Joke Collection Website - Public benefit messages - The young man was cheated of 2000 yuan online and asked the network police for help. Why is the result worse?
The young man was cheated of 2000 yuan online and asked the network police for help. Why is the result worse?
A young man in Wuhan was cheated by playing online games and found a "network policeman" on the Internet. Being cheated is even worse. ...
Chen Mou, 20, is an ordinary office worker in Jiangxia District. He likes playing online games after work.
In May of this year, when he was playing games, he was cheated of 2000 yuan for buying game equipment, and complained to the game customer service unsuccessfully. In desperation, Chen Mou searched Baidu for the word "cyber police", found a QQ number of "cyber police" with a badge as the head, and asked "police uncle" to help him uphold justice.
The "network police" said that the case would be accepted immediately.
Subsequently, the "cyber police" called Chen Mou and told him that the funds cheated by Chen Mou had been intercepted. However, since the account has been frozen, Chen Mou needs to transfer money to the designated account to activate his account and get back the cheated money.
On the same day, I remitted more than 27,000 yuan to the "network police" named Fu Mou in three times. In the afternoon, when Chen Mou contacted Fu Mou again, he could not be contacted.
Yes! He was cheated again! ! !
Consciously deceived, the police immediately called the police, and the police then arrested the suspect Fu in Hainan.
! After Fu confessed:
He is just one part of a fraud gang posing as a cyber policeman. Half a year ago, he met a man named "Brother Yang" on the Internet. "Brother Yang" asked Fu to open a game account with his ID card, and Fu was responsible for collecting the money and then transferred it to "Brother Yang".
Fu gets a commission of 12% from each collection, and Fu also gets a commission of 4% from each collection by developing the offline of other collections. In the past six months, Fu Mou * * * has collected more than 300,000 yuan, and according to preliminary estimates, the profit has reached 65,438+10,000 yuan.
Fu also confessed that in the gang, there was a "telephone operator" who was responsible for telephone communication with the victims. Through a series of technical terms, let the victims be convinced that they have found the "cyber police" who uphold justice.
At present, Fu has been arrested by the Jiangxia District Procuratorate, and his accomplices are being pursued.
Nowadays, there are endless scams on the internet, which makes people hard to prevent. The most comprehensive eight categories of 60 kinds of communication network scams in history, please look ~
First, fake identity fraud:
Impersonating leaders, relatives and friends, institutions and other identities to commit fraud.
1. Pretending to be a leader's fraud: pretending to be a leader's secretary or staff member to call the person in charge of the grass-roots unit to sell books and commemorative coins.
2. Impersonating relatives and friends to defraud: pretending to be the owner of the communication account and defrauding relatives and friends in the name of "serious illness, car accident" and other urgent matters.
3. Pretending to be the boss of the company for fraud: through a series of disguises, pretending to be the boss of the company sends instructions for transfer and remittance to employees.
4. Subsidy assistance and bursary fraud: calling and texting disabled people, students and parents, falsely claiming that they can receive subsidies, assistance and bursaries.
5. Telephone fraud pretending to be a public security law: on the grounds that the victim's identity information has been stolen and he is suspected of money laundering, drug trafficking and other crimes, he is required to transfer his funds to the national account to cooperate with the investigation.
6. Identity fraud: Criminals pretend to be "Gao Fushuai" or "Bai Fumei" and defraud money for various reasons such as lack of funds and family difficulties.
7. Medical insurance and social security fraud: falsely claiming that the victim's account is abnormal, and then pretending to be a staff member of the judicial organ to trick the victim into sending money to the so-called safe account for fraud on the grounds that the investigation is fair and easy to verify.
8. "Guess who I am" fraud: pretending to be an acquaintance to borrow money from the victim.
Second, shopping fraud:
Fraud is implemented through various false preferential information, customer service refunds, and fake online stores.
9. Fake purchasing fraud: using discounts, concessions, overseas purchasing, etc. As bait, after the buyer pays, he asks for additional payment on the grounds that "the goods are detained by the customs and have to pay customs duties".
10. Refund fraud: falsely claiming that the goods taken by the victim are out of stock and need a refund, luring the buyer to provide information such as bank card number and password, and committing fraud.
1 1. online shopping fraud: criminals set up fake shopping websites or online stores. After the victim placed an order, he said that the system failed and needed to be reactivated. After sending a false activation URL through QQ, let the victim fill in his personal information and commit fraud.
