Trojan Breach Trading network man steals credit card password cheat 220,000

Source: Internet
Author: User

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

 

Stole a lot of credit card information.

1. Zhang Chong provides credit card information, passwords, etc. stolen from the trading website

2. Jang Xinglin to the front of the county for fake ID card

3. Yang Hayu based on the information provided by Zhang Yi and fake ID card to the City Bank counter (attached card)

4. Zhang Yi uses the newly bought disposable mobile phone to carry on the telephone bank transfer, transfers the money from the main card to the attached card

5. Yang Hayu to the counter to withdraw money

6. Jang Xinglin is responsible for driving back on the same day

Trojan broke the trading website, stole a lot of credit card information

February 20, 2008, Mr. Wang, who was doing business in Zhengzhou, received a telephone call from the staff of the East Branch of Shanghai Pudong Development Bank, and he could not solve it, how did he steal the money on his credit card for 80,000 yuan?

After a police investigation, Mr. Wang remembered that he had done an online transaction on a postal-currency trading website, and that the online transaction had brought him the theft. The site was installed with a Trojan virus program, as long as someone entered can get access to the password, address and other personal information.

Who installed the Trojan virus program? Who stole the money from Mr. Wang's credit card? This is from another case: Li Jinsiang is the Zhang Yi of the computer training courses hired teachers, this person is very proficient in the computer, he installed Trojan virus program on the website, and the personal information of their theft is placed in the e-mail, He was subsequently arrested by the Taiqian County Public Security Bureau for stealing cash from Minsheng bank. Li Jinsiang arrested, Zhang Yi remember his mailbox password ABC141456, try to enter, and behold, actually went in. Li Jinsiang's mailbox has many people's name, address, account number, password and so on information material, in Zhang Yi Eye, this information is like Alibaba "the Sesame opens the door" The key, he has found Yang Hayu, Jang Xinglin, three people cooperation, wants the big battle.

Three-person gangs, by the main card transfer continuous crime

High-tech district Procuratorate provided the file material clearly shows the gang's modus operandi (pictured above). They chose to commit the bank card is the Pudong bank, because only the Pudong bank card, the main card transfer without signing. Zhang Yi and other three people, respectively, they in this January 28, in Jinan, Shandong, 60,000 yuan fraud, January 29, three people "continuous combat" in Tianjin fraud 80,000 yuan, February 20, in Henan Zhengzhou, the implementation of bank card fraud cash 80,000 yuan, a total of more than 220,000 cash fraud. Interestingly, they are superstitious, always stealing 60,000 yuan or 80,000 yuan of auspicious numbers, regardless of the amount of balance on the card.

Zhang Yi and Yang Hayu were sentenced, but their partner Jang Xinglin is at large at the moment, when he began to cooperate, he left his hand, with a false identity card.

Telephone transfers are risky and the judge advises banks to improve their defenses

High-tech District Court Judge Su Jianqing that at present, many banks have opened telephone banks, in the telephone bank can carry out funds transfer transactions, so the telephone has become a key risk of bank cards, financial units to improve the identification of documents and ensure the ability of information security, as far as possible to reduce the resulting litigation and contradictions.

The principal's advice online trading must be cautious. It's best to check your account regularly

How can the public avoid disclosing personal information? In the face of the reporter's question, after the trial Zhang Yi this answer: "Online transactions, people must be cautious, do not easily disclose their personal information." In particular, often check their own accounts, online transactions, as much as possible to change their password. ”

Key authentication is reliable

Expert advice online transactions to enable professional version of the network bank has key authentication is reliable

"The vast majority of hackers are through the user's computer backstage peeping users of various accounts, passwords, so as to achieve the purpose of obtaining illegal benefits." "Song Pei was a famous website in Henan, the boss, but also information security experts, he through the evening to the public how to prevent" poison.

Song Pei said, in fact, as long as the user a little precaution, computer poisoning probability will be greatly reduced. It is understood that many of the domestic user's computer knowledge still stay in the Internet, the input document simple operation phase, many users will not upgrade antivirus software, upgrade vulnerability patches, but also do not click the mouse to antivirus. Song Pei remind users, first, the computer should be installed genuine anti-virus software and timely upgrade virus library; second, to regularly antivirus computer, and on the Internet to open the firewall; third, in some commonly used for network browsing, online games on the computer, try not to use electronic payment services, if necessary, should enable professional version of the network bank , should have hardware key authentication; four, do not save any luck to browse bad websites, because the chance to visit this kind of website is very big.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.