"Because of a text message, overnight, my Alipay and all the bank card information were broken, and all the bank card funds were transferred. It was a kind of despair of nothing." This long article with more than 10,000 words was distributed with a series of screenshots of evidence, describing the entire process of the parties' encounter. The articles continue to ferment on Weibo and WeChat platforms, with more than 7.8 million views and forwarding, and comments and continuous comments. Xiao Xu, the person involved in this incident, is a college graduate who has been working for a short time. All the savings that "diao" earned in Beijing were gone, and he still felt scared.
A text message, "breaks up all over the place" On the subway during the evening rush hour in Beijing, Xiao Xu received several text messages from the official number of China Mobile, showing that he subscribed to the mobile phone registration service and deducted the fees in real time, resulting in insufficient phone bill balance.
Xiao Xu said: I didn’t subscribe at all. Then, Xiao Xu received another text message.
When Xiao Xu was thinking about what the verification code was, he received another text message from China Mobile Customer Service 10086, with the verification code number inside.
According to conventional thinking, Xiao Xu sent the "cancel + verification code" over. Xiao Xu was surprised to find that his mobile phone was completely useless.
Then, with a wireless network connection, Xiao Xu recharged the phone for 150 yuan, but it still showed that there was no service. This is the beginning of trouble.
Xiao Xu's mobile phone received Alipay's transfer prompts successively under the wireless network connection. This means that someone operates his Alipay account on another terminal.
Since the mobile phone cannot be used, Xiao Xu can only unbind Alipay and three bank cards by operating the client, and freeze the account through the call to Alipay customer service through relatives and friends. When his Alipay report was successfully reported, his Alipay account was out of money.
At the same time, the other party also operated bank transfers across banks. Finally, the balance in every bank card is zero.
What made Xiao Xu even more frightened was that the next day he found that his two bank cards were bound to another payment platform - Baidu Wallet. Add to another bank card that Xiao Xu originally bound to Baidu Wallet. All the money in his three cards was transferred to two unfamiliar accounts. This means that even his bank account was broken into .
Don’t have a little bit of precaution and you have to watch your money be transferred away. You can feel the victim’s heart in drops of blood
Be sure to tell your relatives and friends this information
Because, we don’t want to clear the wealth instantly, we must also be clear about these precautions!
1---Static password setting must be complicated
password setting is a little more complicated, making it less easy for attackers. Attackers generally like to find users who are easy to crack. 2---Cleaning for "interference information" and don't panic.
. Every person may have various interfering information on their mobile phones. Everyone should carefully identify mobile phone text messages with various "operators", "banks" and other identities, and respond calmly. 3---The mobile phone is bizarrely "paralyzed" and urgently "reported loss". First,
If the phone is not the mobile phone itself or the signal is malfunctioning, you must report the loss of your mobile phone card immediately and freeze the third-party payment and bank accounts in time to avoid attackers from stealing the account by impersonating the owner when the user is in an "information island". 4---SMS verification code cannot be told anyone
operators will only tell you one-way how much the verification code is, and will not ask you to send the verification code to it again. Anyone who asks you for verification code is a scammer.
New mobile phone fraud appears! A man in Shenzhen woke up and was stolen and cheated more than 50,000 yuan! On February 3, 2017, Mr. He, a man from Shenzhen, woke up and found that his mobile phone was locked and his JD account was stolen by a stranger. Then Mr. He discovered that his mobile phone had been taken over by a strange number.
SMS from the operator shows that this is a business of adding a sub-number, and Mr. He's mobile phone number was added as a sub-number by criminals. When the sub-digit mobile phone is turned off, all text messages will be received by the main account. The criminals took advantage of this period to receive Mr. He's SMS verification code . used white strips to consume and apply for loans in his JD account, and robbed more than 50,000 yuan overnight.
accidentally responds to the message and is bound to a sub-number
According to reports, the one-card multi-number service provided by the operator, on the basis of not changing the mobile phone or SIM card, users can add up to 3 real mobile phones as sub-numbers. As long as the main number is edited, the text message "KT mobile number" is sent to the operator, the mobile number will receive a confirmation text message from the operator, and the reply Y will become the secondary number. When the secondary number is turned off, the phone number and text message will be taken over by the main number.
According to the investigation, the main number used by criminals has been reported by multiple users. The mobile phone number sent text messages to different numbers to bind the sub-number to fish in the form of "showing a wide net". If someone accidentally reply to Y, it will be hooked and become a sub-number.
Serial Trap Trap Trap Trap More than 50,000 yuan
Experts analyzed that in the case of Mr. He being stolen, the entire criminal process of criminals mainly adopted the following steps to loot Mr. He’s JD account and bank card.
1----Step 1: Purchase personal information online
Usually, criminals will first purchase names, bank card numbers, ID numbers and reserved mobile phone numbers leaked by some institutions and websites online. 2---Second Step: After obtains the information, start fishing
By launching a business application to bind a sub-number to users who have already mastered bank card information, we can cast a wide net to find the target of the crime. Although Mr. He does not remember receiving and replying to similar text messages, if the Trojan horse in Mr. He's mobile phone is controlled, the criminals can already intercept his SMS verification code at will, and it seems that there is no need to bind a secondary card to do so. On the evening of February 2 before the incident, Mr. He had just returned to Shenzhen from his hometown Hunan. Because he had been driving for a day, he could not rule out that he was careless in replying to the text message because of fatigue.
Since the main number can only take over SMS if the secondary number is turned off, criminals generally use two methods at this time. One is to use SMS bombing to force the target to turn off the phone, and the other is to use mobile cloud service to remotely operate the phone. Criminals generally search for common passwords of attack targets through databases leaked on each website, and then try to log in to the mobile cloud service. Smartphone cloud services generally have the function of "destroying information" to deal with lost mobile phones. Through this command, Mr. He's mobile phone can be forced to shut down.
According to Mr. He's subsequent verification, the criminals issued a "destroy information" order every 5 or 6 minutes between 0:47 am and 1:14 am on February 3. During this period, Mr. He's mobile text messages will be taken over by the criminal's main account. 3---The third step: uses the SMS verification code to "raid"
Finally, using the SMS verification code received by the main account, the criminals crazily ransacked Mr. He's JD account. In addition to spending about 1,000 yuan on Baitiao, he also borrowed 52,000 yuan from JD Financial Gold Bar account. After transferring to a Chinese bank card, he also implemented transfers and cardless withdrawals.
It is understood that Mr. He is currently taking effective ways to recover the losses. Experts remind the general public that after receiving various SMS notifications from , you must see the content of the SMS clearly and do not reply at will.
The most complete mobile payment security guide is related to your property security
After receiving a questionable text message , be sure to call the customer service as soon as possible Don’t operate according to the text message! !