Joke Collection Website - Public benefit messages - Ten forms of online fraud

Ten forms of online fraud

1. What is telecommunication network fraud?

"Telecommunication network fraud" is a criminal act in which criminals use mobile phone short messages, telephone calls, the Internet and other communication tools to fabricate false information, set up scams, conduct remote and non-contact fraud on victims, and induce victims to make money or transfer money. Usually, the purpose of cheating is achieved by impersonating others and forging various legal coats and forms, such as impersonating public security law, state organ staff, bank staff, e-commerce platform customer service staff, forging and impersonating recruitment, invoicing, loans and other forms of fraud.

Second, common means of telecommunication network fraud

1.

Criminals pretend to be "policemen", "prosecutors" and "judges", falsely claiming that the victim's identity information has been leaked and used by others for serious crimes such as money laundering, drug trafficking and so on, inducing the victim to transfer funds to the so-called "safe account" held by fraudsters, or tricking the victim into committing bank card numbers, passwords, verification codes and other frauds.

Reminder: The public security organ will not handle the case by telephone. The arrest warrant will be presented by the police at the arrest site, and will not be sent by fax or QQ. It will not arrange the parties to transfer money or remit money to a "safe account" by telephone. Anyone who calls himself a "public security organ" on the phone and asks for transfer and remittance on the grounds of suspected crime is fraud!

2.QQ impersonates company leaders for fraud.

The criminals obtained the company personnel information through illegal means, disguised as the company boss through QQ, dragged the company's financial personnel into the newly-built QQ group, and disguised as the company boss in the group to issue transfer instructions to the financial personnel. Once the financial personnel believe it, they fall into the trap of the other party.

Tips: Financial personnel should strictly abide by the company's financial system and establish remittance audit system. Before receiving any information claiming to be the company leader's request for transfer and remittance, you must immediately check with the company leader in person or by phone to ensure the authenticity. Never trust any transfer request sent through social software such as QQ and WeChat.

Any online part-time job brushing is fraud.

3. Brush the bill and brush the reputation fraud

Criminals post part-time advertisements for swiping bills and credit on the Internet, luring victims to buy designated goods on the grounds of swiping bills for online stores to improve credit and earn commissions, or directly transfer money by scanning codes, and promise to return the order money and commission to the victim's account after payment. Later, under the pretext of system failure and task activation, the victim was repeatedly asked to pay until he was found cheated.

Tips: It is illegal to brush the bill itself. Everyone must bear in mind that the so-called online brushing 100% is fraud. Do not believe!

4. Online loan fraud

Fraudsters take advantage of the victim's psychological need for money and use "no mortgage, pay every second" as bait. After gaining the initial trust of the victims, they defrauded the victims of money step by step on the grounds that the materials were not approved, the loan amount needed to be "brushed", the loan had been decentralized, and the repayment ability needed to be verified.

Tips: There are no shortcuts to loans. You should choose a formal national financial institution to handle loans, and don't take chances. Don't trust telephone and online loan information, don't trust interest-free and low-interest loans, and don't leave personal contact information on the Internet at will to avoid being "targeted" by criminals. Any behavior of charging before lending is a scam. Lending first, then charging, is the legal and compliant operation process of financial service institutions.

5. Pretending to be a customer service refund fraud

The fraudster pretends to be the customer service of the online shopping platform, falsely claims that the platform operation error requires the victim to cooperate to cancel the order, falsely claims that the goods want to recover double indemnity due to quality problems, or falsely claims that the victim's courier is damaged and voluntarily refunds. Then send the so-called refund link to the victim or let him scan the QR code and enter relevant information such as bank cards to defraud the victim of money.

Tips: If you receive the so-called refund or refund from customer service or merchants, please don't believe it. You should call the official customer service number first to check. Secondly, don't click on the link sent by the other party or scan the QR code sent by the other party, and don't enter personal information including bank card information and verification code at will.

6. Online dating induces investment gambling fraud.

Fraudsters disguise themselves as white, get to know the victims through dating websites, social software and other platforms, establish a love relationship with them after a period of communication, and then claim to know the inside story of the investment platform or the loopholes in gambling sites, and induce the victims to invest or gamble online on the pretext of high return and no loss, so as to achieve the purpose of defrauding money.

Tips: Be careful when making friends online, and don't be carried away by sweet words. Anyone who claims to take you to invest or gamble in the process of making friends online and ensure a stable profit is fraud!

7. SMS links on phishing websites are implanted with Trojan fraud.

By luring the victim to click on the link in the short message, address book, short message, bank card, Alipay information, etc. On the victim's mobile phone, you can implement fraud by downloading Trojan horse programs from the background or linking to phishing websites.

Tips: Generally, the operator's points are exchanged for phone bills, gifts, etc. There will be no cash exchange, and there is no need for personal information such as bank account number, ID number and password. You should be on high alert when you receive such a short message. Don't click on unfamiliar websites at will, and don't install clients easily.

8. Network false investment fraud

In the name of a securities company, criminals spread false stock insider information and trends through the Internet, telephone calls, text messages and other means. And after gaining the trust of the victim, induce him to buy futures and spot on the false trading platform, thus defrauding shareholders' funds.

Tips: This kind of fake platform is a virtual investment website built by criminals using professional knowledge. Under the guise of financial management, small profits are used as bait, which leads to the victim being fooled. When citizens choose to invest in financial management, they must first determine the location, nature, capital flow, past history and other relevant information of the platform, and then consider investing after doing their homework.

9. "Guess who I am" scam

After obtaining the victim's phone number and the owner's name, the criminal called the victim and asked him to "guess who I am", and then pretended to be an acquaintance according to the victim's statement, claiming to visit the victim. Subsequently, he fabricated reasons such as "public security detention" and "traffic accident" and borrowed money from the victim. Many victims put money into bank cards provided by criminals without careful verification. Now, this kind of fraud has been upgraded to "impersonating the leader" and "impersonating the CPC Central Commission for Discipline Inspection staff".

Tips:

(1) Be sure to take good care of your personal information. In order to prevent personal information from leaking, we should pay attention to leaving real information about ourselves and friends on QQ, Weibo and WeChat. Don't have too many business cards on computers and networks in public places and mobile phones to prevent information from being stolen by scammers when it is lost. If you receive a strange phone call and claim to be a good friend, and you can accurately call out your name, you should ask for more evidence.

(2) You can call your friend's phone number stored in your mobile phone to confirm whether your friend really changed his number. When you can't call your friends before, you can contact your friends' relatives and friends to confirm.

(3) Be highly vigilant when borrowing money from you. If necessary, please contact the police immediately.

10. Winning fraud

Criminals send winning tips to users through QQ, SMS, etc. And use fake websites set up on the Internet to induce people to fall into the winning trap, so that the victims can pay taxes, notarization fees, handling fees and other names to implement remittance scams.