"Customization" and "white washing" one-stop telecom network fraud is industrialized
2022-03-29
From order receiving and development to packaging, distribution and after-sales, provide customized app services, just to make the fraud tools put on the cloak of genuine mobile phone software. Some people are responsible for finding the account holder, while others are responsible for registering the company, handling business licenses and opening corporate accounts for the account holder. A large number of bank cards and telephone cards opened in real names are purchased or leased by fraudsters to implement telecom network fraud. The buyer who collects money at a high price is actually a telecom network fraud gang. Behind the circular virtual currency transaction is to wash away the stolen money Recently, the reporter learned from various investigations that the organization, corporatization and industrialization of telecom network fraud are becoming more and more obvious. A series of illegal transactions such as customized illegal app, buying and selling bank cards and telephone cards, money laundering and so on breed the black gold industry. "Customized" app becomes a "customization trap" More than 60% of scams are implemented through mobile app In Shunyi District, Beijing, under the guidance of netizen "half a cup of coffee", Ms. Wang scanned the code and downloaded an app called "XX wealth management". Ms. Wang invested more than 10000 yuan in this app on the same day. It seems that there is no special income for Ms. Wang to withdraw it immediately. When Ms. Wang borrowed money from relatives and friends, borrowed money from the bank, and even mortgaged the real estate, raising a total of 2 million yuan to be fully charged into the account, the system was unable to withdraw cash on the grounds that "the account is abnormally frozen and protected". Subsequently, the app could no longer log in "The app downloaded by Ms. Wang scanning the code is actually a 'fake version', which is an investment and wealth management app falsely using well-known software encapsulated by black ash technicians according to the requirements of blackmailers." Ren Weiwei, the prosecutor of the people's Procuratorate of Shunyi District of Beijing, who is responsible for handling the case, told the reporter of Economic Information Daily that this fake app is encapsulated by a network service platform. The so-called encapsulation is to package the website, application name, logo and startup diagram to form an app application package, so that the website can be presented in the form of app. Chang Wen, deputy director of the center for prevention and control of telecom network fraud of the Institute of security of the Chinese Academy of information technology and the head of the anti fraud special class of the Ministry of industry and information technology, introduced that through the app packaging and distribution platform, developers can realize the automatic generation and rapid distribution of apps with a simple click. Compared with regular app stores, such packaging and distribution platforms lack application risk audit and developer information registration system, which has become an important channel for fraudsters to produce and disseminate fraudulent apps. "Some technicians or network service platforms know that others may use the app to commit information network crimes, but in order to obtain illegal interests, they take technology neutrality as a shield and wantonly participate in the production and packaging of illegal apps. One illegal packaging can make the scammers put on the cloak of genuine mobile phone software and ruin the cheated families." Ren Weiwei said. The reporter learned that mobile app has become an important tool for fraud. According to the statistics of the Ministry of public security, since 2021, more than 60% of fraud has been implemented through mobile app made by criminals. Accompanied by this, the industry of customized app has become an important part of the black and gray production of telecom network fraud. Some companies provide "one-stop" services from order receiving, development, packaging, distribution and after-sales. A local public security organ destroyed a large cross-border "pig killing plate" criminal gang, in which LAN and Zhan, who are responsible for the development and maintenance of APP technology, explained: "packaging app is very simple for me. It takes only two minutes to complete it. I can earn 10 yuan to 100 yuan for each package". They have made 100000 yuan in three months. Recently, the public security department has successively investigated and dealt with hundreds of fraudulent mobile apps, covering social networking, loans, investment, gambling, shopping, short video, mobile security and other fields. "Taking social software as an example, after criminals make a social software with the function of capturing customer address book according to the requirements of blackmailers, blackmailers use the software to chat naked with the victim. After capturing the address book, blackmail is threatened by sending naked chat photos to friends." Ren Weiwei said. Bank cards and telephone cards become accomplices Illegal trade breeds black gold industry Zhong, 21, met a man named "a Feng" when he was working in 2021. The other party introduced him to Beijing to register a company and open a bank public account. He said that during this period, he not only managed to eat and live, but also sold it to others after the account was completed, with considerable income. Zhong was moved by this, so "a Feng" arranged to come to Beijing. Later, under the leadership of a man nicknamed "bird uncle" and a woman nicknamed "eldest sister", he registered the company and opened a public account, and sold the account to them at the price of 1500 yuan. Since then, under the introduction of "a Feng", Zhong was developed by a man named "boss" into a team leader who arranged the accommodation of account opening personnel. It was not until Beijing Chaoyang police found that the two corporate accounts opened by Zhong in a bank were suspected of helping telecom network fraudsters transfer the proceeds of crime, that this large-scale information network criminal gang with clear levels and strict division of labor finally surfaced: "boss" is the general person in charge; "A Feng" is responsible for finding the account holder and arranging him to come to Beijing; Zhong is responsible for arranging the accommodation of the account holder; "Bird uncle" and "big sister" are responsible for registering the company, handling the business license and opening the corporate account for the account holder. Finally, the "big sister" will hand over the license and account to the "boss", and the expenses of each link will be paid by the "boss". A large number of real name bank cards and telephone cards were purchased or leased by fraudsters to carry out criminal activities such as telecom network fraud. The illegal industrial system of buying and selling "two cards", namely bank cards and telephone cards, has also become an accomplice in "blood transfusion and food delivery" for telecom network fraud. Ren Weiwei told reporters that criminals buy a