Joke Collection Website - Blessing messages - Telecommunications network fraud is constantly being refurbished, and vigilance is the best defense.

Telecommunications network fraud is constantly being refurbished, and vigilance is the best defense.

In recent years, the wave of digitalization has swept through all aspects of society, and the means of fraud have been constantly updated, especially the increasing criminal activities of telecommunication network fraud, which have caused serious property losses to many deceived people and become a risk control test that all kinds of financial institutions must face directly.

At present, telecommunication network fraud has become a prominent illegal and criminal act, involving a wide range, which has been strongly reflected by all sectors of society and actively promoted anti-fraud actions.

"No matter how the fraudulent means are updated, the ultimate goal is to cheat money. This last link will inevitably affect financial institutions. " Recently, a senior employee of a big bank in East China said in an interview with the Securities Times reporter that fraudsters are very familiar with the bank's lending model and process. "Many fraudsters also use the Pratt & Whitney fast loan products launched by banks after the epidemic to commit crimes."

In fact, many financial technology companies have been engaged in anti-fraud work for a long time. "The platform is equipped with many applications needed in daily life, which is often the last level that fraudsters have to break through. Therefore, we are under great pressure to fight against online black market fraud gangs. " A person from a head financial technology platform told the Securities Times reporter.

However, in the increasing number of telecom fraud cases, criminals often induce users to operate on their own. How to distinguish the normal operation of users from the "involuntary" operation after being cheated has now become the most headache for financial institutions.

"Black products guide users to disclose personal information step by step by giving them some inductive information, or to make loans and transfer operations." A technician working for an anti-fraud technology company said, "Because these are all operated by users themselves, it is difficult for payment or loan platforms to distinguish them from normal behaviors, which is a major difficulty in risk control."

Confessions of the deceived

"Without waiting for the response, I inexplicably carried a loan of200,000." The deceived Xiao Wu recalled to the Securities Times reporter.

On a working day, Xiao Wu, who just got off work and was ready to rest, received a strange phone call. The other party claimed to be the official customer service of an e-commerce platform, and specially called Xiao Wu to inform him that the interest rate of a service he accepted on the e-commerce platform was too high, which violated relevant regulations.

Xiao Wu, who was originally sleepy, made a tingle after listening. "But I have never opened this service!" Confused, he immediately denied it again and again and asked the other end of the phone to close the so-called service.

"Because the other party said my name, graduated from school, and I recently spent money on this e-commerce platform, I believed them." Xiao Wu told the Securities Times reporter that when the other party suggested that the service could be closed but needed third-party verification, Xiao Wu gradually believed the other party and promised to cooperate with various instructions that required bank verification.

It is for this reason that the next operation makes Xiao Wu fall into the trap of fraud gangs step by step.

"I want to solve this matter early. They asked me which bank card I had. I said a few, and they asked me to check the loan balance. " According to Xiao Wu's memory, after about 20 minutes of telephone communication, the fraud gang asked Xiao Wu to cooperate with them to use online meetings on the grounds of process needs, claiming that this would better help him pass the verification.

Under the guidance of fraudsters, Xiao Wu opened his own bank account and made online loans step by step according to the instructions through online channels. "I can't remember exactly how I got in, but I don't know when I got the loan."

By the time Xiao Wu realized that he had been cheated, his loan amount had already been transferred from the Internet to the account provided by the fraudster. "The other party has been contacting me by changing the phone number and made several phone calls. I know it's a scam, and I always refuse to answer. Later, I thought that some information might be useful to the police, so I took it and asked the other person's name. " Xiao Wu said.

The last call made Xiao Wu understand the reason why the other party kept calling to try to communicate-asking him to record the screen according to certain steps, and then closing the so-called financial service. In other words, the fraud gang that cheated the money still wants to steal more personal information from Xiao Wu.

Telecommunication fraud cases have surged.

Looking around the world, telecommunication network fraud cases in major developed countries in the world are growing rapidly.

A few days ago, Lianxun Risk Information, a law firm serving in the anti-fraud field, released a study on digital payment fraud in high-growth markets. The report shows that due to the increasing popularity of alternative payment methods, all kinds of fraud cases are common in high-growth markets. In the past 12 months, all kinds of fraud increased by about 37% on average, including digital wallet payment fraud, QR code fraud and cryptocurrency fraud.

