Recently, the citizen Ms. Xun couldn't believe it. She did not lose her mobile phone and bank card, did not scan the QR code, received no fraudulent phone calls, and did not leak the verification code. The money on the bank card was looted. Money was missing in his sleep.
Ms. Xun reported to the police that at 4 am on the day of the incident, a series of dense SMS reminders awakened Ms. Xun from her sleep. The mobile phone was instantly packed with Internet service companies from Vipshop, Momo, and Taobao.com. A large number of SMS verification codes and reminders of consumer transactions from banks. Along with the sense of tension and fear, Ms. Wu, who had settled down, found through inquiry that her bank card had been consumed by various transaction platforms, and more than 7,000 yuan had been stolen.
After the panic-stricken Ms. Xuan reported to the police, the three responsible criminal police teams of the Xiangshan Branch started a battle with this "thief" who was hiding in the dark of the Internet. How did the suspect get Ms. Xun's information? The police identified the suspect Yuan in Nanjing through the flow of money. At the same time, the criminal police discovered that Meng, who had contact with Yuan and lived in the same community with the victim, Ms. Su, was suspected of committing a major crime. It turned out that criminals used "sniffing" tools to make Ms. Xun's money disappear. Once the victim's mobile phone number is within the scope of the sniffing tool, the criminal can intercept the verification code on the owner's mobile phone, and then use the victim's mobile phone number to log in to some financial apps, shopping websites, web pages, and query the machine. The master's personal information was stolen. This technology is mainly aimed at 2G GSM signals. The criminal suspects interfere with the mobile phone signal to change 4G to 2G signal and then steal the short message information. Most of the criminals choose to commit crimes in the early morning, and because they do not need to contact the victim directly, most of them are unaware of the theft of funds.
With the investigation deepening, this group involving Huaibei, Suzhou, Putian, Huludao and other places, members of the division of labor closely, single-line contact, the use of "sniffing" instruments and equipment, the implementation of network stealing gang emerged. Interpols visited 10 prefectures and cities across the country, arrested 11 suspects, and confiscated 5 sniffer devices. The follow-up work of the case is underway.
The police hereby remind the general public that if you encounter a similar situation, in addition to dialing the alarm phone in time, you should first turn the phone to shutdown, flight mode or turn off the mobile signal of the phone; use "VoLTE" to protect information security: set in the phone Open the "VoLTE" option; usually, you must protect sensitive personal information such as mobile phone number, ID card number, bank card number, and payment platform account number. Try not to store large amounts of money in bank cards that are tied to payment platforms, and limit account spending and transfer limits. Turn off non-secret payment and enable advanced verification, such as fingerprint recognition and voiceprint recognition.
Reporter Fu Tianyi