Nine telecom fraud new routines Consumers need to polish their eyes and see through the scam.

  Today’s telecom fraud is not just a simple trick of sending a text message to inform you of winning the prize, or a "leader" calling you to the office. The Beijing Morning Post reporter took stock of the "nine routines" of telecom fraud to help consumers polish their eyes and see through the scam. Most importantly, today, with the proliferation of personal information disclosure, there must be a string in your heart — — There is no free lunch.

  Routine one

  "Your account has abnormal changes in funds."

  The swindler first stole the victim’s online banking login account and password, and created the illusion that there was money flowing out of the bank card by buying precious metals and changing the current account to a fixed period. Then fake customer service calls to confirm whether the transaction is my operation, and agrees to give the user a refund to defraud the user’s trust. The scammer will once again make the illusion that the funds in the user’s account are returned through the fund transaction inside the account. However, due to the transaction fee, the refund amount is generally smaller than the previous internal transaction amount. Next, the scammer will use the victim’s online banking to transfer money, or open a fast payment operation, and choose the SMS verification code for verification, so that the victim’s mobile phone will receive a verification code message. Finally, the scammer asked the victim to provide the verification code received by his mobile phone immediately on the grounds of limited time refund. Once the victim provided the SMS verification code to the other party, the other party succeeded.

  How: Almost flawless. The simplest and most effective way is to call the bank’s official customer service phone immediately to verify, and don’t trust any calls that call in and claim to be customer service.

  Routine 2

  "You are suspected of breaking the law."

  "You are suspected of money laundering", "You are suspected of illegal fund-raising" and "You have to bear criminal responsibility for credit overdraft", all of which are the reasons for pretending to be a public security law to commit fraud. This technique is not new, but because it is extremely intimidating, people who don’t understand this kind of fraud are still easy to fall for it. Nowadays, many scammers pretend to be official customer service numbers through the rebranding software, but if the victim really dials back, he can generally see through the scam. There is even an "upgraded version": scammers guide users to place orders by phone on the grounds of giving away free items, and mail them in the form of cash on delivery. If users refuse to sign for express delivery or return goods, scammers will threaten users with the tone of public security law and cheat.

  How to break it: don’t trust the phone call from strangers easily. If someone says he is suspected of committing a crime, he should first call 110 to ask. Or ask friends and relatives around you, you can usually see through the scam quickly.

  Routine 3

  "Your flight XX has been cancelled."

  Booking airline tickets by mobile phone has become the outlet of online fraud. Liars lied about reasons such as changing the visa and refunding the ticket, guiding people to enter phishing websites, making false numbers, and going into the trap of remittance. "Tencent’s Big Data Report on Anti-Telecommunication Network Fraud in the Second Quarter of 2016" shows that this type of fraud is as high as 44% and has become the mainstream of online fraud. Liars can accurately tell the victim’s name and flight information, and most of them cheat in the name of obtaining compensation for change of visa.

  How to break it: the business of returning and changing airline tickets is handled through the websites, telephones and service halls of airlines, ticketing agents and other formal channels. Don’t trust any phone calls or text messages, even if they are completely consistent with my information.

  Routine four

  "You can apply for a refund if the goods you bought are out of stock."

  The scammer first fully grasps the online shopping information of the victim, and gains the trust of the victim by accurately describing the shopping information of the victim, and then obtains the bank card number, password and SMS verification code of the victim. Liars sometimes use the phone to get relevant information directly, and sometimes let the victim open the phishing website and fill in the relevant information manually. When the bank card number, password and verification code were leaked at the same time, the swindler successfully transferred the money in the victim’s online banking account.

  How to break it: In case of abnormal commodity trading or out of stock, you should first consult the official customer service phone number of the shopping website, and don’t trust the person who calls in on his own initiative and claims to be customer service. Online shopping accounts and payment accounts should have separate passwords, and the passwords should be complicated enough to be changed regularly.

  Routine 5: "Recommend Top Ten Bull Stocks to You"

  This kind of deception usually collects deposits or deposits from users in the name of learning stock knowledge and recommending stocks, which is especially effective for those new investors who are eager for success. In fact, formal securities companies generally do not provide paid stock recommendation services to shareholders, and they will not charge users a deposit or margin in this name. They usually send photos or pictures of the so-called company’s business license, industrial and commercial certificate or organization code, etc., just call the official customer service of the securities company to ask.

  How to break it: don’t trust any information about stock recommendation and stock selection, whether it comes from websites, QQ, text messages or telephone calls. It can be verified by calling back the official customer service phone number.

  Routine 6: "699 yuan free apple 6S"

  Recently, a new type of fraud case was notified by Hunan police. In the name of "collecting 699 yuan personal income tax and giving away Apple 6S mobile phone and 700 yuan calling card for free", a fraud gang sent fake or damaged mobile phones or mobile phone molds to the victims for fraud. In two months, hundreds of people were defrauded, and the amount of fraud was several hundred thousand yuan.