According to the risk information survey conducted by Lawyers Union News, 80% of the respondents in all regions expect that the fraud risk will increase in the next 24 months. Online fraudsters target consumers who use online digital channels for shopping, entertainment and online banking. This situation was further aggravated during the epidemic and triggered a new fraud trend.

In April this year, Du Hangwei, Vice Minister of Public Security, said at the press conference held by the State Council Office that the new cyber crime represented by telecommunication network fraud has become a mainstream crime, which is a severe challenge for public security organs. Although such cases are on the decline under the situation of cracking down on high pressure, the cases are still at a high level and the situation is still severe and complicated.

"Especially in the context of the COVID-19 epidemic, people's production and life have accelerated to the Internet, further aggravating the high incidence of cases." Du Hangwei pointed out that telecommunication network fraud has become a global governance problem.

From the perspective of the banking industry alone, affected by the epidemic, in order to support small and medium-sized enterprises, many banking institutions have streamlined and upgraded the online loan process, and the means and technologies of fraudsters have also "kept pace with the times", so that they can find out the process of online banking ports in a short time.

A person close to the investigation revealed to the Securities Times reporter that he clearly felt that since 20 19, new forms of online fraud cases have shown a significant increase trend. "Especially in several first-tier cities, the deceived are not limited to middle-aged and elderly people with weak anti-fraud awareness, and there are many typical cases in groups such as financial white-collar workers, lawyers and college students."

In addition, fraud gangs follow up the characteristics of current social events, institutions and enterprises very quickly, and the words and means of fraud are constantly "updated and iterated", especially in today's digital and networked applications, fraudsters are more convenient to conduct more accurate fraud through social platforms.

How heavy is the speech routine?

In fact, many interviewees gave feedback to the Securities Times reporter. When the fraudsters came to the door, they were not unprepared, but the "one sentence" of the fraudsters finally caught them off guard. The most powerful "trap" in this process is often that fraudsters can always accurately report the personal information of the deceived person, such as ID card information, school where they attended or graduated, home address, etc.

The Securities Times reporter summed up the deceived experiences of many interviewees and found that the "words" of fraud gangs generally have the following routines:

The first is "probabilistic deception". The fraudster obtains some personal information from external sources, such as the telephone number and even the personal address of the deceived person, in order to start tentative telephone contact. In telephone communication, some unsuspecting deceived people are easy to believe the liar's lies, and even be fooled into opening unregistered mobile phone applets and apps. And more personal information comes one by one.

The second is "alarmist talk". Even people with high academic qualifications will inevitably feel uneasy when they are told by fraudsters that they are "customer service or even public security personnel" and that information such as certificates and household registration needs further confirmation. If you are not careful, you will easily be "led astray" and unconsciously cooperate with the other party's request for personal information, hoping to help offset the so-called "bad influence" with the help of the other party.

In this routine, fraudsters usually communicate with the deceived object in a tone of serious notice, such as "We have monitored that your certificate is invalid and the background information is displayed incorrectly" and "You need to cooperate with us to verify the operation", so as to scare the deceived object in a short time, gain its trust, reduce the psychological defense of the deceived object, and then "guide" its step-by-step operation to finally obtain its bank account information.

The third kind is "interest temptation". This routine mainly targets people who like money kickbacks and have emotional needs. Through the forms of "killing pigs", "stock trading" and "brushing rebates", the deceived people are guided to enter the network platform made by fraud gangs to obtain their account passwords and personal biometric information, and then fraud is implemented.

Du Hangwei also said at the press conference of the State Council Office in April that "since last year, there have been many cases of swindling people's trust by swiping a rebate and then diverting it to a fake investment platform, with the incidence and loss ratio above 30%, and major cases of being defrauded of more than one million yuan have occurred from time to time".

According to public information, there are more than 50 types of telecommunication network fraud discovered by public security organs, among which the five main types are network rebate, false investment and wealth management, false online loan, impersonating customer service and impersonating public security law.

Explore effective anti-fraud ways

Sometimes, the simplest return call is the most effective risk control means to prevent telecom fraud.

Another deceived person, Ms. Wang, told the Securities Times reporter that after being deceived, she was afraid to answer strange calls and didn't know which institutions she had applied for loans. "In mid-May, the staff of an Internet bank kept calling. I didn't dare to answer it at first, but he kept calling me and had to answer it. " Ms. Wang recalled.

