Victims often ask, "I was cheated of XX money, how can I recover it?" "Can the person who cheated me catch it?" "Why can't I find someone by checking the Internet?" "With bank card, phone number, website information, why can't the person hiding behind me catch it?"
scammers have all caught it, why can't the money being cheated be recovered?
layer 1, geographical disguise.
scammers are proficient in anti-reconnaissance skills, make good use of various disguises, and hide all traces of their identity that may be exposed. The team is basically staying abroad. According to information tracked by police in many regions, most fraud gangs are located in Southeast Asia, which has become an "fraud base" in Asia.
layer 2, identity disguise.
The large number of missing and stolen second-generation resident ID card was openly sold on the Internet black market. "The black market provides a steady stream of identity information resources for fraudsters. In the eyes of ordinary people, real-name system is identity recognition, but in the eyes of fraudsters, real-name system has become one of the best means to avoid risks. Because the person who belongs to these identity information has nothing to do with the fraudsters at all.
Layer 3, technical disguise.
In fraud cases, it is the most difficult What is breaking through is actually technical disguise. The most commonly used SMS fraud is the fake base station mass transmitter. You only need a laptop, a software, and a transmitter to send edited fraudulent text messages to surrounding mobile phone users. Want to catch people by relying on mobile phone location? It is more difficult.
Floating IP and number change platform are also two commonly used technical disguise methods for fraudsters. Floating IP is to use network springboards to constantly cover up real IP and use false I P commits online fraud. The number change platform covers its real number and changes the phone to whatever you want, even if it is "110". If you are lucky, you will find out that the real identity behind it, and after the police prepare a series of documents such as the air ticket passport, they will fly to the location and check it. It turns out that behind it is a private computer controlled by hackers, that is, "broken chicken".
Professional money laundering fraud group
Professional money laundering group mainly serves various fraud gangs. They use the shortest time to withdraw the money they have cheated from other fraud peers "work hard" and return it through legal channels. Turn the strings of numbers on the bank card into real money that can be put in their pockets. People at all levels of the group work diligently, work together, and respond at any time, forming an invisible but powerful spider web, as long as they have funds, they have formed a When you touch the Internet, you will immediately disappear without a trace under the influence of this network.
Some of the work in the fraud money laundering group are extremely fine and are generally divided into five levels. The first layer is called "vocalist" , is specifically responsible for making phone calls, sending messages, mailing, etc. ; second layer It is called "Contact Number Man" , and is responsible for connecting the "vocalist" and the next layer; the third layer of is called "Flashing Man" , and , as the name implies, it is responsible for flashing the POS machine, and brushing the money to the online settlement center to ; the fourth layer of is "Card" , is responsible for providing various bank cards and transferring them by themselves; the fifth layer of is "withdrawal" , which is specifically responsible for withdrawing money. You can get it yourself or you can pay to ask other people to get it.
1 level of discipline is strict. The responsibilities of each level are clear and disciplined. There is no connection between cross-levels and cross-levels. Each level can only connect with the previous level, and it must not be able to contact the upper and upper levels. In this way, even if the "withdrawal" is caught, it is generally difficult to ask who and where the person at the upper level is, and it is even more difficult to catch the upper level. The highest level is .
is risk-free. . .
.. For example, if the "vocalist" cheated 200,000 yuan, it can be called "receiver" A to process 100,000 yuan, and "receiver" B to process 100,000 yuan; "receiver" A can also be called "receiver" A to process 50,000 yuan, and "receiver" B to process 50,000 yuan; "receiver" A can also be called "receiver" A to process 25,000 yuan, and "receiver" B to process 25,000 yuan; "receiver" A can also be called "withdrawal" A to withdraw 10,000 yuan, and "withdrawal" B to withdraw 15,000 yuan.
The complex "descendants account"
"descendants account" is a common explanation that after receiving the fraud, the fraudster will split the fraud, make N+1 decentralized transfers through the bank account and the third-party payment platform, and then withdraw cash through the "driver". Once the money reaches this point, it will be difficult to prove the source of the fund and freeze the account.
