units 4 – question 1


Some of the most prevalent frauds that students face. How to assist pupils in identifying and assessing the legitimacy of messages.

Answer:

Because of its efficacy, online fraud is a widespread type of online crime. Cybercriminals have successfully asked users to react to personal information via emails, text messages, direct messages on social media, or video games. The best defense is to be aware and prepared.

Here are a few examples of frequent scams:

 

A new trick to receive an OTP code from the bank is to use the relevant sim phone number.

One of the most recent scams perpetrated by technological criminals is the theft of a mobile subscriber’s sim card in order to obtain the OTP code from the bank. Then, online, complete the act of transferring, withdrawing, or borrowing money.

A common trick is to impersonate a carrier employee, call an introductory phone with a program “supporting sim conversion from 3G to 4G,” or change sims to receive incentives and urge victims to upgrade to a 4G sim if they do not, the subject will instruct the sim owner of the phone number to compose the message according to the syntax. The sim phone number is promptly taken after the act of drafting and sending a message is completed. the ability to manage the user’s sim, the crook uses that sim to obtain the OTP code from the bank and send it to use credit services, borrow money online, etc. under the victim’s identity

As a result, consumers should be aware of calls and texts from unknown numbers that contain material such as providing help with sim replacement, sim upgrading, or winning announcement. Users should contact the customer support helpdesk if they encounter unexpected occurrences such as signal loss, disabled phone numbers for inexplicable reasons, or multiple weird phone numbers ringing at the same time. Furthermore, users do not check the URLs associated with the content of unusual messages, and they do not do phone operations according to the syntax suggested by strangers.

Set up a fake website and pose as a bank employee to defraud.

The subjects utilized the method to send SMS messages with the bank’s fictitious brand name in order to deceive clients into opening the fictitious link, which looked identical to the bank’s e-banking service interface. Then, in order to appropriate money, you must supply security information such as your name, login password, OTP code, card information, and so on.

Make a phony phone call to a bank officer: The fraudster calls from a personal phone (not the bank’s Hotline number), pretending to be a bank employee, to assist in locating the erroneous money transfer and to validate the transaction. Following that, the subject will send an SMS instructing the consumer to give information on a URL leading to a bogus bank website, requesting login information, password, OTP code, and so on.

Pretending to be traffic cops and sending out cold fine notice

Subjects used tricks to take advantage of the handling of violations through images to defraud and steal account information.

In many cases, people have complained about receiving calls to notify vehicle owners that there has been a violation of road traffic laws and instructions on how to transfer money to pay fines.

The essence of the above scam is that criminals taking advantage of cold fines are traffic violators who are not handled immediately, but go through a process such as: When violating the road traffic law, monitors are mounted on recorded routes. Then the image will be sent to the processing and analysis center to determine the violation. When determining a violation, the traffic police will send a notice to the vehicle owner. If the vehicle owner or driver who commits a traffic violation does not come to work after 15 days, the Traffic Police Department will collaborate with the police of the ward, commune, and township to issue a notice of violation to the car owner, the co-op, and the municipality. Coordination with the register office in a timely manner to notify vehicles used to break traffic regulations on the inspection management program.

Criminals took advantage of the time it took for the traffic police to complete the above-mentioned sanctioning process and created fake information to send to vehicle owners for the purpose of deceiving vehicle owners. pay fine. Currently, the cold sanctioning of traffic violations can only be done: The vehicle owner or the driver of the vehicle that commits a traffic violation directly goes to the headquarters of the Traffic Police Department, and the officer publicly and transparently announces the violation. violation, time and location of violation and instructions, settlement, handling and fines for traffic violations.

Increase awareness and safeguard personal information

In our country, the number of people utilizing social networks such as Facebook, Zalo, Instagram, and others is currently relatively high. This creates an ideal environment for unscrupulous actors to take advantage of in order to perpetrate fraud and appropriate property. Individuals who use social media should be vigilant in order to prevent being a victim of internet frauds. When someone texted to request a loan or top up their phone, they had to call directly to confirm and verify. Do not fall for online bonus scams that ask you to recharge your phone card or transfer money to a bank account in order to earn incentives.

Do not click on links, links in messages, or emails from unknown or unknown senders. Maintain personal information confidentiality; do not reveal personal information, phone number, home address, information about bank accounts, Internet service accounts, etc. to any stranger who calls.

 

Example:

“Scammers send winning messages on friends’ Facebook pages.” Message encouraging people to participate in the Coca-Cola Welfare Fund by answering survey questions and earning a prize of 2 million VND. When the link is clicked, a website with a Coca-Cola-like interface appears, urging you to press the share button for 5 groups or 20 people to receive rewards.

Some users who clicked the “Share” button said that instead of earning VND 2 million, they lost control of their Facebook accounts after obtaining the message: Session has expired. Their accounts then forward similar links to their contacts.

Previously, the trick of taking over Facebook accounts appeared in the form of tagging (tagging) users in sensational posts. The website requires Facebook account information to view posts. However, after entering, the hacker will take over the user’s Facebook account, post the same post and tag many friends.

 

As a result, Facebook users must pay attention to the message information supplied and double-check it before doing the requested tasks.

+ There are no comments

Add yours