Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall
Stole a lot of credit card information.
1. Zhang Chong provides credit card information, passwords, etc. stolen from the trading website
2. Jang Xinglin to the front of the county for fake ID card
3. Yang Hayu based on the information provided by Zhang Yi and fake ID card to the City Bank counter (attached card)
4. Zhang Yi uses the newly bought disposable mobile phone to carry on the telephone bank transfer, transfers the money from the main card to the attached card
5. Yang Hayu to the counter to withdraw money
6. Jang Xinglin is responsible for driving back on the same day
Trojan broke the trading website, stole a lot of credit card information
February 20, 2008, Mr. Wang, who was doing business in Zhengzhou, received a telephone call from the staff of the East Branch of Shanghai Pudong Development Bank, and he could not solve it, how did he steal the money on his credit card for 80,000 yuan?
After a police investigation, Mr. Wang remembered that he had done an online transaction on a postal-currency trading website, and that the online transaction had brought him the theft. The site was installed with a Trojan virus program, as long as someone entered can get access to the password, address and other personal information.
Who installed the Trojan virus program? Who stole the money from Mr. Wang's credit card? This is from another case: Li Jinsiang is the Zhang Yi of the computer training courses hired teachers, this person is very proficient in the computer, he installed Trojan virus program on the website, and the personal information of their theft is placed in the e-mail, He was subsequently arrested by the Taiqian County Public Security Bureau for stealing cash from Minsheng bank. Li Jinsiang arrested, Zhang Yi remember his mailbox password ABC141456, try to enter, and behold, actually went in. Li Jinsiang's mailbox has many people's name, address, account number, password and so on information material, in Zhang Yi Eye, this information is like Alibaba "the Sesame opens the door" The key, he has found Yang Hayu, Jang Xinglin, three people cooperation, wants the big battle.
Three-person gangs, by the main card transfer continuous crime
High-tech district Procuratorate provided the file material clearly shows the gang's modus operandi (pictured above). They chose to commit the bank card is the Pudong bank, because only the Pudong bank card, the main card transfer without signing. Zhang Yi and other three people, respectively, they in this January 28, in Jinan, Shandong, 60,000 yuan fraud, January 29, three people "continuous combat" in Tianjin fraud 80,000 yuan, February 20, in Henan Zhengzhou, the implementation of bank card fraud cash 80,000 yuan, a total of more than 220,000 cash fraud. Interestingly, they are superstitious, always stealing 60,000 yuan or 80,000 yuan of auspicious numbers, regardless of the amount of balance on the card.
Zhang Yi and Yang Hayu were sentenced, but their partner Jang Xinglin is at large at the moment, when he began to cooperate, he left his hand, with a false identity card.
Telephone transfers are risky and the judge advises banks to improve their defenses
High-tech District Court Judge Su Jianqing that at present, many banks have opened telephone banks, in the telephone bank can carry out funds transfer transactions, so the telephone has become a key risk of bank cards, financial units to improve the identification of documents and ensure the ability of information security, as far as possible to reduce the resulting litigation and contradictions.
The principal's advice online trading must be cautious. It's best to check your account regularly
How can the public avoid disclosing personal information? In the face of the reporter's question, after the trial Zhang Yi this answer: "Online transactions, people must be cautious, do not easily disclose their personal information." In particular, often check their own accounts, online transactions, as much as possible to change their password. ”
Key authentication is reliable
Expert advice online transactions to enable professional version of the network bank has key authentication is reliable
"The vast majority of hackers are through the user's computer backstage peeping users of various accounts, passwords, so as to achieve the purpose of obtaining illegal benefits." "Song Pei was a famous website in Henan, the boss, but also information security experts, he through the evening to the public how to prevent" poison.
Song Pei said, in fact, as long as the user a little precaution, computer poisoning probability will be greatly reduced. It is understood that many of the domestic user's computer knowledge still stay in the Internet, the input document simple operation phase, many users will not upgrade antivirus software, upgrade vulnerability patches, but also do not click the mouse to antivirus. Song Pei remind users, first, the computer should be installed genuine anti-virus software and timely upgrade virus library; second, to regularly antivirus computer, and on the Internet to open the firewall; third, in some commonly used for network browsing, online games on the computer, try not to use electronic payment services, if necessary, should enable professional version of the network bank , should have hardware key authentication; four, do not save any luck to browse bad websites, because the chance to visit this kind of website is very big.