Telecommunications fraud is both a source of great harm and disturbance, with some victims losing all their wealth and even facing the loss of their families. In the past year alone, there were 599,000 cases of telecommunications fraud across the country, with 222 billion yuan被骗 taken, figures that are shocking and alarming. What tricks do the scammers use? What loopholes do they exploit? How can we identify and prevent such frauds? Today, the editor will unveil the methods of telecommunications fraud and anti-fraud skills.
Part 1: 63 Types of Fraudulent Methods
1. QQ Fake Friend Fraud. By using a Trojan program to steal the victim’s QQ password, intercepting chat videos and information, and getting to know the victim’s situation, the scammers pretend to be the owner of the QQ account to defraud their QQ friends under the pretext of ‘severe illness, car accident’ or ‘urgent need for money’.
2. QQ Fake Company Boss Fraud. Criminals search for financial personnel QQ groups and send Trojan viruses with lures such as ‘accounting qualification examination outline documents’, steal the QQ numbers used by financial personnel, analyze and judge the QQ number of the financial personnel’s boss, and then pretend to be the company boss to send transfer and remittance instructions to the financial personnel.
3. WeChat Fake Company Boss Fraud to Financial Personnel. Criminals obtain the internal personnel structure of the company through technical means, copy the WeChat nickname and avatar of the company boss, and pretend to be the company boss to add financial personnel’s WeChat and carry out fraud.
4. WeChat Fake Identity Fraud. Criminals use the ‘People Nearby’ feature of WeChat,Check the situation of surrounding friends, pretend to be a “high, rich, and handsome” or “white, rich, and beautiful” person, add them as friends to deceive their feelings and trust, and then cheat money with various reasons such as financial difficulties or family troubles.
5、WeChat fake agent shopping fraud. Criminals pretend to be regular micro-commerce in WeChat Moments, using discounts, promotions, overseas agent purchases, etc. as bait. After the buyer pays, they ask for additional payment under the pretext of “the goods being seized by customs and needing to pay additional customs duties”. Once they obtain the purchase amount, they lose contact.
6、WeChat false love transmission fraud. Criminals post fictional missing person or helping the poor posts in the form of “love transmission” in Moments, causing kind-hearted netizens to forward them. In fact, the vast majority of contact information left in the posts are local numbers, and calling them results in either expensive calls or telecommunications fraud.
7、WeChat like fraud. Criminals pretend to be merchants and release “like to win prizes” information, requiring participants to send their names, phone numbers, and other personal information to the WeChat platform. Once the merchant has obtained enough personal information, they implement fraud in the form of “handling fee”, “notarization fee”, or “security deposit”.
8、WeChat public account fraud. After stealing the public account of merchants, criminals post messages such as “hiring online part-time jobs, helping Taobao sellers improve their credibility, and earning commissions in the process”. The victims believe it to be true and follow the other party’s requirements to shop and improve credibility multiple times, only to find out later that they have been deceived.
9、Fictitious pornographic service fraud.Crimes occur when criminals leave phone numbers for providing pornographic services online. After the victims contact them, the criminals claim that payment is required before they can provide the service at the victim’s location. The victims transfer money to the specified account and then discover that they have been deceived.
10. Fraudulent accident scam.Criminals fabricate that the victim’s relative or friend has been involved in a traffic accident and needs urgent handling of the traffic accident. They require the victim to transfer money immediately. The parties, due to the urgency of the situation, transfer money to the specified account according to the suspect’s instructions.
11. Email lottery fraud.Through the internet, lottery winning emails are sent. Once the victims contact the criminals to claim the prize, they are asked to pay various fees such as “individual income tax”, “notary fee”, and “transfer fee” for reasons such as these, aiming to defraud the victims.
12. Fraudulent lottery scam by impersonating famous enterprises.Criminals impersonate well-known enterprises such as Samsung, Sony, and Haier, and pre-arrange a large number of beautifully printed false winning scratch cards. These are sent by mail or by hiring people to deliver them. Later, they use various excuses such as needing to pay handling fees, deposits, or individual income tax to lure the victims into transferring money to the specified bank account.
