This fraud is a bit embarrassing: "I'm your son, the kidnappers are in my hands now."

Lei Feng Network (Search "Lei Feng Net" public concern) : Author Zhao Wu, founder of Baihathui.

There is a paragraph like this: "Since we have a mobile phone, the message has not been deleted. We did nothing last night to get incomplete statistics: Accumulated winning 137 times, a total of 72.6 million yuan in funds, and a variety of iPhone phones 68, notebook 36 computers, 27 cars, 56 mango TV prizes, 56 races, 42 brothers running, 15 college admissions, 23 son abductions, 31 court summons, bank card exceptions 31 At the same time, my son, Madame Chang, was arrested in the field 103 times. Please tell me if my life is a legend!

Behind this paragraph is a deep sense of frustration, we each received a large number of fraud messages and telephone calls, experts told you that the solution is to increase vigilance, use security software to prompt and intercept. This method of stopping people from arrest only led to increasingly deceptive telecommunications fraud. One batch of 10 batches was approved and 10 batches were approved. The criminals have not been effectively combated, or the impact has not been enough to shock them. Come to these sinners who are stained with blood . Legislation and law enforcement are sometimes lagging. Whether it is from trafficking in children or telecommunication crimes, as well as cybercrime, this lag is usually stimulated and advanced through some typical triggers. Unfortunately, these fuse events are generally tragedies.

Yesterday morning I saw the news that female college students suffered from sudden death from telecom fraud. Xu Yuyu, a poor college student in Linyi City, was defrauded of a $9,900 tuition fee due to receiving fraudulent phone calls from fellow fraudsters. Died of cardiac arrest. I was concerned that some people discussed that Xu Yuyu’s mental capacity is too poor, and some people say that this is a typical Chinese-educational tragedy. Of course, most people still strongly condemned the person who called.

Because I work in information security, I try to look at this issue from another perspective.

| First, Xu Yuyu identity information how out?

How do fraudsters know her name, her exam information, and her bursary? This is a typical information disclosure. In order to effectively implement fraud, criminals use real information to target fishing. I personally received a text message for forging school information, which accurately stated my name and my child's name. I also received information about auto insurance, buying and selling rooms, knowing what my name was, and where I lived. Because I only filled in the children's newspaper school, I only filled it out when I bought a car to buy a car, so basically I was sure that one of the links was leaked.

The person who divulges this data is the source of the crime. The entity's responsibility for owning the data cannot be shirked.

| Second, the data will be how to use?

When this batch of data goes out, criminals will find some loopholes in telecommunications, such as pseudo-base station fake messages, higher levels will use some of the operator's technical loopholes to fake numbers to send text messages or voice.

In this incident, criminals used fraudulent calls from the 17x segment of the virtual operator. Virtual operators have been questioned from the beginning. The biggest problem is how to do supervision . I might as well speculate that the 171's number was registered as fake identity information. When we were young people watching gangster movies, we could often see a scene in which a triad member bought a card in a newspaper kiosk on the street and threw the phone after use. At that time, operators did not do identity verification, and they were able to buy it when they had enough money. Later, they gradually landed on the need to bind real identity information. This talks about another topic. The ordinary bosses' surnames are indeed true. They have never thought about committing crimes. The criminals have a purpose in the beginning, so we can often see the registration information we have traced. is fake. So here, I think that the responsibility of the operator of the pipeline can not be shirked, and the criminals are arrogant in your territory. If you do not care about it, you are guilty of negligence.

| The consequences of fraud

In the end, the last one of these fraudulent telephone frauders carried the most direct responsibility for the criminals who broke the poor spirits of the people. They will study various fraud scenarios, such as the expiration of operator points, such as winning information, and even fake Wang Baoqiang divorce hotspots for fraud. Utilizing the general public's weaknesses such as "great money," "fear," and "gossip" have afflicted everyone's mentality.

In my years of information security, I have seen too much evil, too much helplessness and sorrow. Some scams I can quickly identify, and some even I have to think for a long time.

For example, once again I was driving and I received a phone call saying "You offended someone, people spent money to buy you a leg," and my first reaction was which black production had to be me (360 years ago when I received a bullet.) It's not a secret anymore.) Only after a few minutes did I understand that this is a fraud.


For example, when I received the first fake SMS, I really believed that my son had just enrolled in school. The time was a coincidence and there was no time for you to doubt. If I hadn't downloaded the APK, I had read it professionally. A moment, I may also be recruited.

From this perspective, the success rate of fraud is really high.

Whether it's selling data, or operators, or even the ultimate fraudsters, they will not think that they are doing anything that is harmful to them -

"I just sold a piece of data. I never did anything that hurt people's money."


"We are just a pipeline. The above users can't control what we do"

"No one sells data. No one gives us these fake technologies. We can't do anything. We'll say that cheating on this money won't be a big deal. You see I have a family to support."

How sad it was that Xu Yuyu finally happened. She was just a typical example of a massive victim, and we didn't know how many tragedies there were.

If ordinary people rely on private security companies for protection, I will not thank these security companies. Instead, I would like to ask what causes the situation today. Is our solution and suggestion a little bit lopsided? I saw more and more mobile phone security software added the function of identifying pseudo base stations, adding the function of identifying fraudulent messages, and adding the function of marking malicious links, but at the same time I saw more and more of their malicious libraries, so that our The mobile phone can't save it.

What we have to solve is not the moment of final victimization but the source of crime . Just like terrorists, fight, fight, and fight.

Oh, the title is also a paragraph, it is true: just received an unknown number and called, I "Hello! Hello!" Fraudsters "Hey! I'm your son, the kidnappers are in my hands now." A few seconds, then the other party hung up the phone.

Lei Feng network press: Reprint please contact us to authorize and retain the source and author, may not delete the content.