"Friend" sent WeChat to borrow money and still got scammed after voice confirmation

"Friend" sent WeChat to borrow money and still got scammed after voice confirmation

On October 19, according to media reports, a friend of Mr. Chen in Nanjing, Mr. Wang, borrowed 5,000 yuan from him through WeChat. Mr. Chen specifically asked the other party to send a WeChat voice message to confirm that it was a friend's voice before transferring 5,000 yuan to him. Afterwards, Mr. Chen called Wang to confirm and found out that Wang's WeChat account had been stolen long ago.

The police said that the WeChat voice message sent by the suspect was extremely similar to the voice of Mr. Chen and Mr. Wang. Mr. Chen believed it and thought that his friend Wang was in trouble, so he borrowed money from him. However, after the transfer was completed, Mr. Chen called Wang and found out that Wang’s WeChat had been stolen long ago.

Industry insiders said that there are several possibilities for WeChat voice messages to be obtained by others:

1. The voice and relationship chain information that users have saved through other channels is obtained by bad guys, and then used through voice synthesis software to deceive relatives and friends around them.

2. The voice sent by the fraudster is not the voice of the person being impersonated, but rather uses the psychological suggestion of deliberately creating a noisy environment and publishing voice to prove the identity in order to reduce the vigilance of other users and gain their trust.

Experts remind that it is very important to protect the security of your own account:

1. No matter what reason someone asks for your WeChat account, password, SMS verification code and other personal information, do not provide it, otherwise your account is likely to be stolen.

2. When you find signs that your WeChat account has been stolen, please immediately go to the WeChat Security Center on your mobile phone or the WeChat Center website on your PC to freeze your account and notify your friends to beware of fraud.

<<:  WeChat supports mobile phone number transfer without adding friends

>>:  Analysis of "background invalid animation" behavior in Android

Recommend

Battery dilemma: a game that can’t be stopped

At present, China has surpassed the United States...

Marketing promotion plan for the May Day event!

Labor Day is coming soon. Have you thought about ...

10 steps to build a brand from scratch

This article can only share with you "how to...

Practical case analysis: How to deeply understand user growth

The concept of User Growth (UG) originated from t...

Can Shuanghuanglian oral liquid inhibit the new coronavirus? ? ?

Late last night, the information that "Chine...

What is the “5W1H” of private domain traffic operation?

In the era of e-commerce, traffic on public platf...

How do stars stay young?

The secret of young stars Stars with planets cont...

Android will start charging from February next year

Google is finally ready to take action. Starting ...

After 3 years, I have a new perspective on user operations

What is user operation and how to do it? I believ...