12. Cheap shopping fraud: criminals release transfer information such as used cars, confiscated goods in used computers and customs, and victims contact them to defraud money by paying down payment and transaction tax fees.
13. Lifting the installment fraud: The criminals pretended to be the staff of the shopping website, claiming that "there was an error in the banking system", and tricked the victims into going to the ATM to go through the installment cancellation procedures and transfer funds.
14. Collection fraud: criminals pretend to be a collection association, print invitations and mail them to various places, saying that an auction will be held and leave contact information. Once the victim contacted him, he asked the victim to transfer the money to the designated account in the name of prepaid evaluation fee.
15. Courier signing fraud: Criminals pretend to be couriers to call the victims, saying that there is a courier to sign, but the information can't be seen clearly, and the victims need to provide it. Then deliver the goods to your door. After the victim signed for it, he called and said that he had signed for it and needed to pay, otherwise the debt collection company would find trouble.
Three. Activity fraud:
Publish various false activities through social tools such as WeChat and Weibo to lure users to participate in fraud.
16. Publishing false love stories: The criminals posted fictitious posts on the Internet in the form of "love stories", which caused well-meaning netizens to forward them, but the contact number left in the post was actually a fraudulent phone number.
17. Like fraud: Criminals pretend to be merchants to post "like and prize" information, requiring participants to send personal information such as names and phone numbers to social tool platforms. After obtaining enough personal information, they will commit fraud in the form of winning deposit.
Four. Inducing fraud:
Attract users to cheat with all kinds of attractive winning information, rewards and high salaries.
18. Pretending to be a well-known enterprise to cheat: pretending to be a well-known enterprise, printing a large number of beautiful fake scratch cards in advance, delivering them, and then tricking the victim into remitting money to the designated bank account under various excuses such as paying personal income tax.
19. Entertainment program winning fraud: The criminals send short messages to the victim's mobile phone in the name of the hit program group, saying that they have been selected as lucky viewers and will receive huge prizes, and then commit fraud under various excuses such as the need to pay a deposit or personal income tax.
20. points redemption fraud: criminals call and lie that the victim's mobile phone points can be redeemed, inducing the victim to click on the phishing link. If the victim enters the bank card number, password and other information according to the provided website, the funds in the bank account will be transferred.
2 1. Two-dimensional code fraud: With price reduction and reward as bait, the victim is required to scan the two-dimensional code to join the membership, but it is actually accompanied by Trojan virus. Once scanned and installed, Trojans will steal personal privacy information such as the victim's bank account number and password.
22. Cheating by paying a large sum of money for children: Criminals lied that they were willing to pay a large sum of money for children, lured the victims into being cheated, and then committed fraud for various reasons such as paying sincere money and inspection fees.
23. High-paying recruitment fraud: The criminals use mass information to recruit a certain type of professionals with a high salary of tens of thousands of yuan per month as an excuse to ask the victims to go to a designated place for an interview, and then commit fraud in the name of paying training fees, clothing fees, security deposits, etc.
24. E-mail winning fraud: criminals send winning e-mails through the Internet. Once the victim contacts the criminal to win the prize, the criminal asks the victim to remit money for various reasons, such as paying personal income tax and notary fees, so as to achieve the purpose of fraud.
Verb (abbreviation for verb) fictional dangerous fraud:
Fraud is carried out by fabricating all kinds of breaking news that scares users.
25. Fictional car accident fraud: Criminals demand that the victim's relatives or friends have a car accident and need to deal with the traffic accident urgently. The parties will pay the money into the designated account according to the instructions of the criminals.
26. Fictitious kidnapping fraud: the relatives and friends of the fictitious victim were kidnapped by criminals. If they want to rescue the hostages, they need to transfer the money to the designated account immediately, and they can't call the police, otherwise they will kill the tickets. The parties are often at a loss and put the money into the account according to the instructions of the criminals.
27. Fictional surgical fraud: Criminals ask the victim to transfer money for treatment on the grounds that the victim's children or parents suddenly need emergency surgery. In this case, the victim is often in a hurry and transfers money according to the instructions of the criminals.
28. Fictitious distress fraud: criminals publish false information such as serious illness and life difficulties through social media to gain sympathy from netizens and accept donations.
29. Fictitious parcel-holding fraud: Criminals ask the victim to transfer the money to the national security account for a fair investigation on the grounds that drugs are found in the victim's parcel, thus committing fraud.
