Current location - Trademark Inquiry Complete Network - Overdue credit card - A man was defrauded of 2,000 yuan online and asked the Internet police for help. Why did the result become worse?
A man was defrauded of 2,000 yuan online and asked the Internet police for help. Why did the result become worse?

Modern people’s lives are inseparable from the Internet. It is not uncommon to look up information on the Internet and use mobile phones to shop. However, there are also many traps on the Internet. If you trust the Internet too much, something will happen.

A young man in Wuhan was cheated while playing online games, and he found an "Internet policeman" on the Internet. No, he was deceived even worse...

Chen is 20 this year He is an ordinary office worker in Jiangxia, Wuhan. He likes to play online games after get off work.

In May this year, when he was playing a certain game, he was defrauded of 2,000 yuan for purchasing game equipment. His appeal to the game customer service was unsuccessful. In desperation, Chen searched for the words "Internet Police" on Baidu, found an "Internet Police" QQ account with a police badge as its avatar, and asked "Uncle Police" to help him seek justice.

The "Internet Police" said that it would accept the case immediately.

Subsequently, the "Internet police" called to inform Chen that Chen's defrauded funds had been intercepted. However, since the account has been frozen, Chen needs to transfer money to a designated account to activate his own account and get back the money he was defrauded.

On that day, Chen remitted a total of more than 27,000 yuan to the "Internet Police" with the account name Fu in three installments. When Chen contacted Fu again in the afternoon, he could no longer be contacted.

Yes! He was deceived again! ! !

Chen realized he had been deceived and immediately called the police. The police later captured the suspect Fu in Hainan.

! Jing Fu confessed:

He is just a link in a gang that pretends to be an Internet police officer. Half a year ago, he met a person named "Brother Yang" on the Internet. "Brother Yang" asked Fu to open a game account with his ID card, specifically responsible for collecting money, and then transferred it to "Brother Yang".

Fu gets a commission of 12% from each payment, and Fu also develops other downlines to receive a commission of 4% from each downline. For more than half a year, Mr. Fu collected more than 300,000 yuan, and according to preliminary estimates, he made a profit of more than 100,000 yuan.

Fu also confessed that in the gang, there are "operators" who are responsible for communicating with victims on the phone. Through a series of professional terms, the victims are convinced that they are the "cyber police" who are delivering justice. ".

Currently, Fu has been arrested with the approval of the Jiangxia District Procuratorate, and his accomplices are being pursued.

There are so many deceptions on the Internet now that it is difficult to guard against them. Here are the most comprehensive 60 communication network fraud methods in eight categories in history. Read it now~

1. Counterfeit identity fraud:

p>

Carry out fraud by pretending to be leaders, relatives, friends, institutions, etc.

1. Pretend to be a leader for fraud: pretend to be a leader’s secretary or staff member to call the person in charge of a grassroots unit to sell books, commemorative coins, etc.

2. Impersonating relatives and friends to defraud: Impersonating the owner of a communication account to defraud relatives or friends in the name of "serious illness, car accident" and other emergencies.

3. Pretending to be a company CEO to commit fraud: Using a series of disguises, pretending to be a company CEO sends transfer and remittance instructions to employees.

4. Subsidy and scholarship fraud: Calling and sending text messages to disabled people, students, and parents, falsely claiming that they can receive subsidies, relief funds, and scholarships.

5. Telephone fraud by impersonating the public prosecutor: On the grounds that the victim’s identity information has been stolen and is suspected of money laundering, drug trafficking and other crimes, the victim is required to transfer funds to a state account to cooperate with the investigation.

6. Forged identity fraud: Criminals pretend to be "tall, rich, handsome" or "white, rich and beautiful" and use various reasons such as financial constraints and family difficulties to defraud money.

7. Medical insurance and social security fraud: falsely claiming that there is an abnormality in the victim's account, and then pretending to be a judicial officer to trick the victim into remitting money to the so-called safe account to commit fraud on the grounds of fair investigation and easy verification.

8. "Guess who I am" scam: pretending to be an acquaintance and borrowing money from the victim.

2. Shopping fraud:

Fraud is committed through various false preferential information, customer service refunds, and fake online stores.

9. Fake purchasing agent fraud: Using discounts, discounts, overseas purchasing agents, etc. as bait, after the buyer pays, they then ask for additional payment on the grounds that "the goods have been detained by customs and additional tariffs have to be paid." Defrauding money.

10. Refund fraud: Falsely claiming that the goods photographed by the victim are out of stock and requiring a refund, luring buyers into providing bank card numbers, passwords and other information to commit fraud.