13. Entertainment program lottery fraud.Criminals send short messages to the victims’ mobile phones in the name of popular TV programs such as “I Want to Go to Spring Festival Gala”, “Very 6+1”, and “China’s Got Talent”, claiming that the victims have been selected as lucky audience members and will receive substantial prizes. Later, they use various excuses such as needing to pay handling fees, deposits, or individual income tax to carry out a series of fraudulent activities, luring the victims into transferring money to the specified bank account.
14. Phone fraud by impersonating public security and procuratorial organs.}}Criminals posing as public security, procuratorial, and judicial personnel call victims, claiming that the victim’s identity information has been stolen and used for money laundering and other crimes, and demanding that the victim transfer their funds to a state account to assist with the investigation.
16,虚构绑架诈骗。Criminals fabricate the story that the victim’s relatives or friends have been abducted and require immediate transfer of money to a designated account to rescue the hostage without reporting to the police, otherwise the victim will be killed. The party involved is often in a state of urgency and at a loss, and transfers money according to the suspect’s instructions.
18,电话欠费诈骗。Criminals posing as staff of communication operators call the victim or directly play computer voice, claiming that the victim’s phone is overdue and demanding that the overdue payment be transferred to a designated account.
20、Refund Fraud. Criminals pretend to be customer service representatives of Taobao and other companies by making phone calls or sending text messages, claiming that the goods purchased by the victim are out of stock and a refund is needed. They ask the buyer to provide bank card numbers, passwords, and other information to carry out fraud.
22、Online Shopping Fraud. Criminals set up fake shopping websites or Taobao stores. Once the victim places an order to purchase goods, they claim that there is a system failure and the order has a problem, and it is necessary to reactivate it. Subsequently, they send a fake activation website through QQ, and after the victim fills in their Taobao account, bank card number, password, and verification code, the amount on the card is immediately deducted.
24、Credit Card Application Fraud. Criminals publish advertisements in newspapers, mail, etc., advertising the availability of high-limit credit cards. Once the victim contacts them, the criminals ask for continuous transfers under false pretexts such as “service fee”, “intermediary fee”, “security deposit”, etc.
26、Parcel Drug Smuggling Fraud.Criminals claim that the victim’s package was found to contain drugs, stating that the victim is suspected of money laundering crimes and requires the transfer of money to the national security account for a fair investigation, thereby committing fraud.
28、Medical Insurance, Social Security Fraud.Criminals impersonate staff from the Social Security and Medical Insurance Centers, claiming that the victim’s medical insurance and social security have issues, possibly being misused or overdrawn by others, suspected of money laundering, drug trafficking, and other crimes. They then impersonate judicial personnel to conduct a fair investigation and check for verification purposes, tricking the victim into transferring money to the so-called ‘safe account’ for fraud.
30、Lure Transfer Fraud.Criminals directly request the recipient to transfer money into a specified bank account via mass SMS. Since the victim is preparing to make the transfer, they often send money to the scammer’s account without careful verification.
32、Collectibles Scam. Criminals pretend to be various collectibles associations, send invitation letters to various places, claiming to hold auctions and leave contact information. Once the victim contacts them, they will ask the victim to transfer money to a designated account under the guise of pre-paying evaluation fees, guarantee fees, venue fees, etc.
34、High-Paid Child Adoption Scam. Criminals claim to be willing to pay a high price for a child, lure victims into believing the story, and then carry out fraud under various pretexts such as诚意金 (sincerity deposit), examination fees, etc.
36、”Guess Who I Am” Scam.Criminals obtain the victim’s phone number and the name of the owner, then call the victim and ask them to “guess who I am”, and then pretend to be an acquaintance based on the victim’s description and claim to visit the victim. Subsequently, they fabricate reasons such as being “detained for public security” and “traffic accidents” to borrow money from the victim. Some victims transfer money into the bank account provided by the criminals without verifying it carefully.
37、Faking Black Society Extortion Scam.Criminals first obtain the victim’s identity, occupation, mobile phone number, and other information, call and claim to be members of a gang, threatening to harm the victim, but the victim can “solve the problem by spending money” and then provide an account to request the victim to transfer money.
38、Providing Exam Questions Scam.Criminals call candidates who are about to take exams, claiming that they can provide exam questions or answers. Many candidates are eager to succeed and transfer the initial payment of the benefit fee to the designated account in advance, only to find out later that they have been deceived.