30. Making up obscene pictures for extortion and fraud: Criminals collect photos of public officials, synthesize obscene pictures with computers, mail them to the victims with payment accounts, and threaten to extort money.
3 1. Fictitious third pregnancy abortion: criminals pretend to be sons and send text messages to their parents, making full use of the characteristics of the elderly who are distressed by their sons to induce the victims to transfer money.
6. Consumer fraud in daily life:
Implement various fraud schemes for payment and consumption in daily life.
32. Pretending to be the landlord's SMS fraud: The criminals pretend to be the landlord and send a text message, saying that the landlord's bank card has been changed, requesting that the rent be credited to other designated accounts. Some tenants believe it and know that they have been cheated by transferring rent.
33. Telephone arrears fraud: Criminals pretend to be the staff of a communication operation enterprise, make phone calls to the victims or directly play computer voice, and demand that the arrears funds be transferred to the designated account on the grounds of arrears.
34. TV arrearage fraud: The criminals pretended to be a group of radio and television workers to make a phone call, claiming that the cable TV set up in the field in the name of the victim owed money and asked the victim to make up the arrears to the designated account. Some people believe it, only to find that they have been cheated after transferring the money.
35. Shopping tax refund fraud: after obtaining the information of the victim's purchase of real estate, cars, etc. In advance, criminals tricked the victim into transferring money to the ATM machine on the grounds that the tax policy could be adjusted, and transferred the deposit in the card to the account designated by the liar.
36. Ticket change fraud: Criminals pretend to be airline customer service, and on the grounds of "flight cancellation, providing return and change service", they repeatedly trick ticket buyers into remittance operations and implement serial fraud.
37. Booking fraud: Criminals make false web pages of online booking companies, publish false information, and entice victims to fall for it with lower fares. Subsequently, the victim was asked to remit money again for reasons such as "unsuccessful booking" and implemented fraud.
38.ATM notification fraud: criminals block the exit of ATM cards in advance and paste false service hotlines to induce users to contact them after the cards are "swallowed" to obtain passwords. After the users left, they took out the bank card from the ATM and stole the cash in the user's card.
39. Credit card fraud: On the grounds that bank card consumption may reveal personal information, criminals pretend to be UnionPay center or public security police, and take bank account numbers and passwords to commit crimes.
40. Inducing remittance fraud: Criminals directly request remittance to a bank account in the form of group text messages. Because the victim is preparing to remit money, after receiving such remittance fraud information, the money is often credited to the liar's account without verification.
Seven, phishing, Trojan virus fraud:
Pretending to be a bank, e-commerce and other websites to steal privacy such as user account passwords.
4 1. pseudo base station fraud: criminals use pseudo base stations to send false links to the masses to upgrade online banking in exchange for cash 10086 mobile mall. Once the victim clicks, he will implant a Trojan horse on his mobile phone to obtain the bank account number, password and mobile phone number, so as to commit further crimes.
42. Phishing website fraud: On the grounds of upgrading the bank's online banking, criminals require the victim to log on to the phishing website of a fake bank, and then obtain the victim's bank account, online banking password, mobile phone transaction code and other information to commit fraud.
Eight, other new illegal fraud:
43. School newsletter fraud: criminals send fraudulent short messages with links in the name of "School newsletter". Once the link is clicked, the mobile phone is implanted with a Trojan horse program, and there is a risk that the bank card will be stolen.
44. Traffic handling illegal SMS fraud: criminals use fake base stations and other crime tools to send false illegal reminder messages, which contain Trojan links. After the victims clicked, they sent text messages in groups, resulting in the loss of phone bills. Some people stole bank cards, Alipay and other account information from mobile phones, and then stole bank cards, causing serious economic losses.
45. Electronic wedding invitation fraud: After inducing users to click and download through electronic wedding invitations, criminals steal the bank account number, password, address book and other information in the mobile phone, and then steal the user's bank card, or send a group of loan fraud messages to friends in the user's address book.
46. Photo album Trojan fraud: criminals pretend to be "mistresses" to incite victims to click on the "photo album" link, implant Trojan virus, and obtain online banking information of users.
47. Financial transaction fraud: In the name of securities companies, criminals spread the inside information and trends of false stocks through the Internet, telephone calls, text messages, etc. , gain the trust of the victim, and then guide them to buy futures and spot on their own fake trading platform, thus defrauding the victim's funds.