11. Online shopping fraud: Criminals set up fake shopping websites or online stores, and after the victim places an order, they claim that the system has failed and needs to be reactivated. Then a false activation URL is sent through QQ, allowing the victim to fill in personal information and commit fraud.

12. Low-price shopping fraud: Criminals publish transfer information of second-hand cars, second-hand computers, items confiscated by customs, etc. The victims contact them to defraud money by paying deposits, transaction tax fees, etc.

13. Installment cancellation fraud: Criminals pretend to be staff of shopping websites, claiming that "due to a banking system error", tricking victims into going to the ATM machine to cancel the installment payment procedures and implement fund transfers.

14. Collection fraud: Criminals pretend to be collection associations, print invitations and mail them to various places, saying that they will hold an auction and leaving their contact information. Once the victim contacts him, he will ask the victim to transfer money to a designated account in the name of prepayment of assessment fees.

15. Express delivery signature fraud: Criminals pretend to be couriers and call the victim’s phone number, saying that they have express delivery that needs to be signed for but cannot see the information clearly and need the victim to provide it. Then the "goods" are delivered to the door, and after the victim signs for them, he calls again to say that he has signed for them and must pay, otherwise the debt collection company will cause trouble.

3. Activity fraud:

Publish various false activities through social tools such as WeChat and Weibo to induce users to participate in fraud.

16. Publish false love messages: Criminals post fictitious posts about missing people and helping the poor on the Internet in the form of "love messages", causing kind-hearted netizens to forward them. In fact, the contact number left in the post is Scam calls.

17. Like fraud: Criminals pretend to be merchants and publish "like and win prizes" messages, asking participants to send their names, phone numbers and other personal information to social tool platforms, and then obtain enough personal information. , committing fraud in the form of requiring payment of a deposit for winning a prize.

4. Incentive fraud:

Use all kinds of tempting winning information, rewards, and high salaries to attract users to commit fraud.

18. Pretend to be a well-known company to win the lottery: Pretend to be a well-known company, pre-print large quantities of beautifully fake lottery-winning scratch cards, deliver them, and then use various excuses such as the need to pay personal income tax to lure the victim to the designated Bank account transfer.

19. Entertainment program prize-winning fraud: Criminals send group text messages to victims’ mobile phones in the name of popular program groups, claiming that they have been selected as lucky viewers and will receive huge prizes. Various excuses such as paying a deposit or personal income tax are required to commit fraud.

20. Points redemption fraud: Criminals make phone calls, falsely claiming that the victim’s mobile phone points can be redeemed, and inducing the victim to click on the phishing link. If the victim enters bank card number, password and other information according to the provided URL, the funds in the bank account will be transferred.

21. QR code fraud: Using price reductions and rewards as bait, the victim is asked to scan the QR code to join the membership, but in fact it contains a Trojan horse virus. Once scanned and installed, the Trojan will steal the victim's bank account number, password and other personal privacy information.

22. Huge amount of money to get a child fraud: Criminals falsely claim that they are willing to pay a lot of money to get a child, luring the victim into being deceived, and then committing fraud for various reasons such as paying earnest money and inspection fees.

23. High-paying recruitment fraud: Criminals send messages in groups, under the guise of recruiting certain types of professionals with high monthly salaries of tens of thousands of yuan, and require the victim to go to a designated location for an interview, and then pay training fees and clothing fees. Committing fraud in the name of , deposit, etc.

24. Email winning scam: Criminals send winning emails through the Internet. Once the victim contacts the criminals to redeem the prize, the criminals ask the victim to remit money for various reasons such as personal income tax and notary fees. , to achieve the purpose of fraud.

5. Fraud by fabricating dangerous situations:

Carry out fraud by fabricating various unexpected news to make users frightened and uneasy.

25. Fictitious car accident fraud: Criminals require the victim's relatives or friends to transfer money immediately on the grounds that the victim's relatives or friends have been involved in a car accident and need to deal with the traffic accident urgently. The person involved then transferred the money into the designated account according to the criminal's instructions.

26. Fictional kidnapping fraud: Criminals fabricate that the victim’s relatives and friends have been kidnapped. If they want to rescue the hostages, they must immediately transfer money to the designated account and cannot call the police, otherwise they will be rejected. The parties are often at a loss and follow the criminals' instructions to deposit money into their accounts.