large number of four sets of other people's bank cards, namely bank cards, U shield, passwords, bound mobile phone cards, or eight sets of corporate accounts, including company business licenses and corporate ID cards, so as to realize the transfer and splitting of stolen money between multiple accounts by using other people's bank cards. According to the Ministry of public security, in 2021, the public security organs cracked more than 441000 cases of telecom network fraud, destroyed 42000 illegal and criminal gangs involving "two cards", and all the bank cards involved were illegally traded after being opened in their real names. In addition to the mobile phone fraud detection platform of Jilin Provincial Department of public security, the real card is also an important carrier for the implementation of fraud detection by the director of the real card making Department of Jilin Provincial Department of public security. In addition to the real card fraud, the real card is also an important carrier for the implementation of fraud detection by the director of Jilin Provincial Department of public security. "Some criminals publish the information of recruiting part-time jobs on the Internet, claiming that applying for mobile phone cards will boost the performance of the business hall, and paying hundreds of yuan for one card is actually to sell the purchased mobile phone cards at a higher price and mail them to the border or abroad. In order to prevent the disclosure of criminal acts, criminals themselves rarely appear near the business hall, and rarely pay directly to the card operator or in cash, but recruit team leaders to implement them And remind the team leader to store the purchased cards separately to avoid punishment. " Ren Weiwei said that in handling the case, it was found that some insiders in the industry took advantage of system loopholes to secretly open and sell cards. Ren Weiwei revealed that after obtaining the entrustment of telephone network access business from telecom service operators, some staff of individual mobile phone stores carried out face recognition on users for many times on the grounds of "failed authentication, re authentication and solving network speed", falsely used their electronic signature, handled more mobile phone cards without the knowledge of customers and sold them on the black market. They sell at the price of 90 yuan each, and can also get a card rebate of 10 yuan from the channel provider, that is, a single sheet makes a profit of 100 yuan. In addition, some people claim to be able to achieve the "impressive performance" of "opening 9 Cards in less than an hour". These people know that the "card breaking action" is carried out throughout the country and that their peers are arrested, but they still have the fluke of "keeping the card first, not in vain" and wait for the opportunity to commit a crime. The relevant person in charge of the network security administration of the Ministry of industry and information technology said that some criminals organized migrant workers, the elderly and students to resell illegal private transactions after they registered and purchased telephone cards in the real name of telecom enterprises. Due to the lack of legal basis, the public security organ is unable to punish the dishonest users, resulting in repeated offenders and die hards. "Money speculation" is actually "money laundering" There are many tricks in the transfer of stolen money In Beijing, Qiu met a netizen named "Star" through a social chat app. "Star" seems kind and claims to have a "money speculation" project with a high income. Qiu is invited to participate together. When the two met, Qiu first scanned the code and downloaded the "currency" app and "imtoken" app according to the instructions of "Star", and completed the real name registration on the "currency" app. Then he received the virtual currency transferred from "Star" through the "imtoken" app without real name registration, namely TEDA currency, and withdrew the virtual currency to his "currency" app account, and then sold the virtual currency to the higher bidder on the "currency" app, At the same time, collect RMB through my bank account and withdraw cash quickly. After deducting my profits, give it to "Star" to complete the transaction. Just move your fingers and you can easily make money. Qiu has since started the business of "speculation" with the "Star". Due to the need to trade many times a day, in order to ensure that the cash is delivered to the "Star" in time and is not limited by the withdrawal limit, Qiu has bound multiple bank accounts under his name to the "certain currency" app, and quickly split, circulate and withdraw cash between several accounts. Until one day, Qiu found that the bank accounts he used to fry money had been frozen by the judiciary. It turned out that the buyers who collected money at a high price were actually telecom network fraud gangs, and the money used to collect money was the stolen money they had just cheated. "The seller sells virtual currency on the level of virtual currency transaction, and the buyer pays RMB to buy virtual currency. In fact, the buyer's account is the account controlled by telecom fraudsters. After the seller uses the bank account to collect the stolen money, it will split and withdraw it, and then hand over the cash to the previous family to collect the virtual currency, which will go round and round to wash away the stolen money." Ren Weiwei said. Fraudsters often transfer the funds involved in the case quickly in order to avoid the stop payment and freezing measures of the public security organ. Criminals constantly look for and test the weak links of the "capital chain" and innovate the transfer mode of stolen money. According to the reporter, in addition to the transfer through the domestic "Shuifang" (money laundering Gang) and the split transaction of "running sub platform", fraudsters also transfer fraud related funds abroad by purchasing virtual currency, which is more difficult to investigate and control. "The first is anonymity and the second is decentralization, which can realize the rapid and large-scale transfer of funds abroad. Moreover, when using virtual currency to transfer stolen money, the large-scale funds will also be broken up, and the personnel within the criminal gang are responsible for the transfer of funds of different types of virtual currency." Wang Shu, prosecutor of the Beijing Municipal People's Procuratorate, admitted that it is more difficult to obtain evidence for the crime of using virtual currency to transfer stolen money. At present, the organized and industrialized characteristics of telecom network fraud are becoming more and more prominent. "All links of fraud, such as buying and selling citizen information, developing technology platform, network drainage and promotion, transfer of funds and money laundering, are interconnected, intertwined with crimes such as online gambling, organized smuggling, kidnapping and extortion, naked chat and extortion, and organized, corporatized and industrialized
Edit:Li Ling Responsible editor:Chen Jie
Source:Business Information Daily
Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com