39、High Salary Recruitment Scam.Criminals use the pretext of high salary recruitment for certain professional personnel as a cover, requiring the victim to go to a designated location for an interview, and then carry out fraud under the guise of training fees, clothing fees, and deposit guarantees.
40、Phone Card Duplication Scam.Criminals send mass messages, claiming that they can duplicate phone cards and monitor phone call information. Many people contact the suspects proactively due to personal needs and are then deceived by the suspects under the pretext of purchasing duplicate cards and making advance payments.
41、Phishing Website Scam.Criminals claim that the bank’s online banking needs to be upgraded and require the victim to log in to a fake bank’s phishing website.Then obtain the victim’s bank account, online banking password, mobile transaction code and other information to carry out fraud.
42, Cancel the installment payment fraud. Criminals purchase buyer information from special channels of shopping websites, pretend to be staff of the shopping website, claiming that “due to errors in the bank system, the buyer’s one-time payment has become installment payment, and the same amount must be paid each month”, and then pretend to be bank staff to lure the victim to the ATM machine to handle the installment payment cancellation procedures, in fact implementing fund transfer.
43, Ticket reservation fraud. Criminals use portal websites, travel websites, Baidu search engine, etc. to place advertisements, create false online ticket reservation company web pages, release false information such as ticket reservation for flights and trains, and entice victims to fall for the low price. Subsequently, they require the victim to remit money again under the pretext of “incomplete identity information”, “account frozen”, “ticket reservation not successful”, etc., thus implementing fraud.
44, ATM machine notice fraud. Criminals block the card output port of the ATM machine in advance and paste false service hotline notices on the ATM machine, luring bank card users to contact them after their card is “swallowed”, extract passwords, and then withdraw the bank card after the user leaves to steal cash in the user’s card.
45, Fake base station fraud. Criminals use fake base stations to send fake links such as online banking upgrade and 10086 mobile mall cash redemption to the general public. Once the victim clicks, a trojan that can obtain bank account numbers, passwords, and mobile numbers is planted on their phone, thereby further implementing criminal activities.
46, Financial transaction fraud.}}Criminals, under the name of a certain securities company, disseminate false stock insider information and trends through the internet, phone calls, and text messages, gain the trust of the victim, and then guide them to purchase futures and spot transactions on their own fake trading platforms, thereby defrauding the victim’s funds.
48、QR Code Scam.Criminals use discounts and rewards as bait, requiring victims to scan QR codes to join members. In fact, it is attached with a Trojan virus. Once scanned and installed, the Trojan will steal the victim’s bank account number, password, and other personal privacy information.
50、Fictional Detention Scam.Criminals fabricate reasons such as the victim’s children being detained by the public security organs for soliciting prostitutes, fighting, etc., and require the victim to transfer money to pay for the detention guarantee. The victim’s children are generally college students, and criminals often choose to carry out scams during the exam period of the victim’s children. In the case where the victim cannot contact their children by phone, they often transfer money according to the suspect’s instructions.
There are also illegal fund-raising scams in fraud crimes, as they disguise themselves as real people, real events, and real projects,往往能够将人骗的血本无归。以做补充。
54、以网络Online casino and How to find it 升值、现货交易、资金互助、黄金、贵金属、期货、外汇交易等为噱头,引诱投资人投资,尤其是鼓励发展他人并给予提成;
55、频繁变换网站名称、投资项目;
56、公司网站无正式备案;download lottery download,come on baby
57、以个人账户或现金收取资金、现场或即时交付本金即给予部分提成、分红、利息;
58、Promise ultra-high yield rates, especially “static” and “dynamic” yield rates promised; online website sports and The latest method
59、Clearly beyond the scope of business registered with the company, especially without qualifications to engage in financial business;
60、Setting up stalls and distributing “financial product” advertisements in places with high human traffic and gatherings such as streets, supermarkets, and shopping malls, especially targeting the middle-aged and elderly as the main recruitment objects.
Of course, we cannot ignore pyramid schemes.
