Joke Collection Website - Public benefit messages - What are the fraud routines?
What are the fraud routines?
With the development of society and the continuous progress of information technology, some telecommunication network fraud gangs are also eager to wait for an opportunity to ambush, among which SMS fraud is a more common one. The following details what fraud routines are available.
What are the fraud routines 1 1. Loan routines
Fraud through low interest rates, payments, Trojan plans, fake websites, etc.
High imitation online lending platform? Be careful!
The criminals develop highly imitated websites or applications, and then spread the net widely in the form of short messages and web advertisements to attract people's attention. Once the victim downloads and registers, criminals will embed malicious links in sensitive and key details in advance to steal important information involving money, including bank card numbers and passwords. Please look for the official website and platform.
Just ID card, low interest, prepaid? There must be fraud!
With regard to ID cards/unsecured/unsecured/low-interest/high-amount loans, criminals used these gimmicks to lure victims into taking the bait. Once the victim applies for a loan, criminals will trick and threaten the victim to transfer money and remit money on the grounds of collecting insurance premiums, depositing money and revealing identity information. For normal loans, banks or regular online lending institutions need to review credit information and income certificates. No fees will be charged before the loan is issued, and only appropriate handling fees and management fees will be issued after it is passed.
Spend money to eliminate credit stains, cheating!
Because many borrowers refuse to apply for loans because of personal credit stains, scammers also start this business: they claim to have acquaintances in the bank or spend money to eliminate credit stains. Once hooked, a lot of benefits enter the pockets of scammers, but personal credit is not good-looking. Because personal credit information is managed by the Credit Information Center of the People's Bank of China in a unified way, once there is a stain, it can only be eliminated by keeping a good record for five years after paying off the debt, and no one, even a bank employee, has the right to modify it.
Trojans steal bank card information.
This kind of scam is relatively hidden. Generally, scammers set up a game to send pre-programmed loan information in the form of SMS, QQ message and WeChat. After the borrower takes the bait, the scammer sends the Trojan installation package, and the borrower obediently submits his bank card number, password and other important information as required, and the balance in the bank card is all transferred away.
Don't trust the information sent by any private or informal lending institutions, and don't enter your ID number, bank card number and password on untrusted websites.
Second, install routines.
Pretending to be the victim's leader, relatives and friends, or pretending to be a government agency or enterprise unit to commit fraud.
Pretend to be an official
Pretending to be the official customer service, asking the parties for the account number and identity information of the bank card on the grounds of "compensation refund", "ticket change", "abnormal bank card" and "express claim", and then stealing the money in the card.
Pretend to be a public security officer
Liars pretend to be CDC, social security center, communication administration, public security, courts and other units, and use the excuse of checking court subpoenas and parcels to attract the attention of victims. Then, on the grounds that the victim's personal information is leaked, the bank account is suspected of money laundering, drug crimes or needs investigation, the victim is required to cooperate with the investigation to prove innocence and transfer the deposit to the "safe account" given by the other party.
Or ask the victim to collect all the funds into his own bank card, and then transfer the funds of the bank card by defrauding the victim's bank card password, verification code, online banking and other information.
Pretend to be friends and relatives
Use instant messaging and video chat tools such as QQ to steal personal information and video clips of victims in advance by implanting Trojans or viruses, and then pretend to be victims and borrow money from online friends. Or directly modify comments, avatars, etc. Through social software, pretending to be a school teacher, friend, etc. Cheat on the grounds of "charging" and "borrowing money", or claim to be in a hurry, ask a friend to help transfer money.
Third, recruitment routines.
E-commerce sends photos by credit card? It's all routines!
The criminals lured students to enter the exam under the banner of "tapping the keyboard to make money". The first few orders are paid according to the agreement, so as to gain trust and let the victims increase their investment. Finally, he refused to refund the money under various excuses such as "unfinished task" and "card bill", and constantly tempted the victim to continue to brush the bill. Recently, there has also been a new kind of brush stroke. Criminals communicate through social platforms.
Claiming that the victim's conditions are suitable for sending models, then downloading the APP, or registering a website, submitting a deposit or registering a member, you can start sending photos. In fact, the liar disappears after collecting money. Hu Kun suggested that online billing is illegal, and any behavior that requires advance payment, such as billing or sending photos, is fraud.
MLM scam
This kind of recruitment often attracts job seekers with gimmicks that make big money easily and go to work directly without an interview. It requires you to pay a certain "entry fee" or spend money to buy a certain number of products, assign various "sales tasks" through lectures, brainwashing, intimidation, etc., and then defraud others to join the club. Job seekers will not only suffer property losses, but also their personal safety will not be guaranteed. Once you are tricked into pyramid schemes, it will be difficult to go out and never get back to pyramid schemes, which will affect your future.
Black intermediary scam
These illegal intermediaries often have to seize the identity cards of job seekers in the name of job introduction and ask for registration fees, service fees, membership fees and other fees. The result is often that a good job can't be found, the certificates and fees paid can't be recovered, and even many intermediaries are empty, and job seekers suffer multiple blows.
Face-to-face payment and training payment scam
After the interview, criminals tricked job seekers into collecting money in the name of paying clothing fees and medical examination fees, or under the banner of training first and then going to work, and promised to arrange work after collecting money, but in the end, the scammers either made excuses not to arrange work, or left empty.
Overseas recruitment scam
This kind of recruitment induces job seekers to leave the country and go to Myanmar, Cambodia, the Philippines, Laos, Malaysia and other countries with information such as "high salary" and "air tickets, accommodation". However, many citizens are forced to engage in illegal and criminal activities such as telecommunication network fraud, online gambling, prostitution and whoring after leaving the country. If you don't cooperate or can't complete the designated "performance", you will be tortured or even killed abroad.
