Current location - Trademark Inquiry Complete Network - Futures platform - What are the online fraud methods?
What are the online fraud methods?

At present, online fraud incidents occur frequently, and fraud methods are escalating. Netizens should be vigilant and enhance their awareness of network security, and summarize several common fraud methods:

Pseudo-part-time fraud: a scam that uses advertisements for part-time jobs to conduct practical training, such as "recruiting students to take part-time jobs (not intermediaries)", "recruiting college students to distribute leaflets" and "recruiting part-time jobs to distribute leaflets (students are preferred)

crazy online earning fraud: post something on the internet, such as "invest in ×××, start a family business!" " What is the false information that "chatting online and posting posts can make money, with a monthly salary of 1, yuan"? In fact, the purpose of the liar is to ask you to register, and then let you join the so-called project. After you join, you will receive a certain joining fee.

swipe fraud: A large number of advertisements for "Tik Tok agent" and "Taobao swipe" were distributed in the circle of WeChat friends, and several WeChat groups were established to defraud everyone to pay a certain amount of "agent deposit" and "membership fee".

soliciting goods fraud: usually contact netizens first to establish a relationship with each other to defraud each other's trust; After gaining the trust of the other party, they will ask for a flower basket (or similar items) on the grounds of company opening and store opening, and give the account to the other party for remittance.

Bar scam: using online dating chat to induce people to meet them, and then taking them to unknown bars, restaurants or other entertainment places, and colluding with unscrupulous merchants to cheat and blackmail them.

elaborate layout fraud: falsely claiming to take the opportunity to meet netizens from other places for various reasons, after careful layout, simulating the airport situation with recordings, colluding with associates to pretend to be airport staff to cheat members' trust, and then committing fraud.

Financial fraud in shopping: overseas securities, investment or employees in large companies will be lured by low investment and high remuneration to defraud others of a large amount of economic property and induce shopping consumption through sales promotion.

Loan application fee fraud: housing or car loans with low interest rates are provided online, and the application conditions are quite relaxed. As long as you pay a loan application fee, you are guaranteed to be granted a loan. As a result, after the application fee is charged, there is no news again.

Loan interest expense fraud: fraud is conducted under the pretext of paying interest expense in advance. When interest expense is remitted to the other party's card, the other party disappears.

bank card fraud: using the website to collect personal information, stealing the borrower's bank card on the grounds of checking the running water, and then asking the borrower to provide the bank card number and SMS verification code to steal the borrower's own assets online.

Stealing personal information fraud: By proving the borrower's repayment ability, the network cheats the borrower's basic information, and then the money on the card will be transferred to other accounts through various means.

Fraud by impersonating a leader: The impersonating leader calls the person in charge of the grass-roots unit, asking the deceived unit to pay the subscription money and handling fee until the designated bank account number on the grounds of selling books and commemorative coins.

Fraud by impersonating relatives and friends: using Trojan horse program to steal the password of the other party's network communication tool, intercepting the other party's chat video materials, pretending to be the owner of the account to defraud his relatives and friends in the name of "serious illness, car accident" and other emergency matters.

Fraud by impersonating a public security organ: Criminals impersonate a public security organ worker to call the victim, and demand that their funds be transferred to the national account to cooperate with the investigation on the grounds that the victim's identity information has been stolen and he is suspected of money laundering and drug trafficking.

Fake identity fraud: pretending to be "Gao Fushuai" or "Bai Fumei", adding friends to defraud feelings and trust, and then defrauding money for various reasons such as financial shortage and family difficulties.

Fake purchasing fraud: pretending to be a regular Wechat business, using discounts, overseas purchasing, etc. as bait, and after the buyer pays, he asks for additional payment on the grounds that "the goods are detained by the customs, so it is necessary to pay additional customs duties".

Refund fraud: pretending to be Taobao customer service, making phone calls or sending short messages, falsely claiming that the goods photographed by the victim are out of stock and need a refund, and luring the buyer to provide information such as bank card number and password to commit fraud.

Cheap shopping fraud: publishing transfer information of used cars and used computers, and the victim defrauds money by paying down payment, transaction tax and handling fees.

fraud of signing for express delivery: pretending to be a courier calls the victim, saying that he has an express delivery to sign for, but he can't see the information clearly, so he needs the victim to provide it, and then delivers the "goods" to the door. After the victim signs for it, he calls to say that he has signed for it and has to pay, otherwise the company will find trouble.

