Traditional Culture Encyclopedia - Traditional virtues - What are the common means of telecommunications fraud?
What are the common means of telecommunications fraud?
Currently active in the community of telecommunications fraud in a variety of forms, the common QQ fraud, parcel fraud, false lottery, posing as an acquaintance fraud, direct remittance fraud, telephone bill fraud. Fraud content by a specialized team carefully planned and designed for different groups of victims tailored to step by step to set up a set. But no matter how sophisticated the means of the fraudsters, the last is to obtain the victim's bank card, password and other personal information to achieve the purpose of cheating money.
The following to talk about 10 common types of telecommunications fraud and prevention methods:
1, QQ fraud: 2008, through the Trojan horse to steal the QQ number posing as its friends on behalf of charging phone bills, game point cards; 2010, gradually evolved to add QQ friends and each other video chat and intercept the video, and then send bundled with Trojan horse virus files, pictures to the other side and steal! QQ number, password, logging on the stolen QQ number to cheat their friends, and play the previously intercepted video to confuse each other, with various reasons to require each other to play the QQ video fraud; in 2013, the video fraud upgraded for international students' families, under the pretext of paying surgical fees and other requirements for parents to pay, the amount of money ranging from a few tens of thousands to hundreds of thousands of dollars; in 2014, the suspects omitted the traditional "Stealing" link, the direct use of the newly registered QQ number disguised as the company's "boss" QQ (avatar, nickname and other information changed to the boss exactly the same QQ), and then to the company's financial requirements to the designated bank account remittances to achieve the purpose of the fraud; in late 2014, it evolved into the use of mobile phone interception, the use of mobile phones to block the payment of money to the parents. At the end of 2014, evolved into the use of cell phone interception Trojan virus software to steal the Android operating system smartphone payment authority, and intercept SMS after the implementation of the theft or implementation of fraud cases posing as WeChat friends.
Prevention: do not click on promotional documents, beware of QQ theft; QQ note information should be careful: try not to QQ contacts note as "dad", "mom", "Zhang total", etc., once the criminals are in the hands of the police. "The first thing you need to do is to make sure that you have the right information, so that you can make sure that you have the right information, so that you can make sure that you have the right information.
2, guess who I am: this type of fraud crime, criminals through improper ways to obtain the victim's phone number and the owner's name, call the victim, let it "guess who I am", and then according to the victim said the name of the person pretending to be the identity of the acquaintance and claimed to come to visit the victim, when the victim believes that Later, after a few hours or the next day and then fabricated "arrested for prostitution", "traffic accident" and other reasons, to the victim to borrow money, many victims did not carefully verify the money into the wrongdoers to provide the bank card. At present, this type of crime has been upgraded, showing a new form: suspects posing as civil servants or enterprises and institutions of the unit leader, in order to the urgent need for money, relations, job promotion, etc., requiring the subject to the "leadership" remittance.
Prevention: When you receive a similar call, you should contact your friends and acquaintances to verify the authenticity of the call. Do not easily believe each other, and should not easily to each other to provide the bank account transfer.
3, ticket change: ticket change fraud crime is mainly suspected of sending text messages to the purchase of air tickets to the subject, said due to the recent snow and haze and other inclement weather, the flights they took canceled; said or due to system failure, can not issue tickets, the need to change or refund. The subject is very easy to believe, call the fraudulent text message in the "customer service phone", the suspect to change the visa to the handling fee for the reason, to deceive the subject to transfer a high amount of money. Suspects from the past in the large gaming sites, forums, Baidu bars and other false so-and-so airline online booking site, under the guise of the name of the airline on the network to publish false booking information, change the ticket refund and other information. Developed from the hacker or the country's air ticket purchasing points to buy travelers booking basic information to air ticket change, refund for precision fraud.
Prevention: after receiving such fraudulent text messages, should be verified through the official civil aviation query phone, website inquiries, or directly call the booking of the outlets to verify the query. Do not call the SMS provided by the "customer service phone" for verification.
4, parcel fraud: criminals posing as postal, courier companies or public security organs to call the victim's phone, falsely claiming that the victim's parcel with contraband or crime-related items, and has been investigated by the public security organs. Further to the name of the public security organs falsely claimed that the victim is suspected of drug trafficking or money laundering crimes, in order to prove their innocence, must be required to transfer all the money under the name of the victim into the designated "security account" for inspection.
Prevention: the public security organs of the people's police in the investigation of the case, will not be notified by phone to require the parties to the property disposal of property, property, goods retrieval, seizure will be issued the appropriate legal instruments. Moreover, the people's police, in the performance of their official duties, except for special reasons such as the need for work, shall show their working documents to the parties concerned.
