Domestic telecommunications network fraud continues to increase
One of the many claims made by victims of fraud against the public security authorities
It's just..
"please help me catch the man who lied to me!"
But are you sure it was someone

On 6 august, the telecommunication network fraud governance study (first half of 2019), published by the guardians plan of telecommunications, revealed the general chain of fraud and analysed the links。

A large number of server controls are obtained by hacking down weak passwords on servers with low security on the internet, database injections, and access to webshells, commonly known as “chicks”. Most of the owners of these “shell chickens” do not know that the servers have been controlled and used for fraud。

Seo (search engineering optimization): optimizing search engine. The black hats seos buy “shell chickens” from hackers and begin to falsify their web pages, commonly known as “fishing websites”. Using the ranking rules of the search engine, these sites have increased the weight of the website, including by adding keywords, embedding the content that fraud syndicates need to be connected to the web in pages that have already increased the weight of the search, making them ahead of the search, and significantly increasing the chances of being searched and hits。

They're the ones who work behind the scenes and they're the ones who set up the whole chain. Any development of a fraud script requires mastery in psychology, linguistics, sociology... And integration of its “perfect”. In the course of fraud, improvements and upgrades have been made on the basis of social and political news. So, if fraud succeeds, the play is in half。

Liars working on the front line, people who talk directly to victims. The unit gave the number of the crime scene to the black hat seo, which, after technical promotion, impersonated the client and performed strictly in accordance with the play. Many of the victims thought they had been deceived by the “a liar”。

Helped the telephone teams to avoid detection by the public security authorities and made multilayered jumps using telecommunications gateways or virtual telephone equipment. The victims do not know which corner of the planet they speak to。

It operates on a corporate basis and uses inducements to obtain personal information about citizens. These personal information are then used to obtain accounts and passwords for sale in bulk by technical means. Many older persons, in order to obtain a small gift, fill out “questionnaires” randomly in the street, or fill out personal details online to obtain a “small red bag”, may flow into the hands of the company。

It is responsible for the beautification of the two-dimensional code for the collection of packagings to bring their senses closer to the official real code, which is then made available to the team, which transfers the funds involved as soon as the team has managed to obtain the stolen money, commonly referred to as the “face of heaven” (the large amount of money in a single account, which is split into small amounts into multiple accounts). When requesting the police to recover the money they had been deceived, the victim could not imagine how fast the money-laundering transfer would be, in a matter of seconds, transferred out of the first account and in 10 minutes it would become a stack of cash。

The identity cards of other persons are purchased from the black market using illegal methods, and persons of similar appearances are then identified for opening accounts using the identity of others at the relevant business network. Alternatively, the “four sets” (identity cards, mobile cards, bank cards, good shields) are purchased directly at high prices in large rural areas and are then sold to fraud syndicates at several times the purchase price. Many of the ignorant people who took the money to sell their identity cards with pleasure became unwittingly accomplices to liars。

Also known as the “car driver”, is the end of the chain of fraud. They do not care what happened in front of them, but they know that they hold a large number of other people's bank cards and that it is their duty to be on standby for instructions to use these cards to cash money on the clerk's machine and to deposit it in a designated account or to hand it over directly after deduction of the corresponding points of “legging fees”. This process of converting money from numbers to banknotes and from numbers to figures has made it difficult for the public security organs to investigate cases, over the internet。
Read the chain of fraud re-created by end fraud:

Well, all the above-mentioned professional content, you don't need to read it, you don't need to remember. We have only one sentence to say。
You're not dealing with a fraud, but with a huge, professional fraud empire. So, don't trust yourself to avoid it, don't give any chance to liars..
Authorises the reproduction of unifraud2




