Current location - Trademark Inquiry Complete Network - Overdue credit card - At the same time, disclose: name, ID number, mobile phone number, bank card number, will it be dangerous?
At the same time, disclose: name, ID number, mobile phone number, bank card number, will it be dangerous?
it will be dangerous to disclose: name, ID number, mobile phone number and bank card number at the same time.

if the mobile phone number, bank card number, name and ID number are leaked, it is more dangerous. For the safety of the funds in the bank card, you'd better cancel this bank card, and then apply for a new bank card to deposit. Revealing the four elements of name, ID number, bank card and mobile phone number will not be used to make online loans. Online loans must generally require kyc identification, including the above four elements, as well as live identification, so as to explain this person's true wishes. The disclosure of the four elements may be used by criminals to register some other websites, but just registering is not enough.

Moreover, it is dangerous to know the card number and name of the bank card. In this case, it is likely that the bank card will be "cloned", especially the magnetic stripe card. Because criminals get the leaked bank card information, they can "clone" a bank card exactly like the original card by copying the equipment software. Therefore, users can go to the bank as soon as possible to replace IC chip cards, especially those with large savings cards, which can reduce the risk of stolen brushes from the source. It is also best for cardholders to change their passwords regularly, so as to ensure the safety of funds.

In addition, through the dark network or black market, a set of four elements probably ranges from tens of yuan to hundreds of yuan, which is screened and purchased by more professional hackers. Low-level hackers look at quantity rather than quality, but only pay attention to the quantity of information obtained, and make profits by reselling large quantities of data. High-level hackers, on the other hand, screen high-value information, that is, find a single breakthrough in high-value personal information, with the goal of individual account invasion and fund theft. Some platforms don't check the SMS verification code for quick impulse, and even the key positions in the marketing department or operation department of the platform collude with the black product, so that the black product can help the platform to impulse with the four elements bought, and the black product earns marketing expenses, and the market operation completes KPI. Investors are happy to see high growth. In this case, it is still dominated by the control of a large number of accounts, and the profit of a single account is less.

finally, once the identity information is leaked, it is likely to be used by criminals. You can complain and report to the Internet management department, the industrial and commercial department and other industry management departments and related institutions in time. If there is a clear infringer, you can use legal means to safeguard your legitimate rights and interests according to the Civil Code and the Consumer Protection Law, and ask the infringer to apologize, eliminate the influence, restore your reputation and compensate for the losses.