How Can Five Layers Of Fraud Chain Be Cracked?
In fact, online shopping refund fraud is just the tip of the iceberg, and user property safety has become a major problem that has dragged down the healthy development of the Internet industry.
According to the data of hunting net platform, fraudulent swindling is the largest number of fraudulent fraudulent practices in all kinds of Internet fraud. Employers fake Taobao shopkeepers, let part-time staff help to clean up the bill, then let part-time employees return to buy virtual cards and other virtual products that can be consumed immediately, but when they get their hands, "employers" immediately recharge and disappear immediately.
In addition, consumers suffer the most, and the biggest amount of money per person is Internet financial fraud.
Take overseas financial fraud website as an example, Tencent technology survey found that the number of deceived people reached tens of thousands of people, and the total number of cheated funds was in the scale of 10 billion yuan.
Behind these frauds, it is not the operation of a person or a team, but the black chain of network financial fraud involving different teams, different regions, strict division of labor, organized and premeditated measures.
In the evening of November 10th, hundreds of millions of netizens waited in front of the computer to wait for the arrival of 0 "shopping Carnival". At the same time, a group of special network workers had already begun their work in front of the screen: in the Tmall, Jingdong and other electronic business platforms, they spread the nets and waited for the "fish" to get hooked.
By purchasing the password data of user accounts, these people will log in to the account to grasp the accurate online shopping information of the users, then send SMS messages to users to refund the money with undeliverable, abnormal pactions and other reasons, and connect the phishing website links in the short message. Once the user has written the bank card, the card and the SMS verification code according to the interface prompts, the user's bank card deposit will be stolen.
According to Tencent technology, Internet financial fraud
industry chain
It is mainly divided into five levels: the fraud source, the information trafficker, the fraud executor, the fund pfer person and the errant peddlers.
It needs to be pointed out that the tasks at the above levels are completed by separate teams, and there is only a buying and selling relationship between the levels, which does not necessarily meet each other. This has also made it difficult for the police to detect cases.
The lowest risk is the source of fraud at the upstream of the industrial chain; the most profitable one is the information traffickers, who only need to sell the information they sell; the fraud implementers have low success rate and relatively high risk; therefore, they are relatively more profitable; the funds pfer and the runners and the spoils are in the lower reaches of the industrial chain, which are easy to be eyed by the police.
Hunting network platform chief anti fraud expert Pei Zhiyong told Tencent technology that behind the fraudsters, there may still be a fraud coach team who is good at capturing banks, websites, police duty loopholes and improving fraud in real time.
They read a lot of latest articles every day to find loopholes. For Internet, financial and other professional platforms, they will read a large number of professional books in a short time to supplement their knowledge.
Specifically, the first layer of online financial fraud industry chain is the source of fraud, which includes hackers, Trojan horse producers and phishing website developers who steal large amounts of user data.
In addition, there are personal information collectors on the Internet. The information collected includes telephone card information, bank card information, identity card information and so on.
The second layer of the industry chain is information traders, personal information wholesalers purchase user data from hackers and offline information collectors, while phishing wholesalers buy Trojan horses and phishing websites.
The third layer of the industry chain is the fraudulent executor. By buying the information of wholesalers, they have both the user database and the phishing website and Trojan horse, and they begin to do things for the people in the database.
Senior fraud implementers will make use of the weakness of most users to use the same password on multiple platforms.
Once the library is successful, once the user's security verification is simple, the fraudulent personnel will directly turn the money away; but for the users with complex security verification, the fraudulent personnel will use the existing account password to start a clever trap to deceive the users.
and
Low grade fraud
Personnel are mainly pretending to be fraudulent by phone, sending short messages by groups, phishing web sites and promoting online channels.
This is the most common form of fraud at present.
The fourth layers of the industrial chain are
Fund pfers
。
Once the fraud is successful, the money will enter the bank account that the fraudsters have prepared in advance. Soon, the accountant who has skilled pfer will pfer the funds to the account in 3 minutes. During this period, the third party payment platform may be used, and then it will be pferred to dozens of hundreds of accounts repeatedly.
In most cases, because of the complicated procedures involved in inquiring the remote bank accounts, the large number of areas involved and the high cost of the police, we have to give up tracking.
At the same time, in order to improve the safety, some accountants even pfer funds to overseas and turn back smoothly.
The fifth tier is the errands.
Because the swindler still needs to get the proceeds of fraud into his own hands. In order not to take risks, fraudsters often hire an unsuspecting running company to help.
The staff of the leg company are still happy that they can easily get hundreds of dollars in employment fees. They do not know that they are most dangerous to go to the ATM machine to pick up their money or send them to the courier.
And when the police thought they had caught the "culprit", the real behind the scenes "employer" often fled.
- Related reading

It Is Important For Retail Investors To Become Wolves Investing Skills In Order To Win.
|
Investment Strategy: How To Make Investment In The Early Stage Of The Slow Cow Pattern?
|- Trend of Japan and Korea | The Warm Recommendation Of Korean Style Is Very Charming In The Early Winter
- Global Perspective | The Underwear Industry Is Becoming A Hot Spot In The US.
- Mall Express | "Bachelor'S Day" Tmall Requires Merchants To Have The Lowest Price Within More Than 50 Days.
- Popular color | Bright Colors And Beautiful Clothes Are Very Eye-Catching In Early Winter.
- Leadership Forum | Zhou Shaoxiong And Seven Wolves Let Brands Inspire Life
- Street shooting popular | 潮流達(dá)人秀街拍 打破沉悶初冬季
- Company news | Victoria Beckham Will Set Up A Showroom In New York.
- Company news | Puma'S Three Quarter Sales Fell 8.9%
- Market quotation | High End Market Counterfeit Goods Overflow Luxury Giant China Cake
- Fashion item | Warm Clothing Is Very Warm And Comfortable At The Beginning Of Winter.
- Most Investors Fear The Registration System.
- The Downward Trend Of Export Growth Is Hard To Reverse In The Short Term.
- Gem V Shape Reversal Strong Upside IPO Is Paper Tiger
- Down Jacket Can Actually Be Very Thin.
- Woolen Overcoats Are Excellent In Shape And Style.
- How To Wear A Long Suit And A Small Suit To Cover The Swimming Circle?
- Star Coats And Skirts Wear Delicate Women In Winter.
- The Fifty-Second Golden Horse Award Red Carpet Lin Chiling Hsu Chi Looks Like The US Karena Lam.
- Dynamic Foot Pressure Tester -- Key Equipment For Shoe Industry'S Technological Progress
- Tod 'S Group'S Acquisition Of Roger Vivier Has Strong Brand Expansion Power.