Job Recruitment Website - Job information - What are the common telecommunications fraud methods?

What are the common telecommunications fraud methods?

There are many forms of telecommunications fraud currently active in society. Common ones include QQ fraud, parcel fraud, false lottery winnings, impersonation acquaintance fraud, direct remittance fraud, phone bill arrears fraud, etc. The fraud content is carefully planned and designed by a dedicated team, tailored to different victim groups, and set up step by step. However, no matter how many tricks the fraudsters use, they will ultimately achieve the purpose of defrauding money by obtaining the victim's bank card, password and other personal information.

Let’s talk about 10 common types of telecommunications fraud and prevention methods:

1. QQ fraud: In 2008, QQ numbers were stolen through Trojan horses and pretended to be friends to pay for phone calls. , game point cards; in 2010, it gradually evolved into adding QQ friends to video chat with each other and intercepting the video, and then sending files and pictures bundled with Trojan viruses to the other party and stealing QQ numbers and passwords, and logging in to the stolen QQ number to deceive them. QQ video fraud that involves friends and playing previously intercepted videos to confuse the other party and ask the other party to pay money for various reasons; in 2013, the video fraud upgraded to a fraud targeting the family members of international students, asking parents to pay money on the pretext of paying surgery fees, and the amount ranged from several Ranging from tens of thousands to hundreds of thousands; in 2014, criminal suspects omitted the traditional "stealing" process and directly used the newly registered QQ number to pretend to be the company's "boss" QQ (the avatar, nickname and other information were changed to a QQ that was exactly the same as the boss) , and then asked the company's finance to remit money to a designated bank account to achieve the purpose of fraud; at the end of 2014, it evolved into using mobile phone interception Trojan virus software to steal the payment permissions of smartphones in the Android operating system, intercepting text messages and then committing theft or committing fraud by pretending to be a WeChat friend. case.

Prevention: Do not click on promotional files at will to prevent QQ from being stolen; QQ note information should be cautious: try not to note QQ contacts as "Dad", "Mom", "Mr. Zhang", etc. Once criminals steal QQ, it is easy to analyze the relationship between these contacts and you from the information you noted; be sure to call the recipient to confirm before sending money, and do not trust any contact numbers and links in QQ chat records.

2. Guess who I am: In this type of fraud crime, criminals obtain the victim’s phone number and the name of the phone owner through improper means, then call the victim and ask him to “guess.” "Who am I?" and then pretended to be an acquaintance based on the name given by the victim, and claimed to come to visit the victim. After the victim believed it, he would fabricate "caught for prostitution" or "traffic accident" a few hours or the next day. " and other reasons to borrow money from the victim, many victims put the money into the bank card provided by the criminal without careful verification. At present, this type of crime has been upgraded and has taken on a new form: the suspect pretends to be a civil servant or a leader of an enterprise or institution, and requires the victim to remit money to the "leader" on the grounds of urgent need for money, smoothing relationships, job promotion, etc.

Prevention: When receiving similar calls, you should contact your friends and acquaintances promptly to verify the authenticity. Don't trust the other party easily, let alone transfer money to the bank account provided by the other party easily.

3. Ticket change: The main crime of ticket change fraud is that the suspect sends a text message to the person who purchased the ticket, saying that due to recent bad weather such as snow, haze, and haze, his flight was canceled; saying that the flight may have been canceled due to system issues. There is a fault, the ticket cannot be issued, and the ticket needs to be changed or refunded. It is very easy for the victim to believe it and call the "customer service number" in the fraudulent text message. The suspect defrauds the victim into transferring a high amount of money on the pretext of charging a handling fee for changing the contract. The criminal suspect used to set up fake online ticket booking websites of certain airlines on large game websites, forums, Baidu Tieba, etc., and used the names of various airlines to publish false booking information, ticket changes, refunds and other information on the Internet. It has developed to the point of purchasing basic passenger booking information from hackers or air ticket purchase points across the country, and conducting precise fraud through ticket changes and refunds.

Prevention: After receiving such fraudulent text messages, you should check and verify through the official civil aviation inquiry phone number and website, or directly call the booking site for verification. Do not call the "customer service number" provided in the text message for verification.

4. Parcel fraud: Criminals pretend to be employees of the postal service, express delivery companies or public security agencies and call the victim's phone number, falsely claiming that the victim's parcel contains contraband or items involved in the case and has been investigated by the public security agency. He further falsely claimed that the victim was suspected of drug trafficking or money laundering crimes in the name of a public security official. In order to prove his innocence, he must transfer all the money in the victim's name to a designated "safety account" for inspection as required.