  How to break it: fraud in the name of seemingly legal promotion can’t be lucky, and there is no good thing in the sky.

  Routine 7: "Please receive the newborn allowance in time"

  Criminals cheat on the grounds of receiving newborn allowance, because they can tell the details of the victim and make the deceived believe it. After obtaining the victim’s bank account, the swindler usually asks the victim to operate at the ATM and enter the English operation interface according to the other party’s "guidance". Because the victims can’t understand the English prompts on the ATM, they often regard the transfer procedure as an input verification code and eventually fall for it.

  How to break it: don’t trust such calls or text messages, let alone operate at ATM.

  Routine 8: Replacement of mobile phone cards

  Recently, the routine of this kind of fraud is usually to bomb the mobile phone with hundreds of spam messages and harassing calls to cover up the reminder message of card replacement service sent by 10086 customer service to the mobile phone number; Then, holding a temporary id card with victim information, he went to the business hall to reissue the mobile phone card, which made the owner’s own mobile phone card passively invalid; Finally, change the password of mobile phone customer service and bank card, and steal the money of bank card bound to mobile APP through SMS verification code.

  How to break it: commonly used website passwords and customer service passwords are best different from bank passwords and other key business login passwords, and should be revised regularly; For links sent by various numbers, don’t click at will. If you receive a large number of harassing calls or text messages, don’t turn off your phone. You should use mobile phone security software to block the harassing numbers and unbind the bank card immediately. When using public WiFi, try not to log in to the banking APP in your mobile phone or use your mobile phone to transfer money.

  Routine 9: "Xiao San is pregnant and urgently needs money to have an abortion"

  This is a type of fraud that has been active for a long time, but recently, a liar who is pregnant and urgently needs money to have an abortion has deceived more than 80 elderly people. Liars make full use of the characteristics of the elderly who are distressed by their sons to lure the victims to transfer money. This is a relatively new means and a constant renovation and improvement of scammers in deception.

  How to break it: don’t trust the phone call from strangers easily, especially if it is urgent to make a payment.

  ■ Depth

  1.6 million people are distributed in the black industry chain.

  Dozens of jobs are interlocking.

  The drama of telecom fraud is staged every day, and the scripts of fraudsters are constantly being refurbished. Pei Zhiyong, the chief anti-fraud expert of a website, said that telecom fraud has now formed a black industrial chain from the upstream personal information grabbing and selling to fraud and spoiling. What is jaw-dropping is that this chain is becoming more and more industrialized and specialized, the division of labor is becoming more and more detailed, new roles are constantly emerging, and twenty or thirty "jobs" are interlocking.

  According to the data of a website hunting platform, the scale of information fraud industry in China exceeds 115.2 billion yuan, and there are more than 1.6 million fraudsters. Telecom fraud has been successful many times. Security experts believe that the huge number of telecom fraud, widespread information leakage, perfect industrial chain and systematic training of employees have all become key factors.

  It is understood that the fraud industry chain is divided into at least four major links: upstream information acquisition, intermediate wholesale sales, public fraud, and finally sharing and selling stolen goods. In these four links, there are many jobs, such as fishing editor, Trojan horse development, library hacker, fishing retailer, domain name dealer, letter wholesaler, bank card dealer, phone card dealer, ID card dealer, telephone fraud manager, SMS agent, online promotion technician, financial accountant, ATM pony, and middleman who divide the stolen goods, and so on, which lead the victims into the trap step by step.

  Usually, the upstream information acquisition and wholesale sales links make all kinds of preparations, provide technical support and sell personal information. They are not involved in the implementation of specific fraud and are deeply hidden, but they provide criminal tools for telecom fraud, which is no less harmful than fraud gangs. And the implementation of fraud is the most exposed link for the public. They appear in false identities such as public security law, acquaintances, leaders and customer service, and have strong public relations and communication skills. Divide and sell stolen goods. Once the fraud is successful, it will enter the stage of dividing and selling stolen goods. Sometimes, the gang will arrange for the pony to withdraw money from the ATM, and then transfer the stolen money to the middleman who will distribute it to the gang members. Sometimes, gangs will let financial accountants spread the stolen money to multiple online banking accounts, making it more difficult for the police to solve the case and the bank to freeze the accounts.

  Pei Zhiyong pointed out that there were about 15 types of these jobs at the end of last year, but according to the information currently available, new "jobs" are still emerging. For example, there are actually teaching trainers this year. Some of them are responsible for developing scams, some are responsible for studying business loopholes, some are responsible for editing fraud scripts, and some are doing psychological analysis to design scams specifically for human weaknesses and demands of different groups. The links in these black chains are mutually invisible, which also makes it difficult to solve the case.

  Author/Beijing Morning Post reporter Jiao Likun