, and after obtaining enough personal information, they will commit fraud in the form of paying a deposit with prizes.

Winning information fraud: pretending to be a well-known enterprise, printing a large number of beautiful fake winning scratch cards in advance, delivering them, and then tricking the victims into remittance to the designated bank account under various excuses such as paying personal income tax.

Investment and financial fraud: induce users to invest in various high-return wealth management and fund products. After absorbing a large number of users' funds, the money ran away and even the principal could not be collected.

Two-dimensional code fraud: With price reduction and reward as bait, the victim is required to scan the two-dimensional code to join the membership, but in fact, with the Trojan virus, personal privacy information such as the victim's bank account number and password will be stolen.

Cheating by paying a large price for children: falsely claiming that the victim was cheated by paying a large price for children, and then committing fraud for various reasons such as paying sincere money and inspection fees.

High-paying recruitment fraud: through mass information, the victim is asked to go to a designated place for an interview on the grounds of recruiting a certain type of professional with a high salary of tens of thousands of yuan per month, and then fraud is carried out in the name of paying training fees, clothing fees, and security deposits.

Fictitious car accident fraud: asking relatives or friends of the victim to transfer money immediately on the grounds that they need to deal with the traffic accident urgently.

Fictitious kidnapping fraud: the relatives and friends of the fictional victim are kidnapped. To rescue the hostages, you need to immediately transfer the money to the designated account, and you can't call the police, otherwise you will kill the ticket.

Fictitious surgical fraud: asking the victim to transfer money before treatment on the grounds that the victim's children or parents need emergency surgery because of sudden illness.

Fictitious help-seeking fraud: publishing false information such as serious illness and life difficulties through social media to gain sympathy from netizens and accept donations.

Telephone arrears fraud: pretending to be a staff member of a communication operation enterprise, calling the victim or playing computer voice directly, and demanding that the arrears funds be transferred to the designated account on the grounds of telephone arrears.

Booking fraud: making false online booking company web pages, publishing false information, and luring victims to be fooled by lower fares. Subsequently, the victim was asked to remit money again for reasons such as "unsuccessful booking" and implemented fraud.

ATM notification fraud: block the ATM card in advance, and paste a false service hotline to induce users to contact the card after it is "swallowed" and get the password. After users leave, they will take out their bank cards from ATM machines and steal the cash in their cards.

Credit card consumption fraud: on the grounds that bank card consumption may reveal personal information, pretending to be a UnionPay center or public security police to set up a set, and taking bank account numbers and passwords to commit crimes.

Pseudo-base station fraud: pseudo-base stations are used to send false links to the general public for online banking upgrade and 10086 mobile phone mall to exchange cash. Once the victim clicks, a Trojan horse is implanted on his mobile phone to obtain the bank account number, password and mobile phone number, thus committing crimes.

Phishing website fraud: on the grounds of upgrading the bank's online banking, the victim is required to log on to the phishing website of a fake bank, and then obtain the victim's bank account, online banking password, mobile phone transaction code and other information to conduct new illegal fraud such as fraud.

SMS link fraud: Send fraudulent SMS messages with links in the name of "School News". Once the link is clicked, the mobile phone will be implanted with Trojan horse programs, and there is a risk that the bank card will be stolen.

E-invitation fraud: induce users to click through e-invitation, steal the bank account number, password, address book and other information in the mobile phone, then steal the user's bank card, or send a loan fraud message to friends in the user's address book.

Financial transaction fraud: in the name of a securities company, spread the inside information and trends of false stocks through the Internet, telephone calls, text messages, etc., gain the trust of the victim, and guide him to buy futures and spot on his own false trading platform, thus defrauding funds.

Copying mobile phone card fraud: mass information claims that mobile phone cards can be copied and mobile phone call information can be monitored. Many people take the initiative to contact the suspect because of personal needs, and then they are defrauded by the other party in the name of purchasing duplicate cards and prepayments.

Pretending to be a triad society for extortion fraud: first, get the victim's identity, occupation, mobile phone number and other information. And called himself a member of the underworld. If he is hired, he will be hurt, but the victim can break the money and eliminate the disaster, and then provide the account number to ask the victim to remit money.

Fishing WiFi in public places: Free WiFi for fishing is released in public places. When victims connect to these free networks, photos, phone numbers and passwords in mobile phones are stolen through the transmission of traffic data, and the owners are blackmailed.

Conclusion: Don't trust anything that involves transfer and remittance, filling in personal information and asking for verification code. I Chunqiu's awareness of network security reminds netizens to always improve their awareness of network security and beware of fraud!