If the fraudster wants to be safer, he will find a "water room" to deal with it. Many people may hear the word "water house" for the first time. As its literal meaning is a new type of criminal den specially used to clean up stolen money. Generally, "water houses" serve multiple fraud gangs, which are whitewashed quickly, and most of the final funds will flow to overseas accounts, making it difficult to recover.
Hard-tracking digital currency .
When a fraudster obtains fraud, the first thing he needs to do is to safely whitewash the stolen money he received. By purchasing digital currencies such as Bitcoin, he can quickly and safely transform the money and perfectly avoid legal sanctions.
Bitcoin uses a decentralized payment system, which has departed from the traditional financial clearing system. It uses special means to jump the same amount of Bitcoin owned by the fraudster between multiple wallet addresses, thereby clearing out its original cryptocurrency information. Want to track down the final address? Yes, go to the bottomless dark web to find it.
Bank card, phone number, and website information are all fake. The degree of wits and courage of the police officers in charge of the case is far beyond your imagination. Therefore, the best way to protect their "purse bag" is not to wait for our police officers to solve the case, but to improve their awareness of fraud prevention.
The public security department has released the most complete 60 typical online fraud methods . These are cases of hard-earned money. Please check it quickly, especially to send it to your parents, who are the main groups of people who have been deceived.
1. Imitation of identity fraud
1. Imitation of leadership fraud: criminals call the head of grassroots units for impersonating leaders and other identities, and ask the fraudulent units to pay the ordering payment, handling fees, etc. to the designated bank account on the grounds of selling books, commemorative coins, etc.
2. Scam as a relative and friend: Use a Trojan program to steal the password of the other party’s online communication tool, intercept the other party’s chat video information, and impersonate the owner of the communication account to commit fraud to his relatives and friends in the name of “serious illness, car accident” and other urgent matters
3. Scam as the boss of the company: Criminals enter the internal communication group of the company to understand the information exchange between the boss and employees, and through a series of disguises, then impersonate the boss of the company to send transfer and remittance instructions to employees.
4, subsidies, relief funds, scholarship fraud: impersonate education, civil affairs, Disabled Persons' Federation and other staff, call and send text messages to disabled people, students, and parents, lying that they can receive subsidies, relief funds, and scholarships, and ask them to provide a bank card number and instruct them to transfer money on the ATM.
5. Scam for impersonating public security, procuratorial and judicial personnel: Criminals impersonate public security, procuratorial and judicial personnel to call the victim, and on the grounds that the victim's identity information was stolen, suspected of money laundering, drug trafficking and other crimes, they asked to transfer his funds to the state account to cooperate with the investigation.
6. Forged identity fraud: Criminals disguised themselves as "high, rich and handsome" or "white, rich and beautiful", and added them as friends to deceive their feelings and trust, and then defrauded them of money on various reasons such as tight funds and difficulties in their family.
7. Medical insurance and social security fraud: The criminal pretended to be a medical insurance and social security staff, lied that there was an abnormality in the victim's account, and then pretended to be a judicial staff member to lure the victim to remit money to the so-called safe account on the grounds of fair investigation and easy verification, and tricked the victim into committing fraud.
8. "Guess Who I am" scam: the criminal calls the victim and asks him to "Guess Who I am", and then impersonates an acquaintance and borrows money from the victim. Some victims throw the money into the bank card provided by the criminal without careful verification.
2. Shopping fraud
9. Fake purchasing agent fraud: Criminals pretend to be regular micro-businesses, using discounts, discounts, overseas purchasing agents as bait. After the buyer pays, they ask for additional payments on the grounds that "the goods are detained by the customs and must be paid additional tariffs" and other reasons.
10. Refund fraud: The criminal pretends to be customer service of Taobao and other companies, makes a phone call or sends text messages, and lies that the goods photographed by the victim are out of stock and need a refund, which induces the purchaser to provide bank card number, password and other information to commit the fraud.
