How to prevent your mobile phone card from being stolen?

How to prevent your mobile phone card from being stolen?

I heard that the scammer has come up with a new trick. Even though your ID card and mobile phone are on you, he can still steal the money in your bank card. What's going on?

Recently, CCTV exposed a new type of fraud: re-issuing the card and intercepting the code. The police said that by using the method of re-issuing the card and intercepting the code, the criminals not only took away the victim's bank card deposits, but also pretended to be the victim to apply for small loans from the bank, causing huge losses to the victim.

What is card replacement and code interception?

The so-called card replacement and code interception means that criminals use forged ID cards to go to the telecommunications business hall to reissue the mobile phone card bound to the bank card. In this way, the owner's mobile phone card will be scrapped and shut down.

The criminals then use the mobile phone cards to reset the online banking transaction password. When they transfer funds from the victim's bank card, the criminals' mobile phones can intercept the dynamic verification code text messages sent by the bank and successfully steal the funds. The main method of stealing is through third-party payment platforms or online banking transfers.

In April this year, Mr. Zhou from Jiangsu had his mobile phone inexplicably shut down, even though his bank card and ID card were not stolen and his password was not known to anyone else. After getting a new SIM card, he received a text message from the bank saying that he had applied for two small loans totaling 80,000 yuan in his account, and the loans had been transferred away.

The police investigation found that the perpetrator used a forged ID card with all the information belonging to Mr. Zhou except the photo to apply for a new mobile phone card at the business hall. He then intercepted the dynamic verification code to operate the online banking, and then applied for a small loan with a short arrival time from the bank and transferred the money quickly.

It is worth noting that the perpetrators are very particular about the timing of replacing the card, usually around four o'clock in the afternoon, which is close to the end of the working day. Even if the victim finds something wrong with the mobile phone card, it is difficult to replace the card in time. On the other hand, it is enough for the perpetrators to complete the loan application, transfer and other procedures before the bank gets off work.

How to prevent card replacement and code interception?

New fraud methods emerge in an endless stream, making it difficult to cope with them. No matter how the criminals use fraud, protecting your important information is the primary way to prevent fraud. The "four major pieces" of personal information - ID card, bank card number, mobile phone number and password must be kept properly. Mobile phones, mobile phone cards and memory cards should not be easily given to others to use, so as to avoid the leakage of personal identity information.

In February this year, Mr. Long from Hefei provided his ID card, mobile phone number, bank card and other personal information to criminals pretending to be bank staff because he believed an online advertisement that provided credit card limits. This provided the criminals with an opportunity to replace the card and intercept the code, resulting in a total of 300,000 yuan being stolen from three different bank cards.

In addition, please note that passwords for various financial services should be as complex as possible and modified regularly to improve the security index. In particular, the same password should not be set for online banking accounts, QQ, and email. When using online banking, it is best to use the dynamic password provided by U-Shield.

Therefore, financial service applications should be downloaded through formal and secure channels. Do not connect to or click on unknown network or website links at will. Do not fill in too much registration information to avoid falling into traps set by criminals.

When a mobile phone card has no signal or cannot be used for a long time, you should find out the reason in time, be alert to others reissuing the mobile phone card, and freeze the bank card as soon as possible if necessary. In addition, when changing the mobile phone number, you should promptly unbind the bank card bound to the old mobile phone number.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  TV also has "toxic milk powder" TV version of "Hero's Sword" first test

>>:  China Passenger Car Association: In April 2024, the national passenger car market retail volume reached 1.532 million vehicles, a year-on-year decrease of 5.7%

Recommend

How to create a popular internet celebrity brand from 0 to 1?

Since last year, consumption has once again becom...

Internet TV market is about to change as new products are launched

Recently, Damai Technology said that the first ba...

Why do others keep making money by selling home appliances?

Don't talk about reason, just tell the facts....

When birds fly south, which “South” are they heading to?

Author: Yunhai Science Popularization The article...

4 reusable fission growth battle maps in 2020

Last year, the education industry accounted for 5...

Ruan Yifeng: The seven most important career advices for me (translation)

Nicholas C. Zakas is one of the best JavaScript p...

Why did trilobites become the "top stream" among ancient creatures?

If rocks are pages of history books recording the...

The 10 most popular growth hacking strategies in 2018!

We feel it’s necessary to share with you our rese...

AARRR model, analyzing Himalaya’s membership growth!

The AARRR funnel model is also known as the Pirat...