After connecting the phone, the other party asked her bluntly: "Is it a loan from our platform?" Ms. Wang told the other party with trepidation that she had encountered telecom fraud, and she didn't know how much money the fraudster had borrowed in her own name.

After the bank staff understood the situation, they immediately suspended the platform lending process and asked Ms. Wang to call the police in time. Soon, Ms. Wang received a short message of loan failure from this bank, which showed that "the loan amount was 500 yuan, and the audit failed".

The Securities Times reporter learned that a head financial technology company has recently added pre-loan telephone inquiry measures. Because the problem of users being harassed by fraud is becoming more and more serious, the company will only lend money after confirming the subjective willingness of users to borrow.

"In the beginning, we used pop-up windows to stop users. However, there are always some users who ignore the reminder and even think that the platform is' intercepting money'. Later, we thought of a way to call the user directly, and online graphic interaction is not convenient to answer the phone. We also put the head of the police uncle on the prompt page, and the effect is much better than before. " Li Junkui introduced that in fact, when a user is suspected of being cheated, the platform will first remind the user by voice phone, and leave a cooling-off period of 15 minutes and a delay of 24 hours.

Li Junkui said that this is also what active interactive risk control is doing, using psychological confrontation technology to help deceived users realize "being cheated" in the process of voluntary payment and stop transferring money.

"As a third-party organization, we have no right to make a decision not to pay. We can only give the victim some time to recover the money by delaying payment for 24 hours. " Li Junkui added, "In this respect, China is very different from foreign countries. The speed of foreign transfer is very slow, while domestic transfer is very convenient and fast, so we need to cooperate with other institutions to achieve delayed arrival. "

Vigilance is that b defense.

A technician working for an anti-fraud technology company told the Securities Times reporter that the biggest headache for financial institutions now is the increasing telecom fraud.

"Black products guide users to disclose personal information step by step by giving them some induced information, or to make loans and transfer operations. Since these are all operated by users themselves, it is difficult for payment or loan platforms to distinguish them from normal behaviors, which has become a major difficulty in risk control. " The technician said.

A technical security person of a financial technology company also admitted to the Securities Times reporter that in the field of anti-fraud, even the financial technology company with the most complete risk control technology is facing great challenges. "If it is stolen, the payment link of this behavior is clear, but the wallet is used by others without the user's knowledge. The payment link is only a short part of the whole link of fraud, so we need to have the user's behavior data, and even judge and enhance the recognition ability of the whole suspicious transaction according to his neighbors. "

He also mentioned that to do anti-fraud, institutions often need full link data. At present, different banks have different anti-fraud capabilities, and some bank data are not comprehensive for the time being. "We also call on the industry to open up anti-fraud data and increase synergies." Technical security sources said.

A technical person of a stock bank also said that as far as some regional banks are concerned, the technical means of online risk control are still relatively weak. "Even some big banks can't say that the interception rate is 100%, which is also a process of dynamic progress." He said that if the deceived person has insufficient anti-fraud awareness and is induced by fraudsters to disclose information on their own, this situation makes it difficult for financial institutions to defend themselves at the technical level.

To make matters worse, once fraud happens, it becomes very difficult for the victim to recover the property losses. "General fraud cases are criminal and reported to the public security. There are few civil lawsuits. If users want the platform to bear their own losses, it is the responsibility of the platform to prove it, but it is too difficult. " A lawyer who did not want to be named said.

He explained that in fraud cases, it is often difficult for the deceived to prove that "the loss of stolen brush is not caused by leaking information such as account number, password and SMS verification code". In this case, the fraudster is the ultimate undertaker of civil liability and criminal liability. The deceived person can only sue the thief as the defendant.

However, fraud cases are often difficult to handle, and the possibility of recovering stolen funds is very low. The above-mentioned person close to the case investigation said that for telecom network fraud gangs, the arrest and recovery cycle is relatively long. "Many gangs are not in China, and money will be transferred several times in a short time, which is difficult to track, and often a case will involve many deceived people."

The technical staff of the aforementioned anti-fraud technology company reminded that "users should be alert to websites, applets, apps and unfamiliar calls that need to be authorized to use or input personal information, and accounts that have not been used for a long time should be cancelled in time." He said that vigilance is the best defense that users can do.

Want to know more financial news in real time, please pay attention to us.