Unit 4 Task

The first is email fraud. With this form, the subject often impersonates a bank officer, an officer of a partner company, and sends a notice asking consumers to provide personal information, account information (username, password, etc.) re-login the locked account or to get a big bonus and pay the fee to get the bonus. From there, it will steal personal/account information and perform transactions to appropriate money in the consumer’s account.

The second scam trick is to send phone messages. Fraudsters usually do it at a time when the bank is not active (night, dawn, weekend, holiday, Tet). In particular, the message sent contains fake links with the content of system upgrade announcements, winning announcements, asking consumers to access fake websites/links similar to banking websites, asking to enter their accounts. OTP accounts and passwords transacted via Internet Banking, Mobile Banking… After having this information, the subject performing the transaction appropriates all the money from the account.

With the third method, subjects using services with the function of spoofing phone numbers, spoofing phone numbers, impersonating officials of functional agencies in law enforcement agencies or agencies. Service-providing agencies and organizations such as the Police, People’s Procuracy, Courts, or electricity and water bill collectors call people to commit fraud, put pressure on or threaten people. consumers about being involved in criminal offenses, then requiring the consumer to transfer large sums of money to an account provided by these actors.

“Or fraudsters impersonating a bank officer, asking for usernames, access passwords, and OTP authentication codes to handle problems related to consumers’ banking transactions. With this information, the subject transfers all the money from the consumer’s account to another account to appropriate it,” said a representative of the Department of Competition and Consumer Protection.

In some cases, fraudsters impersonating carriers contact consumers asking to convert 3G to 4G sim cards, otherwise they will be locked in two ways. The subject then instructs the consumer to take steps to trick the consumer into transferring the consumer’s phone number to the subject’s sim, from which the subject obtains the Ebank password, appropriates the transaction account, and transfers the money. .

The 4th trick of fraud through fake website. Fraudsters ask consumers to access fake websites similar to banking websites, ask to enter accounts and OTP passwords for transactions via Internet Banking, Mobile Banking on fake addresses. After having this information, the subject performs the transaction and transfers all the money from the consumer’s account.

Objects impersonating relatives, friends, partners, providing fake links to Western Union international money transfer services, asking consumers to receive a piece of money or receive money to provide goods and services information about consumers who are in need of sales/property). When the consumer accesses and enters the login information, password of Ebank and OTP to activate the service (Mobile Banking or Smart OTP) into the fake link, the subject will know all the information of the consumer and automatically install Smart OTP for money transfer.

The fifth trick is through social networks, objects will hijack (hack) social network accounts such as Facebook, Zalo … of consumers. This subject then reads old messages and imitates the texting and calling habits of consumers to commit fraud, asking consumers’ relatives and friends to perform financial transactions. .

The sixth method is through e-commerce transactions, subjects open personal pages to sell online, order goods, then advertise and sell items, and ask consumers to transfer deposits. After receiving a deposit or being transferred in advance to order goods, the subject does not deliver or deliver fake or poor quality goods. Objects often lock their websites or delete them completely to erase traces, remove phone numbers and appropriate property of the victim.

Students should not access links, messages/email links from unknown or unknown sources; not perform transactions at the request of strangers when receiving phone calls or messages with contents related to banking transactions; do not install unauthenticated applications, especially at the request of strangers; do not lend or lease personal information to open cards, bank accounts…

+ There are no comments

Add yours