Joke Collection Website - Public benefit messages - The harm of SMS bomb

The harm of SMS bomb

1, blackmailed

The rude blackmail method is to choose those "cell phone nicknames" for bombing, threatening the owner to continue harassing without paying money. Usually, these nicknames are well-off, and in order to save trouble and avoid losing money in other businesses, they often choose to compromise. But this can only be stopped for a short time, and the deadline will be used by criminals as an ATM to withdraw money.

2. Stealing brushes

The real verification code information is hidden in the sea of bombing short messages, so as to implement the act of stealing.

There are two ways to steal the brush, one is to modify the bound mobile phone number, and the other is to hijack the SMS. Prior to this, thieves would bomb users' mobile phones with software and pop up dozens of verification code short messages of various platforms, with the purpose of confusing users and then hiding the verification code of the stolen platform inside. The average user will only think it is harassment and will not open the account to view the information.

Modify the bound mobile phone number

The thief will call the customer service with a new number and say that he has lost his original mobile phone. As long as he provides information such as ID card, bank card, recent delivery address and purchased items, he can modify the mobile phone number.

Intercept short messages

Hackers send short messages to users' mobile phones to intercept viruses through short messages, beautiful pictures, red envelopes and social software.

Once installed, SMS will be completely supervised by hackers. When the user receives any verification code, it will be sent to the mailbox bound by the thief at the same time, or directly intercept the user's short message, so that he can't receive it at all. After getting the verification code, the thief can use your balance and your overdraft limit to buy it in buy buy.