Reminder | New scam! Do you know the mobile phone extension? Someone lost 50 thousand overnight

  CCTV News:Pretending to be an acquaintance to borrow money, pretending to be a public security bureau, a procuratorate or a court officer to investigate a case, and hiding a Trojan link &hellip in short messages and QR codes; … These tricks must have made everyone immune, but do you know? Some telecommunications services that you have never heard of have also begun to become new traps set by scammers!

The mobile phone was locked and more than 50,000 yuan was stolen.

  When he woke up, Mr. He in Shenzhen found that his mobile phone was locked. At the same time, a shopping platform account was stolen by strangers. Criminals used white bars to spend and apply for loans, and robbed more than 50,000 yuan overnight.


  Later, Mr. He discovered that his mobile phone had been taken over by a strange number. The short message from the operator shows that this is a business to add a secondary number, and Mr. He’s mobile phone number was added as a secondary number by criminals. When the secondary phone is turned off, all short messages will be received by the primary phone, and criminals will receive Mr. He’s short message verification code during this period, and then commit crimes.


"Subnumber" ≠ "kinship number"

  Without an ID card, a bank card or even a real name, the money is gone. What the hell is a minor number?

  Many people think of "family number" at first, but "deputy number" and "family number" are not the same thing.


  Family number usually refers to the phone bill package opened by different owners and different numbers in order to make calls between them cheaper, and the secondary number is the "one card with many numbers" service provided by operators. On the basis of not changing mobile phones and SIM cards, users can add up to three real mobile phones as secondary numbers. The main and auxiliary numbers can stand by at the same time, and you can freely choose any number to dial, answer the phone and send and receive short messages as needed.

Don’t reply to text messages too casually.

  Then, how did Mr. He’s mobile phone number become the "secondary number" of criminals?

  Reduction of criminal modus operandi

  Step 1: Buy materials.Criminals buy leaked names, bank card numbers, ID numbers and reserved mobile phone numbers online, commonly known as "four big pieces".

  Step 2: Fishing.Criminals apply to the users who have mastered the bank card information, initiate the business application of binding the sub-number, and find the target of the crime by casting a net widely. Once you reply by mistake, you are hooked.

  Step 3: Forced shutdown.Because the main number can only take over the SMS when the secondary number is turned off, criminals usually use two means at this time. One is to use SMS bombing to force the target to turn off the mobile phone, and the other is to use the mobile phone cloud service to remotely operate the mobile phone.

  Step 4: White Wolf with Empty Gloves.Using the SMS verification code received by the main number, criminals ransacked the online shopping account bound to the mobile phone number.

  Patterns are stacked, and it is impossible to prevent them! For this kind of fraud, after receiving all kinds of SMS notifications, you must read the content of the SMS clearly and do not reply at will.

"SMS custody" business is also not very secure.

  After the SMS storage service is opened, you can save your mobile phone messages on the server of the operator. Now, many mobile phone manufacturers’ cloud services are doing the same thing. However, this is a hidden danger function.

  Case review

  One morning, Miss Ding saw two short messages from banks and mobile phone operators on her mobile phone, which were sent at 3:43 am and 4:12 am respectively. As soon as the account is checked, the balance of more than 100,000 yuan will be zero overnight! Not only that, Miss Ding also suffered a credit card theft and was "applied" for a bank universal loan of 70,000 yuan.

  How on earth did all this happen?

  Reduction of criminal modus operandi

  Step 1: Hit the database to get all kinds of account information.The so-called "library collision" means using software to try a high probability digital sequence. Using this simple and rude method, the user’s network identity, online banking account number, mobile phone business hall and other accounts can be seen at a glance. Insiders said: "The speed of library collision is very fast, at least thousands per minute. If some good equipment is used, the efficiency is higher and the success rate is above 50%."

  Step 2: Open SMS storage and SMS interception services to obtain verification code.This is the most critical step. After the opening of this service, the dynamic verification code to ensure the safety of landing has successfully become the bag of criminals.

  Step 3: Open the physical SIM card.At this point, criminals can pretend to be victims and apply for 4G card replacement service in the online business hall. For the convenience of the people, some operators can express the card directly to the designated address.

  By intercepting short messages and copying SIM cards, fraudsters can "do whatever they want".

  As we all know, many important services rely on mobile phone authentication. If you back up the SMS to the server synchronously, it will increase the exposure opportunity. Once the service password of the online business hall is stolen, or the login permission of the cloud service is stolen, it is equivalent to "swimming naked".

The loopholes in the unpopular business are targeted by scammers.