27. Fictitious surgery fraud: Criminals require the victim to transfer money on the grounds that the victim’s child or parent suddenly becomes ill and requires emergency surgery. In this situation, the victim is often anxious and follows the criminal's instructions to transfer money.

28. Fictitious crisis and help-seeking fraud: Criminals use social media to post false conditions such as serious illness and life difficulties to win the sympathy of netizens and accept donations.

29. Drug concealment fraud in fictitious packages: Criminals commit fraud by asking the victim to transfer money to a national security account for fair investigation on the grounds that drugs were found in the package.

30. Fabricated obscene pictures and extortion fraud: Criminals collect photos of public officials, use computers to synthesize obscene pictures, and mail them to victims with payment account numbers attached to threaten and extort money.

31. Fictitious mistress is pregnant and has an abortion: Criminals pretend to be their sons and send text messages to their parents, making full use of the characteristics of the elderly who feel sorry for their sons and tempting the victims to transfer money.

6. Daily consumption fraud:

Carry out fraud scams for various payment and consumption in daily life.

32. Impersonating landlord text message fraud: Criminals pretend to be landlords and send group text messages, saying that the landlord’s bank card has been changed and asking for the rent to be transferred to other designated accounts. Some tenants believe it is true and transfer the rent out before they realize they have been deceived. .

33. Telephone arrears fraud: Criminals pretend to be staff of communication operation companies, make phone calls or directly play computer voices to the victim, and request that the arrears be transferred to a designated account on the grounds that the phone is in arrears. .

34. TV arrears fraud: Criminals pretend to be radio and television staff to make group calls, saying that cable TV companies operating in other places in the name of the victim are in arrears, and asking the victim to pay the arrears to the designated account. People believed it to be true and found out after transferring money that they had been cheated.

35. Shopping tax refund fraud: After criminals obtain the victim’s purchase information of real estate, cars, etc. in advance, they trick the victim into performing a transfer operation at an ATM machine and depositing money into the card on the grounds that tax policy adjustments can be used to apply for tax refunds. Transfer to the scammer’s designated account.

36. Ticket change fraud: Criminals pretend to be airline customer service personnel and use the pretext of "flight cancellation, refund, and ticket change services" to trick ticket buyers into performing multiple remittance operations and commit serial fraud.

37. Ticket booking fraud: Criminals create fake online ticket booking company web pages, publish false information, and lure victims into being fooled with lower ticket prices. Subsequently, the victim was asked to remit money again using reasons such as "the ticket booking was unsuccessful" and committed fraud.

38. ATM machine notice fraud: Criminals block the card exit of the ATM machine in advance and paste a false service hotline to induce users to contact them after the card is "swallowed", obtain the password, and wait for the user to leave. Then he went to the ATM machine to take out the bank card and stole the cash in the user's card.

39. Credit card consumption fraud: On the grounds that bank card consumption may reveal personal information, criminals pretend to be UnionPay centers or police officers to set up traps and obtain bank account numbers and passwords to commit crimes.

40. Inducement remittance fraud: Criminals directly ask the other party to transfer deposits to a certain bank account by sending group text messages. Since the victim is preparing to remit money, after receiving such remittance fraud information, he often does not After verification, the money will be transferred to the scammer's account.

7. Phishing and Trojan horse virus fraud:

Scams that steal user account passwords and other privacy by pretending to be banks, e-commerce and other websites.

41. Fake base station fraud: Criminals use fake base stations to send fake links to the masses for online banking upgrades and 10086 mobile mall exchange for cash. Once the victim clicks on them, they will implant them on their mobile phones to obtain bank account numbers, Trojans of passwords and mobile phone numbers to further commit crimes.

42. Phishing website fraud: Criminals use the bank's online banking upgrade as an excuse to require the victim to log in to a phishing website pretending to be a bank, and then obtain the victim's bank account, online banking password, mobile phone transaction code and other information to commit fraud.

8. Other new types of illegal fraud:

43. School Communication SMS link fraud: Criminals send fraudulent text messages with links in the name of "School Communication". Once you click on the link to enter, the mobile phone will be implanted with a Trojan horse program, and there is a risk that the bank card will be stolen.

44. Traffic violation text message fraud: Criminals use fake base stations and other crime tools to send fake violation reminder text messages. Such text messages contain Trojan horse links. After the victim clicks, the text messages will be sent in bulk, causing a loss of phone bills. Steal bank card, Alipay and other account information from the mobile phone, and then steal the bank card, causing serious economic losses.