5, posing as a leader: this kind of fraud crime, criminals through improper ways to know the higher authorities, regulatory departments and other units of the leadership's name, office telephone and other relevant information. Impersonation of leadership secretary or staff and other identities to call the person in charge of grass-roots units to promote books, commemorative coins, etc., so that the defrauded unit to pay the first subscription, fees and so on to the designated bank account number, the implementation of fraudulent activities.
Prevention: when receiving such calls, should be promptly confirmed and verified with the relevant departments of the higher authorities, such as confirmation of fraud, should be truthfully reflected to the higher authorities and public security organs.
6, false winners: this kind of fraud crime, the lawless elements to the activities of the lottery as the reason, or posing as a "very 6 +1" and other programs, by dialing the phone or cell phone text message notification of the victim won the big prize, once the victim believes that after the reply to the query, it said that prize must be paid in addition to the income tax, fees, and other various The company's website is a great source of information about the company's products and services, and the company's website is a great source of information about the company's products and services, and the company's products and services.
Prevention: "The sky will not often fall pie", do not easily believe because of the temptation of profit and other information, or should be through the down-to-earth labor, in exchange for the benefits they deserve.
7, telephone arrears: such fraud crimes, criminals posing as Telecommunications Bureau staff to the subject to call the phone to inform their telephone arrears, or directly play the computer voice, said the subject identity information may have been fraudulently registered arrears phone, then criminals let accomplices posing as a public, prosecutors and law enforcement personnel to listen to or call, said the subject of the name of the phone and the bank account is suspected of money laundering and other criminal activities, the judicial authorities are now secretly investigating. Currently, the judicial authorities are secretly investigating, requiring the subject to transfer bank deposits as soon as possible to the so-called security account, criminals through the phone gradually guide the subject to transfer operations, to achieve the purpose of fraud.
Prevention: this kind of telecom fraud is very deceptive, criminals use the network virtual phone virtual and public security organs work phone the same number, so that the victim believes that the authenticity of the lie, luring, forcing the victim to the designated account to transfer money, and do not let relatives know. Young people in their daily lives should learn more about fraud prevention knowledge, and to their families, especially the middle-aged and elderly people to do more work, received fraudulent phone calls in a timely manner to the public security organs to verify, reflect.
8, card spending: this kind of fraud crime, the lawless elements through text messages to remind the cell phone users, said the user's bank card has just been somewhere (such as XX shopping malls, XX hotels) card spending 5899 or 6995 yuan, etc., such as the user has a question, you can call the XXXX number to consult. In the user call back, its accomplices that pretend to be the name of the bank's customer service center falsely claimed that the bank card may have been copied and stolen, the use of the victim's panic mentality, requiring the user to the bank ATM for the so-called encrypted operation, and gradually transfer the victim's card to the account specified by the criminals, to achieve the purpose of the scam.
Prevention: when receiving such fraudulent SMS, you should promptly call the official inquiry phone number of the corresponding bank to verify, and should not call the advisory phone number provided in the fraudulent SMS to verify.
9, network fraud: the use of false web pages to entice victims to speculate on stocks, investment, fraudulent funds; the production of false web pages (phishing sites) identical to the official website of the bank and other units, send text messages, e-mails, etc., to entice the victim to click on the link to enter the false web page, steal the victim to enter the personal information of the bank account, username, password, etc. and ultimately transfer the victim's funds out.
Prevention: This type of fraud is also very deceptive, criminals produce fake web pages with links to the official website address is very similar to the official website, sometimes only a similar letters have differences, it is not easy to find. Therefore, in the use of banks and other web pages, need to be careful, should be through the security link into, such as through the 360 Web site link into and so on.
10, low-priced shopping: this type of fraudulent crime, the lawless elements to the victim to send the sale of second-hand cars, bugs and other false information, the text message content is generally: "The Group has 90% of the new set of cars (Honda, Audi, Mercedes-Benz, etc.) for sale in the city. Phone ××××××××." To be victims to call the contact number want to buy, the lawless elements proposed that you must pay a deposit to further processing, requiring remittances to the account it provides, so as to achieve the purpose of fraud.
Prevention: too cheap price, will only be a bait, do not covet cheap, otherwise bound to be used by criminals.
- Previous article:Brief introduction of plum blossom boxing
- Next article:What is the fundamental goal of political and legal work?
- Related articles
- What is the highest annual salary of Kobe, James and Jordan?
- How to improve the safety awareness of personnel and establish a safety defense line ideologically? 0? three
- Original text, translation and video of classical Chinese "Carving a Boat for a Sword"
- What were the auspicious beasts and evil beasts in ancient China?
- What are the unacceptable foods in India?
- What are the advantages and disadvantages of finger reading?
- Observation on the Transformation and Development of New Energy Automobile Industry in China
- What is decadent feudal thought?
- What do you mean by layer 1 switches, layer 2 switches, and layer 3 switches?
- What is the significance of Andean Dance which is loved by Mongolian people?