• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    How Can Five Layers Of Fraud Chain Be Cracked?

    2015/11/24 19:48:00 13

    Internet FinanceDeceptionDividends

    In fact, online shopping refund fraud is just the tip of the iceberg, and user property safety has become a major problem that has dragged down the healthy development of the Internet industry.

    According to the data of hunting net platform, fraudulent swindling is the largest number of fraudulent fraudulent practices in all kinds of Internet fraud. Employers fake Taobao shopkeepers, let part-time staff help to clean up the bill, then let part-time employees return to buy virtual cards and other virtual products that can be consumed immediately, but when they get their hands, "employers" immediately recharge and disappear immediately.

    In addition, consumers suffer the most, and the biggest amount of money per person is Internet financial fraud.

    Take overseas financial fraud website as an example, Tencent technology survey found that the number of deceived people reached tens of thousands of people, and the total number of cheated funds was in the scale of 10 billion yuan.

    Behind these frauds, it is not the operation of a person or a team, but the black chain of network financial fraud involving different teams, different regions, strict division of labor, organized and premeditated measures.

    In the evening of November 10th, hundreds of millions of netizens waited in front of the computer to wait for the arrival of 0 "shopping Carnival". At the same time, a group of special network workers had already begun their work in front of the screen: in the Tmall, Jingdong and other electronic business platforms, they spread the nets and waited for the "fish" to get hooked.

    By purchasing the password data of user accounts, these people will log in to the account to grasp the accurate online shopping information of the users, then send SMS messages to users to refund the money with undeliverable, abnormal pactions and other reasons, and connect the phishing website links in the short message. Once the user has written the bank card, the card and the SMS verification code according to the interface prompts, the user's bank card deposit will be stolen.

    According to Tencent technology, Internet financial fraud

    industry chain

    It is mainly divided into five levels: the fraud source, the information trafficker, the fraud executor, the fund pfer person and the errant peddlers.

    It needs to be pointed out that the tasks at the above levels are completed by separate teams, and there is only a buying and selling relationship between the levels, which does not necessarily meet each other. This has also made it difficult for the police to detect cases.

    The lowest risk is the source of fraud at the upstream of the industrial chain; the most profitable one is the information traffickers, who only need to sell the information they sell; the fraud implementers have low success rate and relatively high risk; therefore, they are relatively more profitable; the funds pfer and the runners and the spoils are in the lower reaches of the industrial chain, which are easy to be eyed by the police.

    Hunting network platform chief anti fraud expert Pei Zhiyong told Tencent technology that behind the fraudsters, there may still be a fraud coach team who is good at capturing banks, websites, police duty loopholes and improving fraud in real time.

    They read a lot of latest articles every day to find loopholes. For Internet, financial and other professional platforms, they will read a large number of professional books in a short time to supplement their knowledge.

    Specifically, the first layer of online financial fraud industry chain is the source of fraud, which includes hackers, Trojan horse producers and phishing website developers who steal large amounts of user data.

    In addition, there are personal information collectors on the Internet. The information collected includes telephone card information, bank card information, identity card information and so on.

    The second layer of the industry chain is information traders, personal information wholesalers purchase user data from hackers and offline information collectors, while phishing wholesalers buy Trojan horses and phishing websites.

    The third layer of the industry chain is the fraudulent executor. By buying the information of wholesalers, they have both the user database and the phishing website and Trojan horse, and they begin to do things for the people in the database.

    Senior fraud implementers will make use of the weakness of most users to use the same password on multiple platforms.

    Once the library is successful, once the user's security verification is simple, the fraudulent personnel will directly turn the money away; but for the users with complex security verification, the fraudulent personnel will use the existing account password to start a clever trap to deceive the users.

    and

    Low grade fraud

    Personnel are mainly pretending to be fraudulent by phone, sending short messages by groups, phishing web sites and promoting online channels.

    This is the most common form of fraud at present.

    The fourth layers of the industrial chain are

    Fund pfers

    Once the fraud is successful, the money will enter the bank account that the fraudsters have prepared in advance. Soon, the accountant who has skilled pfer will pfer the funds to the account in 3 minutes. During this period, the third party payment platform may be used, and then it will be pferred to dozens of hundreds of accounts repeatedly.

    In most cases, because of the complicated procedures involved in inquiring the remote bank accounts, the large number of areas involved and the high cost of the police, we have to give up tracking.

    At the same time, in order to improve the safety, some accountants even pfer funds to overseas and turn back smoothly.

    The fifth tier is the errands.

    Because the swindler still needs to get the proceeds of fraud into his own hands. In order not to take risks, fraudsters often hire an unsuspecting running company to help.

    The staff of the leg company are still happy that they can easily get hundreds of dollars in employment fees. They do not know that they are most dangerous to go to the ATM machine to pick up their money or send them to the courier.

    And when the police thought they had caught the "culprit", the real behind the scenes "employer" often fled.


    • Related reading

    It Is Important For Retail Investors To Become Wolves Investing Skills In Order To Win.

    Financial management
    |
    2015/11/23 21:12:00
    15

    Regulatory Storm Almost Made Everyone Cautious.

    Financial management
    |
    2015/11/22 15:55:00
    16

    Investment Strategy: How To Make Investment In The Early Stage Of The Slow Cow Pattern?

    Financial management
    |
    2015/11/21 20:22:00
    51

    Entering The Basket SDR Is Coming, The New RMB Financing Will Come Out.

    Financial management
    |
    2015/11/19 21:42:00
    36

    The National Debt Is Much More "Cold" Than Other Financial Products.

    Financial management
    |
    2015/11/18 21:04:00
    36
    Read the next article

    Hongkong Has The Largest Offshore RMB Pool To Pform Itself Into The Financial "Protagonist".

    With the increasing economic strength of the country, the role of the RMB in international trade is becoming more and more important. Enterprises around the world are making more yuan as the trade settlement currency, and the renminbi has become one of the five major payment currencies in the world.

    主站蜘蛛池模板: 扒开女人内裤边吃奶边摸| 老子影院午夜伦不卡| 欧美变态老妇重口与另类| 国内精品久久人妻无码不卡| 人人爽人人爽人人片a免费| xxxxx做受大片视频| 精品一区二区三区在线视频| 成人a视频片在线观看免费| 成人欧美一区二区三区| 国产一区二区三区播放| 中文在线字幕中文字幕| 精品无码国产污污污免费| 强开小婷嫩苞又嫩又紧视频| 免费观看性生活大片| haodiaocao几万部精彩视频| 狠狠色噜噜狠狠狠狠网站视频| 夜夜爽夜夜叫夜夜高潮漏水| 亚洲精品在线播放| 2021久久精品国产99国产精品| 欧美一级片在线观看| 国产成人精品午夜视频'| 久久午夜宫电影网| 色吧首页dvd| 小明发布永久在线成人免费| 人妻18毛片a级毛片免费看| 97精品伊人久久大香线蕉| 欧美大尺度xxxxx视频| 国产欧美专区在线观看| 久久国产精品久久国产片| 色噜噜狠狠成人网| 女大学生的沙龙室| 亚洲精品乱码久久久久久蜜桃图片 | 好紧好爽太大了h视频| 亚洲视频在线观看视频| 78成人精品电影在线播放日韩精品电影一区亚洲 | 国产精品国产三级国产专不∫| 亚洲av无码久久寂寞少妇| 蝌蚪视频app下载安装无限看丝瓜苏| 成人欧美一区二区三区黑人| 伊人久久大香线蕉精品| 尤物视频在线看|