11. Online shopping fraud: The criminals open a fake shopping website or online store and after the victim places an order, they say that the system is incorrect and needs to be reactivated. Then, false activation URL is sent through QQ, and the victim is asked to fill in his personal information and commit fraud.
12. Low-price shopping fraud: Criminals publish transfer information such as used cars, second-hand computers, customs confiscated items, etc., and the victim contacted them and defrauded money by paying deposits, transaction tax fees, etc.
13. Relieve installment payment fraud: The criminal pretended to be a staff member of a shopping website, claiming that "due to a banking system error", he tricked the victim into going to the ATM to complete the procedures for excluding installments and implement fund transfer.
14. Collection fraud: Criminals impersonate collection associations and print invitation letters to mail them to various places, saying that they will hold an auction and leave contact information. Once the victim contacts him, he will ask the victim to transfer the money to the designated account in the name of prepaying the assessment fee, etc.
15. Express signing fraud: impersonating a courier to call the victim, saying that he needs to sign for the express delivery but cannot see the information clearly, so he needs to provide it to the victim, and then deliver the "goal" to the door. After the victim signed the receipt, he called and said that he had signed the receipt and had to pay, otherwise the debt collection company would cause trouble.
3. Activity fraud
16. Publish false love transmission: Criminals publish fictional search and helping the poor on the Internet in the form of "love transmission", causing kind netizens to forward it. In fact, the contact number left in the post is a fraud phone number.
17. Like fraud: Criminals impersonate merchants to publish "like rewards" information, requiring participants to send their personal information such as names and phone numbers to social platforms, and after obtaining enough personal information, they will commit fraud in the form of paying a deposit to win the prize.
4. Induce fraud
18. Victory fraud: impersonate a well-known company, print a large number of exquisite fake winning scratch cards in advance, deliver and send them, and then use various excuses such as paying personal income tax to lure victims to remit money to the designated bank account.
19. Entertainment program winning fraud: Criminals sent a text message to the victim's mobile phone group in the name of the popular program team, saying that they have been selected as lucky viewers and will receive huge prizes. They will then commit fraud under various excuses such as paying deposit or personal income tax.
20. Points redemption fraud: The criminal made a phone call and lied that the victim's mobile phone points could be redeemed, inducing the victim to click on the phishing link. If the victim enters the bank card number, password and other information according to the provided URL, the funds in the bank account will be transferred.
21. QR code fraud: using price reduction and rewards as bait, the victim is required to scan the QR code to join the membership, but it actually comes with a Trojan virus. Once scanned and installed, Trojan will steal the victim's bank account, password and other personal privacy information.
22. High-paid child-seeking fraud: The criminal lied that he was willing to pay a large-paid child, lured the victim into a trap, and then committed the fraud on various reasons such as paying sincerity funds and inspection fees.
23. High-salary recruitment fraud: Criminals send mass messages and recruit certain professionals with a high salary of tens of thousands of yuan per month as a guise, requiring the victim to interview at a designated location, and then commit fraud under the name of paying training fees, clothing fees, deposits, etc.
24. Email winning fraud: The criminal sends the winning email through the Internet. Once the victim contacts the criminal to redeem the prize, the criminal will ask the victim to remit money on various reasons such as paying personal income tax and notarization fees to achieve the purpose of fraud.
55. Fictional and dangerous fraud
25. Fictional car accident fraud: The criminal asked the other party to transfer the money immediately on the grounds that the victim's relative or friend had encountered a car accident and needed to urgently deal with the traffic accident.
26. Fictional kidnapping fraud: The criminal is kidnapped by the victim’s relatives and friends. If he wants to rescue the hostages, he must immediately pay the money to the designated account and cannot call the police, otherwise the ticket will be torn.
27. Fictional surgery fraud: The criminal asked the victim to transfer money before treatment can be done on the grounds that the victim's children or parents had an emergency surgery.
28. Fictional crisis and dilemma seeking help: criminals post false situations such as serious illness and difficulties in life through social media, gaining the sympathy of netizens and accepting donations.
29. Fictional package hiding drugs: The criminal asked the victim to transfer the money to the national security account for a fair investigation on the grounds that drugs were found in the victim's package, so as to commit the fraud.