Prevention: During the investigation and handling of cases by the people's police of public security organs, they will not require the parties to dispose of property through telephone notifications, and will issue corresponding legal documents for the retrieval and seizure of property and items. Moreover, when performing official duties, the people's police shall present their work certificates to the parties except for special reasons such as work needs.

5. Impersonating leaders: In this type of fraud crime, criminals obtain the names, office phone numbers and other relevant information of leaders of superior agencies, regulatory departments and other units through improper channels. Pretending to be a leader's secretary or staff member calls the person in charge of a grassroots unit, and on the pretext of selling books, commemorative coins, etc., asks the deceived unit to first pay the subscription fee, handling fees, and wait until the designated bank account number to carry out fraudulent activities.

Prevention: When receiving such a call, you should promptly confirm and verify it with the relevant department of the higher-level agency. If it is confirmed to be a fraud, you should truthfully report the situation to the higher-level agency and the public security agency.

6. False lottery winnings: In this type of fraud crime, criminals use the pretext of a lottery draw or pretend to be a program group such as "Extraordinary 6 1" to notify the victim of their winnings by making phone calls or text messages. Once the victim believed the prize and responded to the query, he said that to redeem the prize, he must pay additional income tax, handling fees and other fees, otherwise the prize would not be redeemed. The victim was directed to remit money to the account provided by him over the phone.

Beware: "The pie in the sky will not always fall." Don't easily believe in information such as winning a lottery because of the temptation of interests. You should still work hard to get the benefits you deserve.

7. Telephone arrears: In this type of fraud, criminals pretend to be staff of the telecommunications bureau and call the victim to inform them of the arrears, or directly play a computer voice saying that the victim's identity information may have been used fraudulently. After registering the overdue phone number, the criminals asked their accomplices to pretend to be public, procuratorate, or legal personnel to answer or make calls, saying that the phone number and bank account in the victim's name were suspected of money laundering and other criminal activities. The judicial authorities are currently conducting a secret investigation and require the victim to The bank deposits are transferred to the so-called safe account as soon as possible, and the criminals gradually guide the victim through the phone to carry out the transfer operation to achieve the purpose of fraud.

Prevention: This type of telecommunications fraud is extremely deceptive. Criminals use online virtual phones to create a virtual number that is the same as the work phone number of the public security agency, making the victim believe the truth of the lie, seduce and coerce the victim. Transfer money to a designated account without letting relatives know. Young people should learn more about fraud prevention knowledge in their daily lives, do more work with their family members, especially middle-aged and elderly people, and promptly verify and report to the public security organs when receiving fraudulent calls.

8. Credit card consumption: In this type of fraud crime, criminals remind mobile phone users through text messages, saying that the user's bank card has just been used in a certain place (such as XX shopping mall, XX hotel) to spend 5899 or 6995 yuan, etc. , if users have any questions, they can call XXXX number for consultation. After the user called back, his accomplice pretended to be the bank's customer service center and falsely claimed that the bank card might be copied and stolen. Taking advantage of the victim's panic, he asked the user to go to the bank's ATM machine to perform so-called encryption operations, and gradually transferred the contents of the victim's card to the bank's ATM machine. The money is transferred to the account designated by the criminal to achieve the purpose of fraud.

Prevention: When receiving such fraudulent text messages, you should promptly call the official inquiry phone number of the corresponding bank for verification, instead of calling the consultation phone number provided in the fraudulent text message for verification.

9. Internet fraud: Use false web pages to induce victims to speculate in stocks, invest, and defraud funds; create false web pages (phishing websites) that are the same as official websites of banks and other institutions, and send text messages, emails, etc., to induce The victim clicks on the link to enter the fake webpage, steals the bank account, user name, password and other personal information entered by the victim, and finally transfers the victim's funds.

Prevention: This type of scam is also extremely deceptive. The link address of the fake web page created by criminals is very similar to the official website. Sometimes only one similar letter is different, which is difficult to find. Therefore, you need to be cautious when using web pages such as banks, and enter through secure links, such as through 360 URL links.

10. Low-price shopping: In this type of fraud crime, criminals send false information about selling second-hand cars, bugs, etc. to the victim. The content of the text message is usually: "Our group has 90% new brand cars. (Honda, Audi, Mercedes-Benz, etc.) are for sale in this city. The phone number is ××××××××. "When the victim called the contact number and wanted to buy it, the criminal asked for a deposit before further processing, and asked for the account number provided to him. Send money to achieve the purpose of fraud.

Beware: Too low a price is just a bait, don’t be greedy for cheap, otherwise it will be used by criminals.