Joke Collection Website - Public benefit messages - How to expose the telecom fraud routine and lead the phone to the office to commit fraud?
How to expose the telecom fraud routine and lead the phone to the office to commit fraud?
Original title: Nine new routines, please keep your eyes open.
The "leader" asked you to go to the office and has gone out.
Nowadays, telecom fraud is not just a simple message to inform you of winning the prize, or a trick to call you to the office by the "leader". The Beijing Morning Post reporter took stock of the "nine routines" of telecom fraud to help consumers polish their eyes and see through the scam. Most importantly, in today's flood of personal information disclosure, I must have a string in my heart-there is no such thing as a free lunch.
Routine one
"The funds in your account have changed abnormally."
The swindler first steals the victim's online banking login account and password, and creates the illusion that the bank card has money flowing out by buying precious metals and changing the current account to regular account. Then the fake customer service called to confirm whether the transaction was my operation, and agreed to give the user a refund to defraud the user's trust. The scammer will once again create the illusion that the funds in the user's account are returned through the fund transaction in the account. However, due to the transaction fee, the refund amount is generally less than the previous internal transaction amount. Next, the scammer will use the victim's online banking to transfer money, or open a fast payment operation, and select the SMS verification code for verification, so that the victim's mobile phone will receive a verification code message. Finally, the scammer asked the victim to provide the verification code received by his mobile phone immediately on the grounds of limited time refund. Once the victim provides the SMS verification code to the other party, the other party succeeds.
How: Almost flawless. The simplest and most effective way is to call the official customer service phone number of the bank immediately for verification. Don't trust any calls that call in and claim to be customer service.
Routine 2
"You are suspected of breaking the law."
"You are suspected of money laundering", "You are suspected of illegal fund-raising" and "Credit overdraft is subject to criminal responsibility", all of which are the reasons for pretending to be a public security law to commit fraud. This technique is not new, but because of its great deterrent, people who don't understand this kind of fraud are still easy to be fooled. Nowadays, many scammers pretend to be official customer service numbers through rebranding software, but if the victim really dials back, they can generally see through the scam. There is even an "upgraded version": scammers guide users to place orders by phone on the grounds of giving away free items and mail them in the form of cash on delivery. If the user refuses to sign for the courier or return the goods, the liar will threaten the user with the tone of the public security law and cheat.
How to break it: don't trust strangers' phone calls easily. If someone says he is suspected of committing a crime, he should first call 1 10 to ask. Or ask friends and relatives around you, and you can usually see through the scam quickly.
Routine 3
"Your flight XX has been cancelled."
Booking plane tickets by mobile phone has become the export of online fraud. Liars lied about changing the visa and refunding the ticket, guiding people into phishing websites, making false numbers, and walking into remittance traps. Tencent 2065438+Big Data Report on Anti-Telecommunication Network Fraud in the Second Quarter of 2006 shows that this kind of fraud is as high as 44%, which has become the mainstream of online fraud. Liars can accurately tell the victim's name and flight information, and often cheat in the name of obtaining compensation for change of visa.
How to break it: The ticket refund and change business is handled through the official channels such as the airline's website, telephone, service hall and ticket agent. Don't trust any phone calls and text messages, even if they are completely consistent with my information.
Routine four
"If the goods you bought are out of stock, you can apply for a refund."
The scammer first fully grasps the online shopping information of the victim, gains the trust of the victim by accurately describing the shopping information of the victim, and then obtains the bank card number, password and SMS verification code of the victim. Liars sometimes get relevant information directly by phone, and sometimes let victims open phishing websites and fill in relevant information manually. When the bank card number, password and verification code were leaked at the same time, the swindler successfully transferred the money in the victim's online banking account.
How to break it: In case of abnormal commodity trading or out of stock, you should first consult the official customer service phone number of the shopping website, and don't trust people who call in and claim to be customer service. Online shopping accounts and payment accounts should have separate passwords, which should be complicated enough and be changed regularly.
Routine 5: "Recommend Top Ten Bull Stocks for You"
This kind of deception usually collects deposits or deposits from users in the name of learning stock knowledge and recommending stocks, which is especially effective for those new investors who are eager for success. In fact, formal securities companies generally do not provide paid stock recommendation services to shareholders, nor do they collect deposits or deposits from users in this name. They usually send photos or pictures such as company business license, industrial and commercial certificate or organization code. , just call the official customer service of the securities company to ask.
How to break it: don't trust any information about stock recommendation and stock selection, whether it comes from websites, QQ, text messages or telephone calls. It can be verified by calling back the official customer service phone.
Routine 6: "699 yuan free Apple 6S"
Recently, Hunan police reported a new fraud case. A fraud gang sent fake or damaged mobile phones or mobile phone molds to the victims for fraud in the name of "collecting personal income tax of 699 yuan and giving away Apple 6S mobile phones and 700 yuan calling cards for free". In two months, hundreds of people were cheated and the amount of fraud was several hundred thousand yuan.
How to break it: fraud in the name of seemingly legal promotion, you can't take any chances, and there will be no pie in the sky.