30. Fabricating obscene pictures and extortion fraud: Criminals collect photos of public officials, use computers to synthesize obscene pictures, and attach the payment account to mail them to the victims for threats and intimidation, and extortion of money.
31. Fictional affair and miscarriage surgery: The criminal pretends to be his son and sends text messages to his parents, making full use of the characteristics of the elderly who feel sorry for their son and tempts the victims to transfer money.
6. Daily consumption fraud
32. SMS fraud impersonating the landlord: Criminals impersonating the landlord to send text messages, saying that the landlord’s bank card has been changed, and asked to deposit the rent into other designated accounts.
33. Telephone arrears fraud: The criminal pretends to be a staff member of a communications operation company, calls the victim or directly plays computer voice, and asks to transfer the arrears to the designated account on the grounds that his phone arrears are due to his lack of fees.
34. TV arrears fraud: Criminals pretend to be a staff member to dial the phone number, saying that cable TVs opened in other places in the name of the victim were arrears, and the victim asked the victim to make up for the arrears to the designated account.
35. Shopping tax refund fraud: After the criminal obtains information about the victim's purchase of real estate, cars, etc. in advance, he tricks the victim into implementing the transfer operation on the ATM machine on the grounds that tax policy adjustments can be used for tax refunds.
36. Air ticket re-sign fraud: Criminals pretend to be airline customer service and tricked ticket purchasers into remittance operations multiple times on the grounds of "flight cancellation, ticket refund, and ticket re-signment services" to trick ticket buyers into remittance operations and commit serial fraud.
37. Ticket booking fraud: Criminals create fake online ticket booking company web pages, publish false information, and lure victims into being deceived with a lower fare. Subsequently, the victim was asked to remit money again on the grounds of "unsuccessful ticket booking" and commit fraud.
38. ATM machine notice fraud: Criminals block the ATM machine exit checkpoint in advance and paste false service hotlines to induce users to contact them after the card is "swallowed" and obtain passwords. After the user leaves, he goes to the ATM machine to withdraw the bank card and steal cash from the user's card.
39. Card swipe consumption fraud: Criminals impersonate UnionPay center or public security police to set up a trap on the grounds that bank card consumption may leak personal information, and impose a condom on the grounds that it is possible for bank card consumption to commit a crime, and embezzle bank account and password.
40. Induce remittance fraud: The criminal directly requests the other party to transfer deposits to a bank account by sending mass text messages. Since the victim is preparing to remit money, after receiving such remittance fraud information, the money is often transferred to the scam account without verification.
7. Phishing, Trojan virus type fraud
41. Pseudo-base station fraud: Criminals use pseudo-base station to send false links to the general public to upgrade online banking and exchange cash in 10086 mobile malls. Once the victim clicks, they implant Trojans that obtain bank account, password and mobile phone number on their mobile phone, thereby committing the crime.
42. Phishing website fraud: The criminals require the victim to log in to the fake bank's phishing website on the grounds of upgrading the bank's online banking, and then obtain the victim's bank account, online banking password and mobile phone transaction code to commit the fraud.
8. Other new types of illegal fraud
43, School Communication SMS link fraud: Criminals send fraudulent text messages with links in the name of "School Communication!". Once they click on the link to enter, their mobile phone will be implanted into a Trojan program, and there is a risk of bank card being stolen.
44. Traffic handling violation text messages: Criminals use fake base stations to send fake violation reminder text messages. Such text messages contain Trojan links. After clicking, the victim can send text messages in groups and lose phone bills. At worst, they can steal bank cards, Alipay and other account information in their mobile phones, and then snatch bank cards.
45. Marriage electronic invitation fraud: Criminals can induce users to click and download them through electronic invitations, and then steal bank cards. bank account, password, address book and other information, and then steal the user's bank card, or send group loan fraud text messages to friends in the user's address book.
46. Highly professional and technical. Promote mobile APP through online social software, and after downloading and registering, there are "customer service" and "experts" to guide the operation.