48. Handling credit card fraud: After advertising for handling high overdraft credit cards in the media, the victim contacted him and asked him to transfer money continuously by paying handling fees and agency fees.
49. Loan fraud: Criminals send messages in groups, saying that they can provide loans to those who are short of funds, with low monthly interest rate and no guarantee. Once the victim believes it, the other party will commit fraud in the name of prepaid interest and deposit.
50. Fraud of copying mobile phone cards: criminals send messages in groups, claiming that they can copy mobile phone cards and monitor mobile phone call information. Many people take the initiative to contact suspects because of personal needs, and then they are defrauded by the other party in the name of buying duplicate cards and prepayments.
5 1. Fictitious service fraud: criminals leave their phone numbers and provide sexual services online. After the victim contacted him, he said that he had to pay money before he could provide services at home. The victim found that he was cheated after calling the designated account.
52. Providing exam fraud: criminals call candidates who are about to take the exam, claiming that they can provide exam questions or answers. Many candidates are eager for success, and transfer the down payment of the benefit fee to the designated account in advance, and later find that they have been cheated.
53. Account theft and credit fraud: After the criminals stole the account of the merchant's social platform, they released the push message of "recruiting part-time online jobs to help Taobao sellers brush their credit and earn commissions from them". The victim shopped many times according to the other party's request, and later found out that he was cheated.
54. Pretending to be a triad member for extortion and fraud: Criminals first obtain information such as the victim's identity, occupation and mobile phone number, and call themselves triad members. If you are hired, you will be hurt, but the victim can break the money and eliminate the disaster, and then provide the account number to ask the victim to remit money.
55. Shanzhai WiFi in public places: The criminals set the Shanzhai signal, which is a free fishing WiFi released by some hackers in public places. When connected to these free networks, hackers can easily steal photos, phone numbers and passwords from mobile phones through the transmission of traffic data, and blackmail the owners.
56. Picking up a bank card with a password: The criminals deliberately discarded the bank card with a password and marked it as "Bank Phone", using people's psychology of taking advantage to induce the person who picked up the card to call to "activate" the card and deposit the money into the liar's account.
57. Abnormal changes in account funds: Criminals first steal the victim's online banking login account and password, and create the illusion that funds flow out of the bank card by buying precious metals and changing the current account into a fixed account. Then the fake customer service calls to confirm whether the transaction is my own operation, and agrees to give the user a refund to defraud the user's trust and ask the victim to provide the verification code received by his mobile phone. Once the victim provides the verification code of the short message to the other party, the other party will succeed.
58. Transfer money first, then withdraw cash, and then cancel: criminals use the "time difference" between transfer and receipt in the new bank transfer regulations to set a trap. Take the fraud routine of transferring money first and then giving cash, and then cancel the transfer after defrauding the victim of cash.
59. Mobile phone card replacement: The criminals first bombed the mobile phone with hundreds of spam messages and harassing calls to cover up the reminder message of the replacement service sent by 10086 customer service to the mobile phone number; Then he took a temporary id card with the victim's information written on it and went to the business hall to reissue the mobile phone card, which made the owner's mobile phone card passively invalid, thus receiving the SMS verification code and stealing the money in the bank card bound by the mobile APP.
60. Please save the change number:? This is an "upgraded version" of telecom fraud posing as an acquaintance. After the criminals obtained the owner's address book information through illegal channels, the fake owner sent a text message to the contact in the mobile phone, claiming that he had changed his new number, and then defrauded the contact in the mobile phone.
This is probably the longest and most practical anti-fraud book ever. Some tricks are really beyond your imagination!
Remember this to prevent being cheated.
- Previous article:202 1 bless the motherland on national day?
- Next article:Things that guests tend to dislike at weddings
- Related articles
- What channels are available to handle SMS bills?
- What makes you cry late at night and stay awake all night?
- Funny Mid-Autumn Festival blessing text messages. Mid-Autumn Festival blessings are funny and short.
- What should I do if the oppo SMS ringtone is limited to 5 seconds?
- Summer greetings are very short.
- Will there be a text message notification when the mortgage is disbursed?
- How to post a missing person notice on Alipay?
- I want to send an apology message to my customer.
- Several problems about railway consignment, China Railway Express and post office mailing
- How long does it take to open an account online and send a short message to inform the success?