Joke Collection Website - Public benefit messages - credit card fraud

credit card fraud

Credit card fraud is not a legal term, but actually a word created by ordinary people or journalists themselves.

If the following is a credit card fraud message, Industrial and Commercial Bank of Beijing: Your customer traded 4,800 yuan in Wangfujing Shopping Mall on May 8, and deducted it at the end of this month. If you have any questions, please consult: 0 10-5 1266546.

According to the survey, there have been many cases of personal customer account funds being cheated this year, including 26 cases of fraud through mobile phone short messages, which caused the loss of customer funds, and the amount of fraud was about 6.5438+0.07 million yuan; There were 7 cases of fraud through ATM machines, and the amount of fraud was nearly 1 10,000 yuan; Fraud cases were committed through the Internet 1, and the amount of fraud was more than 1 10,000 yuan. There are two cases of stealing bank card information by other means, resulting in the loss of customers' funds, and the amount defrauded is nearly 1 10,000 yuan.

All banks have indicated that they will increase the risk prevention publicity for customers and strengthen the monitoring and management of personal account transfer business, especially through ATM and online banking transfer business.

Expose eight big scams

(1) "Credit card short messages" engage in fraud, using mobile phone short messages to send false consumption tips or winning tips, tricking customers into calling false banking service numbers, UnionPay credit card management centers, public security departments and other departments for consultation, and taking information such as customer bank cards and passwords for fraud. Or send a reminder of where the cardholder spends by SMS. When the cardholder dials the phone provided in the short message for verification, the fraudster will induce the cardholder to cancel the automatic transfer function on the ATM and prompt the operating procedure (actually the transfer operating procedure) so that the deposit in the customer's account can actually be transferred to the fraudster's account.

(2) False upgrade of "banking business" Post a false notice on the ATM machine in the name of the bank, saying that the banking business system is being upgraded. When withdrawing money, follow the following procedures: first insert the card and enter the password, press Enter to confirm, then press the transfer business key, and then select the card transfer-out transfer key; Then quickly enter the standby number of this machine (actually the account provided by fraudsters) and press Enter to confirm; Then enter the withdrawal amount and press Enter to confirm, so that all the funds in the customer's account will be transferred to the designated current account.

(3) The customer service number is hidden. The fraudster connects the telephone banks of various banks by telephone. After using various means to trick bank customers into dialing telephone numbers, the telephone automatically prompts them to provide telephone banking numbers and financial services of major banks in China. After customers use this phone to make inquiries, fraudsters can intercept customers' bank cards, passwords, ID cards and other information, thus stealing funds from customers' accounts.

(four) "Gui Li" website uses fake websites to commit crimes of fraudulent accounts. The criminals first set up a fake bank website on the Internet, and then communicated with the online shop seller as a buyer, asking the seller to register related business on the bank website provided by them to defraud the seller's bank card number and password. Or ask customers to send their account numbers and passwords by email in the name of the bank under the guise of prize promotion, or enter their bank account numbers and passwords on designated fake websites. Or in the name of the bank, suggest an emergency that may threaten the safety of the customer's account funds, and induce the customer to provide the account number and password.

(5) The online transaction chain conducts online transactions through the Internet, prompting to deposit the transaction amount into the customer's personal debit card, and at the same time providing the customer with the consultation telephone number, telling the customer to inquire whether the transaction amount is credited into the account through this telephone number, so as to obtain the customer's bank card, password, ID card and other information for fraud.

(6) After stealing the card, spy on the password to steal the customer's bank card, cheat the password and steal the funds in the customer's card. For example, a hook or other device is installed in the ATM to intercept the customer's bank card, so that the equipment can suspend service and obtain the customer's password by peeking at the customer's withdrawal password, thus directly stealing the customer's funds by using the bank card and password; Deliberately interfering with customers' withdrawals, causing ATM machines to suspend service and defrauding customers' passwords by "guiding" customers' operations. Take the bank card while the customer leaves temporarily and steal the customer's funds from other ATMs.

(7) Clone bank cards and steal customers' bank card numbers and passwords in other ways, and clone bank cards to steal customers' funds. For example, pick up the withdrawal slip discarded by the customer to obtain the bank card number, and peek at the withdrawal password when the customer uses the ATM machine; Set up a card reader at the entrance of the self-service bank to steal the card number and password of the customer's bank card; Wait a minute.

(8) To transfer accounts with the same name under the guise of doing business, the customer is required to open an account in a bank, and at the same time open an account with the same name in the bank, waiting for an opportunity to exchange passbooks with the other party, requesting that the funds be transferred to the other party's passbook, and then taking the funds away. (n 10 1)