What are the fraud routines? 2. Internet fraud safety knowledge:
Definition of online fraud: fraud refers to the act of defrauding other people's property in various forms on the Internet.
Internet fraud: "Fake friend" fraud: After the scammer steals QQ account and email account through various methods, he releases information to the user's friends and contacts, claiming that there is an emergency and asking for remittance to the designated account.
"Fishing" fraud: "Fishing" is the most common and hidden form of online fraud at present. The so-called "phishing" means that criminals steal users' personal data such as bank accounts, securities accounts and password information by means of pilfer date trojan, "network monitoring", forged fake websites or fake web pages, and then make profits by means of transfer, online shopping or making fake cards. Mainly can be subdivided into the following two ways.
One is to send an e-mail to lure users into a trap with false information. Fraudsters send a large number of fraudulent emails in the form of spam. Most of these emails entice users to fill in financial account passwords by winning prizes and auditing accounts. , or for various urgent reasons, ask the recipient to log on to a webpage and submit information such as user name, password, ID number, credit card number, etc. And then steal user funds.
The second is to establish fake online banking and online securities websites to defraud user account passwords for theft. Criminals set up websites with domain names and webpages very similar to real online banking systems and online securities trading platforms, lured accounts into inputting password accounts and other information, and then stole funds through real online banking, online securities trading systems or forged bank savings cards and securities trading cards.
There are also loopholes in the legitimate website server program. Malicious code is inserted into some pages of the website, which blocks some important information that can be used to distinguish between true and false pages and steals user information.
Telecommunication fraud: Suspects generally pretend to be staff members such as the Telecommunications Bureau and lie that the victim owes money on the phone, and then turn to the impersonated "public security personnel" and lie that the victim's identity information has been fraudulently used.
Online winning fraud: The suspect lied that the victim won the prize online, and lied that he mainly paid the handling fee and freight for receiving the prize first.
The main ways of online shopping fraud:
1, falsely claiming that the goods were confiscated by the customs, and asking netizens to pay a certain deposit, deposit and deposit;
2. Lied that the netizen placed an order with a single card and asked the netizen to pay again or place an order again;
3. Lie that the Alipay system is being maintained and ask netizens to remit money directly to the designated bank account;
4. Lie about the failure of the shopping website system and ask the netizens to pay again;
5. lied that the online store is engaged in promotional lottery activities and needs to pay a certain handling fee.
6. When a netizen buys a plane ticket online, the suspect lied that the identity information provided by the netizen was wrong and asked the netizen to pay the plane ticket fee again;
7. Lie that you need qualification verification and ask netizens to pay the verification qualification fee;
8. I lied that there was no goods in the store and my friend's store had goods, so I recommended a similar website.
9. Other methods: recruiting members and defrauding registration fees.
What are the fraud routines? 1. What are the main forms of fraud?
1. The main forms of fraud include,
(1) Encountered some scams that hurt and needed help;
(2) Fraud in a special capacity;
(3) Fraud in the name of an intermediary;
(4) using acquaintances to cheat;
(5) and win the trust of others to commit fraud through small interests.
2. Legal basis:
Article 266 of the Criminal Law of People's Republic of China (PRC) stipulates that whoever defrauds public or private property in a relatively large amount shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention or public surveillance, and shall also or only be fined; If the amount is huge or there are other serious circumstances, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than ten years and shall also be fined; If the amount is especially huge or there are other especially serious circumstances, he shall be sentenced to fixed-term imprisonment of not less than 10 years or life imprisonment, and shall also be fined or confiscated. Where there are other provisions in this Law, such provisions shall prevail.
Article 1 of the Interpretation of the Supreme People's Court and the Supreme People's Procuratorate on Several Issues Concerning the Specific Application of Laws in Handling Criminal Cases of Fraud stipulates that those who defraud public or private property in the amount of 3,000 to 10,000 yuan, 30,000 to 100,000 yuan and 500,000 yuan are respectively deemed as "large amount", "huge amount" and "extremely huge amount" as stipulated in Article 266 of the Criminal Law.
Second, what is the crime of fraud?
1. The act of fabricating facts or concealing the truth for the purpose of illegal possession to defraud a large amount of public or private property. The object of this crime is the ownership of public and private property.
2. The objective manifestation of this crime is to defraud a large number of public and private property by fraudulent methods (methods of fabricating facts or concealing the truth).
Third, how to deal with online loan fraud?
1. Victims can collect evidence of online loan fraud, such as website screenshots, transfer records, chat records, etc.
2. The victim can report the case to the public security organ and submit the collected evidence materials, so that the public security organ can intervene in the investigation and investigate the criminal responsibility of the fraudster.
If the loss is not fully returned, the victim can bring a civil lawsuit to the court and claim compensation from the fraudster.
The main forms of fraud are: cheating when you need help when you encounter some injuries; Fraud in a special identity; Fraud in the name of an intermediary; Fraudulent use of acquaintances; And win the trust of others through small interests to implement fraud.
- Related articles
- Will the US delegation send a message when it arrives?
- Did ABC scan the code to pay, but it didn't arrive?
- Mistress openly despises you. How to deal with her? Xiaosan despises primitive psychology.
- I once registered Alipay with another mobile phone number, but my mobile phone number has never been used before. How can I call the expired flowers?
- Where will Suzhou Tomb-Sweeping Day go to see flowers in 2022? Suzhou Spring Festival flower viewing
- I am from Century Spring Community, Hero North Road, Changzhi, Shanxi. Can Dayun Express arrive? thank you
- What did exposing the shocking scam give us?
- Is there a humorous confession message?
- Do I need a verification code to log in to someone else's mobile phone Battle.net?
- How to inquire about the information of China sanctions network?