45. Wedding electronic invitation fraud: Criminals use electronic invitations to induce users to click and download, and then they can steal bank account numbers, passwords, address books and other information on the mobile phone, and then steal the user's bank account card, or send a group of loan fraud text messages to friends in the user’s address book.

46. Photo Album Trojan Horse Scam: Criminals impersonate the identity of a “mistress” to provoke the victim to click on the “Photo Album” link, and then plant a Trojan horse virus to obtain the user’s online banking information.

47. Financial transaction fraud: Criminals use the name of securities companies to spread false inside information and trends of individual stocks through the Internet, phone calls, text messages, etc. After gaining the trust of the victims, they then guide them to set up false transactions on their own Buy futures and spot goods on the platform to defraud the victim of funds.

48. Credit card fraud: Advertisements for high-limit overdraft credit cards are published in the media. After the victim contacts them, they ask the victim to transfer money continuously in order to pay handling fees, agency fees, etc.

49. Loan fraud: Criminals send messages in groups, claiming that they can provide loans to people who are short of funds, with low monthly interest rates and no guarantees required. Once the victim believes it to be true, the other party will commit fraud in the name of prepaid interest, deposit, etc.

50. Copying mobile phone card fraud: Criminals send mass messages claiming that they can copy mobile phone cards and monitor mobile phone call information. Many people actively contact the suspects for personal needs, and then the other party purchases copied cards and prepaid cards. Defrauding money in the name of payment.

51. Fictional pornographic service fraud: Criminals leave phone numbers for pornographic services on the Internet. After the victim contacts them, they say they need to pay first before they can provide services at their door. The victim calls the money to After specifying the account, I discovered that I had been scammed.

52. Exam question provision fraud: Criminals call candidates who are about to take the exam and claim that they can provide test questions or answers. Many candidates are eager for success and transfer the down payment of the benefit fee to a designated account in advance. Found out to be cheated.

53. Account theft and reputation fraud: After criminals steal merchants’ social platform accounts, they publish push messages saying “We are looking for online part-time jobs to help Taobao sellers build their reputation and earn commissions.” The victim made multiple purchases according to the other party's request to improve his credit, but later found out that he had been deceived.

54. Pretend to be a gangster and extortion fraud: criminals first obtain the victim’s identity, occupation, mobile phone number and other information, make a call claiming to be a gangster, and are hired to be harmed, but the victim can spend money to eliminate the disaster, and then Provide an account number and ask the victim to transfer money.

55. Copycat WiFi in public places: Criminals set up and copycat signals. These signals are phishing free WiFi released by some hackers in public places. When connected to these free networks, , through the transmission of traffic data, hackers can easily steal the photos, phone numbers, and various passwords in the mobile phone, and blackmail the owner.

56. Picking up a bank card with a password: Criminals deliberately discarded bank cards with a password and marked the "phone number of the bank where the account was opened", taking advantage of people's psychology of taking advantage and inducing those who picked up the card to The person calls the phone to "activate" the card and deposits money into the scammer's account.

57. Abnormal changes in funds in the account: Criminals first stole the victim's online banking login account and password, and then created the illusion that there was an outflow of funds on the bank card through operations such as purchasing precious metals and converting current deposits to fixed term. Then the fake customer service calls to confirm whether the transaction is done by him, and agrees to give the user a refund to deceive the user's trust, and requires the victim to provide the verification code received on his mobile phone. Once the victim provides the SMS verification code to the other party, the other party succeeds. .

58. First transfer, then withdraw cash, and then cancel: Criminals use the "time difference" between the transfer and arrival time in the new bank transfer regulations to set up a trap. The fraud scheme of transferring money first and giving cash later is adopted. After defrauding the victim of cash, the transfer is cancelled.

59. Replacement of mobile phone cards: Criminals first bombard the mobile phone with hundreds of spam text messages and harassing calls to cover up the card replacement reminder text messages sent to the mobile phone number by 10086 customer service; then, with A temporary ID card with the victim's information is used to apply for a mobile phone card on-site at the business hall, which makes the owner's own mobile phone card passively invalid, thereby receiving the SMS verification code and stealing the money bound to the bank card on the mobile APP.

60. Please Huicun after changing your number:? This is an “upgrade” of telecommunications fraud involving pretending to be an acquaintance. After criminals obtained the phone owner's address book information through illegal channels, they pretended to be the phone owner and sent text messages to the contacts in the phone, claiming to have a new number, and then defrauded the contacts in the phone.

This may be the longest and most practical anti-fraud guide in history. Some scams are really beyond your imagination!

Please remember these to avoid being deceived.