Beware of red envelope scam! The gang lied and borrowed WeChat accounts to send red envelopes and made a profit of over 400,000

Beware of red envelope scam! The gang lied and borrowed WeChat accounts to send red envelopes and made a profit of over 400,000

In recent years, telecom fraud crimes have become more varied and the forms of fraud are no longer single, which has seriously disrupted the order of people's normal lives. Recently, the People's Court of Golmud City, Haixi Prefecture, Qinghai Province, held an open trial of a case in which Wang Zhen, Ye and nine others violated citizens' personal information. The gang used the excuse of using WeChat accounts to give red envelopes, took the opportunity to modify the victim's WeChat password, and sold it to the fraud gang for profit.

​​​​

The court found that last year, Wang Zhen, who was unemployed at home, met Ye in a WeChat group. During the online chat, the two learned about the way to make money by selling WeChat accounts. After the fraud was carried out for a period of time, the two tasted the "sweetness" and in order to expand the scale, they successively summoned Liu and 7 other people to specialize in the "work" of defrauding and purchasing WeChat accounts.

It is reported that these people joined the student QQ group through various channels, and then posted false advertisements such as "borrow WeChat account, red envelope of 500 yuan" in the group, taking advantage of the victims' desire for small gains, and step by step inducing the victims to actively provide WeChat accounts and passwords. Afterwards, they sold the stolen WeChat accounts to fraud gangs for profit.

Using this method, the team made huge profits. It is understood that Wang Zhen and Ye, together with others, frantically obtained WeChat accounts, Douyin accounts and other social software accounts in a short period of time to make profits. By the time the case was discovered, they had illegally made more than 400,000 yuan in profits.

In this regard, CNMO would like to remind everyone to deeply understand the importance of personal information security to national security and social stability, continuously enhance the awareness of the rule of law, and pay attention to the legal use and protection of personal information.

<<:  Finally decided, Apple completely gave up on under-screen fingerprint recognition, iOS15.4 made great contributions

>>:  Google open-sources new font Roboto-serif, a variant of the Android system font

Recommend

How to rename an unnamed WeChat applet?

Q: How to rename an unnamed WeChat applet? A: How...

Do animals grieve when their companions die?

In 2000, Karen McComb and others placed an elepha...

Automatic test input generation for Android: are we done yet?

Citation: SR Choudhary, A. Gorla, and A. Orso. Au...

How to write “textured” copy? Here are 3 ways

Copywriting with texture can give people enough r...

Li Yu uses words to tell you how exciting life with ups and downs is!

This article was first published by Hunzhi Educat...

This may be the smallest cat in history, living in Anhui | Natural Trumpet

Welcome to the 74th issue of the Nature Trumpet c...

Three preparations you need to make before switching to operations

I heard you want to switch operations ? You have ...