Current location - Trademark Inquiry Complete Network - Overdue credit card - List eight common types of telecommunications fraud
List eight common types of telecommunications fraud

Telecom fraud is when criminals use mobile phones, landline phones, the Internet and other communication tools for the purpose of illegal possession, in a remote and non-contact manner, and through fictitious facts to induce victims to call designated accounts. It is a criminal act to defraud other people's property by making money or transferring money. List eight common types of fraud:

1. QQ impersonation friend fraud: Use Trojan horse program to steal the other party’s QQ password, intercept the other party’s chat video data, and after getting familiar with the other party’s situation, pretend to be the owner of the QQ account. QQ friends committed fraud on the pretext of "serious illness, car accident", "urgent need of money" and other urgent matters.

2. QQ fraud by pretending to be a company CEO: Criminals search the QQ group of financial personnel, use "accounting qualification examination syllabus documents" as bait, send Trojan viruses, steal the QQ numbers used by financial personnel, and analyze Determine the QQ number of the boss of the financial staff, and then pretend to be the boss of the company to send transfer instructions to the financial staff.

3. WeChat pretends to be the company CEO to defraud financial personnel: Criminals use technical means to obtain the company’s internal personnel structure, copy the company CEO’s WeChat nickname and avatar picture, and pretend to be the company CEO and add financial personnel to WeChat to commit fraud.

4. Fictitious car accident fraud: Criminals fabricate that the victim’s relatives or friends have been involved in a car accident and need to deal with the traffic accident urgently, and require the other party to transfer money immediately. Due to the emergency situation, the client followed the suspect's instructions and transferred the money into the designated account.

5. Email winning scam: winning emails are sent through the Internet. Once the victim contacts the criminals to redeem the prize, they will use various reasons such as "personal income tax", "notary fees", and "transfer fees". Requesting the victim to send money to achieve the purpose of fraud.

6. Entertainment program lottery fraud: Criminals send group text messages to victims' mobile phones in the name of popular program groups such as "I want to go to the Spring Festival Gala", "Extraordinary 6 1", "The Voice of China" etc. , claiming that he had been selected as a lucky viewer of the program and would receive huge prizes, and then carried out a series of frauds using various excuses such as payment of handling fees, deposits or personal income taxes to trick the victim into remitting money to a designated bank account.

7. Telephone fraud by impersonating the public prosecutor, procuratorate, and law: criminals pretend to be public prosecutor, procuratorate, and law enforcement personnel to call the victim’s phone number and request that the victim’s funds be transferred to a state account to cooperate with the investigation on the grounds that the victim’s identity information has been stolen and is suspected of money laundering and other crimes.

8. Fictional kidnapping fraud: Criminals fabricate that the victim’s relatives and friends have been kidnapped. If they want to rescue the hostages, they must immediately transfer money to the designated account and cannot call the police, otherwise they will be rejected. The parties involved are often at a loss because of the emergency situation and follow the suspect's instructions to deposit the money into the account.

Extended information:

In addition, fraudsters also engage in low-price shopping fraud, credit card fraud, credit card consumption fraud, package drug concealment fraud, etc. For this reason, the public security organs have adopted Distribute leaflets, give on-site explanations, etc. to introduce to the public the common techniques, methods of committing crimes, and identification and prevention techniques of telecom fraud. At the same time, combined with the cases of telecom fraud that have occurred in the jurisdiction, the public can become more familiar with the methods and characteristics of telecom fraud cases. , reminding the general public not to trust strangers’ phone calls, text messages, and WeChat messages, and to report any abnormal situations to the police in the jurisdiction or call the police in a timely manner.

Reference material: People's Daily Online--The Ministry of Public Security disclosed 48 common telecommunications fraud cases