Routine 7: "Please receive the newborn allowance in time"
Criminals cheat on the grounds of receiving neonatal allowance, because they can tell the details of the victim and make the deceived believe it. After obtaining the victim's bank account, the scammer usually asks the victim to operate at the ATM and follow the other party's "guidance" to enter the English operation interface. Because the victims can't understand the English prompts on the ATM, they often regard the transfer procedure as an input verification code and eventually fall for it.
How to break it: don't trust such calls or text messages, let alone operate at ATM machines.
Routine 8: Replace the mobile phone card
Recently, the routine of this kind of fraud is usually to bomb the mobile phone with hundreds of spam messages and harassing calls to cover up the reminder message of card replacement service sent by 10086 customer service to the mobile phone number; Then take temporary id card with the victim information to the business hall to reissue the mobile phone card, so that the owner's own mobile phone card is passively invalid; Finally, modify the password of mobile customer service and bank card, and steal the money of bank card bound by mobile APP through SMS verification code.
How to break it: commonly used website passwords and customer service passwords are best different from key business login passwords such as bank passwords, and are revised regularly; Don't click on the links sent by various numbers. If you receive a lot of harassing calls or text messages, don't turn off your phone. Mobile phone security software should be used to block harassing numbers and unbind bank cards immediately. When using public ***WiFi, try not to log in to the bank APP in your mobile phone or use your mobile phone to transfer money.
Routine 9: "Xiao San is pregnant and needs money badly to have an abortion"
This is an active type of fraud for a long time, but recently, a liar who is pregnant and in urgent need of money for abortion cheated more than 80 elderly people. Liars make full use of the characteristics of the old man's distressed son to lure the victim to transfer money. This is a relatively new means, and it is also a constant renovation and improvement of scammers in deception.
How to break it: don't trust the phone call from strangers easily, especially if you have something urgent to pay.
■ depth
6.5438+0.6 million people are distributed in the black industrial chain.
Dozens of jobs are interlocking.
The drama of telecom fraud is staged every day, and the scripts of fraudsters are constantly being refurbished. Pei Zhiyong, chief anti-fraud expert of 360, said that telecom fraud has now formed a black industrial chain from the capture and sale of personal information upstream to the implementation of fraud and spoiler. What is staggering is that this chain is becoming more and more industrialized and specialized, the division of labor is becoming more and more detailed, new roles are constantly emerging, and twenty or thirty "jobs" are interlocking.
According to the data of 360 Hunting Net Platform, the scale of China's information fraud industry exceeds 1 152 billion yuan, and the number of fraudsters exceeds1600,000. Telecom fraud has been successful many times. 360 security experts believe that the huge amount of telecom fraud, extensive information leakage, perfect industrial chain and systematic training of employees have all become key factors.
It is understood that the fraud industry chain is divided into at least four major links: upstream information acquisition, intermediate wholesale sales, public fraud, and finally sharing stolen goods. In these four links, there are many jobs, such as fishing editing, Trojan horse development, library hacker, fishing retailer, domain name dealer, letter wholesaler, bank card dealer, phone card dealer, identity card dealer, telephone fraud manager, SMS agent, online promotion technician, financial accountant, ATM pony, and middleman who divides stolen goods, which lead the victims into the trap step by step.
Usually, the upstream information acquisition and wholesale sales links make all kinds of preparations, provide technical support and sell personal information. They do not participate in the implementation of specific fraud, which is very concealed, but they provide criminal tools for telecom fraud, which is no less harmful than fraud gangs. And the implementation of fraud is the most exposed part of the public. They appear in false identities such as public security law, acquaintances, leaders and customer service, and have strong public relations communication skills. Divide the stolen goods. Once the fraud is successful, it will enter the stage of dividing and selling stolen goods. Sometimes, the gang will arrange for the pony to withdraw money from the ATM and then transfer the stolen money to the middleman, who will distribute it to the gang members. Sometimes, gangs will let financial accountants spread the stolen money to multiple online banking accounts, making it more difficult for the police to solve the case and the bank to freeze the accounts.
Pei Zhiyong pointed out that there were about 15 types of these jobs at the end of last year, but according to the information currently available, new "jobs" are still emerging. For example, there are actually teaching trainers this year. Some of them are responsible for developing scams, some are responsible for studying business loopholes, some are responsible for editing scam scripts, and some are doing psychological analysis to design scams specifically for human weaknesses and demands of different groups. The links in these black chains are invisible to each other, which also makes it more difficult to solve the case.
- Related articles
- How to send flowers on WeChat?
- My boyfriend who broke up texted me that something was wrong. what's up
- Complaints kept coming, but almost repeated complaints failed. Is car financing lease misunderstood?
- Small apartments should be equipped with smart homes. What equipment can they be equipped with?
- What is the psychology of my ex-boyfriend asking me to meet?
- Which is better, telecommunications or mobile? Usually, I only surf the Internet without calling or texting. The less cost, the better.
- How long does it usually take to receive SMS confirmation from China? Com after successfully winning the Shanghai brand?
- What is the Nokia 808 system?
- Remarks on the Mid-Autumn Festival in memory of his deceased wife (selected 100 sentence)
- Liars send satisfaction survey text messages