  The "Research Report on the Trend of Online Fraud in 2016" released by the anti-fraud reporting platform "Hunting Network Platform" proposes that since 2016, online fraud has mainly shown several obvious characteristics:

  Mobile phone cards have become new theft targets;

  Jump to the phishing website by using short URL and weiyun sharing link;

  Well-known recruitment websites and voice platforms for open recruitment;

  A phishing website that is difficult to distinguish between true and false;

  The implementation of precision fraud;

  Fraud professionalism is getting higher and higher;

  Using loopholes in new business and unpopular business to commit fraud;

  Use cloud disk and synchronization software to steal information.

  Among them, the loopholes in mobile phone cards and unpopular business are mentioned.

  Security experts suggest that we should develop good online habits, don’t click unfamiliar links, don’t fill in our personal information in the website interface with unknown security, and regularly modify the password of social accounts to avoid information such as mobile phone contact information being leaked; Improve safety awareness, develop good habits of using mobile phones, and avoid being infected by mobile phone viruses.

There are many kinds of "flowers", and the recent copper beams contain a very high amount of "spring"!

Hello, Spring.

Spring is the preface, and everything is harmonious.

Copper beam in spring

Looking up is full of stars and flowers

Plum blossom, cherry blossom, begonia,

Acacia, rape flower … …


The fafa of the copper beam is all open

Let’s go out and embrace spring together ~

Beautiful plum blossoms in spring.

As soon as spring comes, the romantic flower viewing season will come! In a plum blossom base in Xilai Village, Nancheng Street, Tongliang, thousands of plum blossoms are in full bloom, and the pink and tender flowers are swaying in the wind. From a height, it looks like a pink ocean, warm and romantic.

Under the irradiation of the warm sun in spring, the petals are particularly gorgeous. The spring breeze blows, the flowers sway with the wind, and the petals fall with the wind, which is beautiful. The blooming plum blossoms also attract many tourists to punch in and enjoy the flowers and feel the pink romance that belongs to spring alone.

Walking through the forest, you can see the pink flowers connected into a whole piece when you look up. Everyone who comes to enjoy the flowers is looking forward to meeting the beautiful spring scenery hidden in each flower.

According to reports, the natural flowering period of Meirenmei has been open from top to bottom since the first flower in March. Due to different regions and climates, the flowering period can last from late March to mid-April.

Cherry blossoms are full of spring.

At present, with the temperature rising, 6,000 mu of cherry flowers in Shuangshan Town, Tongliang District are in full bloom, attracting tourists.

Looking around, patches of cherry flowers stretch from the foot of the mountain to the top of the mountain, clusters and clusters, densely covered with branches, like white snow, beautiful.

Visitors who come to enjoy the flowers stroll along the path among the flowers, breathe the fragrant fragrance and enjoy the beautiful scenery in spring.

It is understood that Shuangshan Town in Tongliang District is known as the hometown of cherries, and it is a well-known "hometown of small fruits". Among them, Jianxin Village is the core area of cherry planting, with more than 10 varieties such as white cherry, cinnabar cherry, Chinese red cherry and black pearl cherry, and the flower viewing period will last until the middle and late March.

Begonia blossoms at the right time.

In Xue ‘an Park in Tongliang City, begonia flowers are blooming in the warm spring sun, and hardworking bees are dancing on the petals, adding infinite interest to the brilliant spring.

In the park, some citizens who come to enjoy the flowers use mobile phones and some use professional cameras to record the intimate "encounter" with the flowers.

Acacia limited in spring

"The Little Yellow Flower of the Story" has been blooming brilliantly in Yuanxiang Avenue recently, and clusters of bright and cheerful acacia flowers have made spring bright and cheerful.

Clouds of small flower balls are fluffy and golden, like a warm little sun, wrapped in green leaves, pouring down the enthusiasm of spring.

Beautiful agreement of rape flower

Little friends, you can see the "Rape Flower Sea" without going out of the city! Beside the Huaiyuanhe Community Sports and Cultural Park in Tongliang, a piece of rape blossoms are dazzling, like golden waves, and the waves roll together with the spring breeze, which makes people intoxicated.

Bees are busy collecting honey among the flowers, which adds a bit of movement and vitality to this spring picture.

Never brushed the flowers in March with my own hands

How dare you say that you have appreciated the beauty of spring?

Little friends

Invite three or five friends

Have a romantic date with spring!

Original title: There are many kinds of flowers, and the recent copper beams contain a very high amount of "spring"!

Editor: Wang Guangjian Editor: Zheng Yalan Audit: Song Yan