47. Financial transaction fraud: Criminals use securities companies to name the Internet, telephone text messages, etc. , stocks, insider information and trends, after obtaining the trust of the victim, he guided him to purchase futures and spot on the false trading platform he built, thereby defrauding the victim's funds.
48. Processing credit card fraud: publish high-value overdraft credit card advertisements in the media, and after contacting him, the victim requires the victim to transfer money continuously by paying handling fees, agency fees, etc.
49. Loan fraud: Criminals send messages in mass, saying that they can provide loans to those with shortages of funds, with low monthly interest rates and no guarantee . Once the victim believes it true, the other party commits fraud in the name of prepaid interest, deposit, etc.
50. Copy mobile card fraud: Criminals send messages in mass, saying that they can copy mobile card and monitor mobile phone call information. Many people actively contact the suspect due to personal needs, and then the other party purchases the copy card. Defrauding money in the name of advance payments.
51. Fictional porn service fraud: The criminal left a phone number on the Internet to provide porn service. After the victim contacted him, he said that he had to pay first before he could provide services. The victim transferred the money to a designated account and found that he was cheated.
52. Fraud on providing test questions: The criminal called the candidates who were about to take the exam, saying that he could provide test questions or answers. Many candidates were anxious After seeking success, transfer the down payment of the benefits fee to the designated account in advance, and then find that he was cheated.
53. Account stolen and reputation fraud: After the criminal steals the merchant’s social platform account, he publishes a push message that “recruits part-time jobs online to help Taobao sellers to make reputation, and earn commissions”. The victim shops many times to make reputation according to the other party’s request, and then finds that he was deceived.
54. Extortion fraud in posing as a gangster: commits The criminal first obtains the victim's identity, occupation, mobile phone number and other information, and calls to claim to be a gangster. If someone is hired, he will harm him. However, the victim can lose money and eliminate disasters, and then provide an account to ask the victim to remit money.
55. Wifi in public places: Free WiFi for phishing in public places. After the victim connects to these free networks, he steals photos, phone numbers, and various passwords in his mobile phone through the transmission of traffic data, and blackmails the owner.
56. Picking up a bank card with a password: The criminal deliberately discarded the bank card with a password and marked the "phone number of the account opening bank", using people's mentality of taking advantage of the advantage to induce the person who picked up the card to make a call to "activate" the card and save money to the scammer's account.
57. There are abnormal changes in funds in the account: the victim's online banking login account and password are stolen, creating the illusion of funds flowing out on the bank card. Then fake customer service asked the victim to provide the verification code received by his mobile phone to further defraud.
58. Transfer money first, withdraw cash, and then withdraw: Criminals use the "time difference" between transfer and arrival time in the new bank transfer regulations to set up traps. The fraudulent routine of transferring money first and then giving cash is adopted. After defrauding the victim's cash, the transfer will be cancelled.
59. Replace the mobile phone card: First, bomb the mobile phone with hundreds of spam text messages and harassing phone calls to cover up the card replenishment service reminder text messages sent by 10086 customer service to the mobile phone number; then, take the temporary ID card with the victim information and go to the business hall to re-issue the mobile phone card on site, causing the owner's own mobile phone card to passively invalidate, and receive the SMS verification code to steal the money from the bank card bound to the mobile phone APP.
60. Please save money after changing the number: After the criminal obtains the owner's address book information through illegal channels, he impersonates the owner to send a text message to the contact person on his mobile phone, claiming that he has changed the number, and then fraudulently employed by the contact person on his mobile phone.
Last reminder: Once is cheated, as long as you wake up, call the police (110, 96110) and stop paying the policeman by stopping the payment, the funds being cheated will be stopped in the bank card or account. It is not impossible to stop payment before the scammer withdraws the money.
million times, never carefully read it.
reported the case urgently after fraud, urging the case to solve it every day.
The scammer is abroad, and the police are in a dilemma.
1 The key is to solve the case, and prevention is the key.
1 The source is blocked, where will you be deceived?
information forwarded more and everyone should promote it.