Credit card application fraud: Some people find it difficult to apply for a credit card because of their poor credit records. This kind of scam is aimed at this consumer, saying that it is to provide them with a "credit investigation-free" credit card, and as long as the applicant pays an application fee, it is guaranteed to issue him a credit card. As a result, after paying the application fee, the applicant still can't get the credit card.

publishing false love transfer: posting fictitious posts about finding people, helping people and being trapped on the Internet in the form of "love transfer", causing good netizens to forward them. In fact, the contact number left in the posts is fraudulent.

like fraud: pretending to be a merchant to post "like and win prizes" information, requiring participants to send their personal information such as names and phone numbers to social platforms, and after obtaining enough personal information, they will commit fraud in the form of deposit for winning prizes.

winning information fraud: pretending to be a well-known enterprise, printing exquisite fake winning scratch cards in large quantities in advance, delivering and sending them, and then tricking the victims into sending money to the designated bank account under various excuses such as paying personal income tax.

investment and wealth management fraud: induce users to invest in various wealth management and fund products with high returns, and after absorbing a large amount of users' funds, they will run away with the money, and even the principal will not be collected.

QR code fraud: The victim is required to scan the QR code to join the membership with price reduction and reward as bait, but it is actually accompanied by Trojan virus, which will steal personal privacy information such as the victim's bank account number and password.

Cheating by paying a large sum of money for children: falsely claiming that the victim is cheated by paying a large sum of money for children, and then committing fraud for various reasons such as paying sincerity money and inspection fees.

High-paying recruitment fraud: through mass information, asking the victim to go to a designated place for an interview on the grounds of recruiting certain professionals with a high salary of tens of thousands of yuan per month, and then committing fraud in the name of paying training fees, clothing fees, security deposits, etc.

Fictitious car accident fraud: Ask the victim's relatives or friends to transfer money immediately on the grounds that they are involved in a car accident and need to deal with the traffic accident urgently.

Fictitious kidnapping fraud: if the relatives and friends of the fictional victim are kidnapped, they need to pay the money to the designated account immediately if they want to rescue the hostage, and they can't call the police, otherwise they will kill the ticket.

fictitious operation fraud: on the grounds that the victim's children or parents have sudden illness and need emergency operation, the victim is required to transfer money before treatment.

Fictitious help-seeking fraud: publishing false information such as serious illness and difficulties in life through social media to gain sympathy from netizens, so as to accept donations.

Telephone arrears fraud: pretending to be a staff member of a communication operation enterprise, making a phone call to the victim or directly playing computer voice, and demanding that the arrears funds be transferred to a designated account on the grounds that the phone is in arrears.

Booking fraud: making false online booking company web pages, publishing false information, and luring victims to be fooled by lower fares. Subsequently, the victim was asked to remit money again for reasons such as "unsuccessful booking" and implemented fraud.

ATM notice fraud: blocking the exit card of ATM in advance, and pasting a false service hotline to induce users to contact them after the card is "swallowed" and get the password. After the user leaves, they will take out the bank card from the ATM and steal the cash in the user's card.

credit card spending fraud: on the grounds that personal information may be revealed by bank card consumption, posing as a UnionPay center or public security police to set up a trap and obtain bank account numbers and passwords to commit crimes.

Pseudo-base station fraud: pseudo-base stations are used to send false links to the masses to upgrade online banking and exchange cash for 186 mobile mall. Once the victim clicks, a Trojan horse is implanted on his mobile phone to obtain the bank account number, password and mobile phone number, thus committing crimes.

phishing website fraud: ask the victim to log on to the phishing website of a fake bank on the grounds that the online banking of the bank is upgraded, and then obtain the information of the victim's bank account, online banking password and mobile phone transaction code to commit fraud. Other new illegal frauds

SMS link fraud: send a fraudulent short message with a link in the name of "school newsletter". Once the link is clicked, the mobile phone will be implanted with a Trojan horse program, and there is a risk that the bank card will be stolen.

e-invitation fraud: induce users to click through e-invitation, steal the bank account number, password, address book and other information in the mobile phone, and then steal the user's bank card, or send a group loan fraud message to friends in the user's address book.

financial transaction fraud: in the name of a securities company, after spreading false inside information and trends of individual stocks through the Internet, telephone calls and short messages to gain the trust of the victims, guiding them to buy futures and spot on their own false trading platform, thus defrauding funds.

Fraud of copying mobile phone cards: mass information claims that mobile phone cards can be copied, and mobile phone call information can be monitored. Many people actively contact the suspects for personal needs, and then they are defrauded of money by the other party in the name of buying duplicate cards and prepayments.

extortion fraud by impersonating a triad society: firstly, obtain the information of the victim's identity, occupation, mobile phone number, etc., and call to call himself a triad member. If he is hired, he will be hurt, but the victim can break the money to eliminate the disaster, and then provide the account number to ask the victim to remit money.

Fishing WiFi in public places: Free WiFi for fishing is released in public places. When the victim connects to these free networks, photos, phone numbers and various passwords in the mobile phone are stolen through the transmission of traffic data, and the owner is blackmailed.

Conclusion: Don't believe anything that involves transfer and remittance, filling in personal information and asking for verification code. I Chunqiu's awareness of network security reminds netizens to always improve their awareness of network security and beware of being cheated!