61、Fabricating or distorting national or regional development policies, such as “national pilot” “Western Development” “Beibu Gulf Construction” “capital operation” “1040 Project” “Sunshine Project” and so on;
62、Under the guise of “innovation and reform” in business and investment models, such as “e-commerce” “consumer return” “chain sales” “chain加盟” “franchise operation” “online games” “advertising profit” “charity” “love and mutual assistance” “consumer pension” “}}Overseas fund investment, original stock investment, electronic currency trading, and others;
63. Claiming high returns, including: static returns, dynamic returns, direct referral awards, layer referral awards, collision awards, point-of-view awards, leadership awards, cultivation awards, order reporting awards, management awards, and community performance awards, etc.
Second, 5 Major Fraud Tactics (Ultimate Fraud Technique Manual)
The most critical link in the whole process of telecommunications fraud is the acting in the phone. According to the requirements of the fraud script, one must be forceful and expressive, luring others into the trap. The whole process generally consists of five steps.lottery tutorial and The latest website
Step 1: Gain Trust. The swindler gains the initial trust of the victim by purchasing personal information of the victim, such as ID card number, address, and other privacy, and at the same time, uses the number-changing software to display the incoming call as a police office phone, asking the victim to dial 114 for verification to further enhance trust.
Step 2: Intimidate. The swindler intimidates and controls the victim with a forceful and fierce tone.
Step 3: Threaten. The swindler makes the victim completely believe that they are involved in a major case and may be arrested at any time. To enhance the threat and make the fraud more realistic, the swindler will send the victim a warrant through a fake legal authority website or network fax.online casino victory and The most fun game
Step 4: Transfer Funds. Taking advantage of the victim’s panic, the swindler softens the tone and lures the victim into the trap.}}
Fifth Step: Telephone Remote Transfer. The scammers claim to be conducting a fund investigation, but in reality, they require the victim to insert their bank card into an ATM machine and then transfer the funds in the card to the designated account.
By this point, the entire fraud process is complete, and the savings in the victim’s card will fall entirely into the hands of the scammers. However, this is not the end of the scam. Soon, the victim will continue to receive threatening calls to transfer money. The scam script requires that once the hook is taken, the scammers should drain the victim completely, even to the point of selling their house.
Third: 9 Anti-Fraud Skills
1. Verify ‘Trusted Website’
Identify the authenticity of a website through third-party website identity credibility authentication. Many websites have installed third-party website identity credibility authentication ‘Trusted Website’ on their homepage, which can help netizens judge the authenticity of the website.online website sports and What is it
The ‘Trusted Website’ verification service verifies the real identity of the website by strictly reviewing the enterprise domain registration information, website information, and enterprise business registration information. After certification, the enterprise website enters the ‘Trusted Website’ sub-database in the national highest directory database operated by the China Internet Network Information Center (CNNIC), thereby improving the credibility level of the enterprise website. Netizens can confirm the real identity of the website by clicking on the ‘Trusted Website’ logo at the bottom of the website page.
Netizens should develop the habit of checking the identity information of the website during online transactions, and enterprises should also install third-party identity credibility identification to strengthen consumer protection.
Counterfeit websites generally have subtle differences from the real ones. When in doubt, carefully distinguish their differences, such as in the domain name, counterfeit websites often replace the letter ‘I’ with the number ‘1’, and CCTV with CCYV or CCTV-VIP such counterfeit domain names.
4. Query the website record
Through ICP record, you can query the basic information of the website and the information of the website owner. For non-commercial websites without legal record or commercial websites without ICP license, according to the nature of the website, fines will be imposed, and in serious cases, the website will be closed.
6. Master the official contact information
Master the official customer service contact information of online financial products such as Yu’e Bao, Qian Bao, and理财通, and maintain a cautious attitude towards the official websites or customer service phone numbers found through Baidu search.
7, Be cautious when clicking on links
Users of online financial products such as Yu’e Bao should not click on links sent by strangers or compressed files; be vigilant when receiving files with the .apk extension and do not click to download.
8, Pay attention to protect personal passwords
When selling or lending a computer, be sure to clean up personal privacy content in the computer, especially the commonly used accounts and passwords.
9, Be careful of computer viruses and mobile malware
In daily use, do not save account passwords for online banking, Alipay, and other accounts; if a trojan is found on the computer, change the account password immediately on a safe computer (do not change it on the computer that has been infected with a trojan) and call the relevant customer service to confirm the safety.
Source: Grassroots Police
Transferred and published by Xixia District “Fuxing Law and Education 365”