This is a new type of fraud APP! Do not hesitate to uninstall it immediately

This is a new type of fraud APP! Do not hesitate to uninstall it immediately

Recently, a new type of fraud software - "UnionPay Conference" APP has appeared in many places across the country. Many people have been deceived, and most of the victims are middle-aged and elderly people.

This APP looks like this↓

Fraud methods revealed

▲ Impersonating platform customer service

The scammers pretended to be customer service of a short video platform, claiming that the victim had activated the "live broadcast membership" service. If the service is not canceled, fees will be automatically deducted every month. Failure to deduct fees will affect personal credit.

▲Inducement operation

Under the pretext of “remote assistance in closing membership”, the victims were added to WeChat, QQ and other chat software, and induced to download the “UnionPay Conference” APP.

▲Control mobile phone transfer

After downloading, the scammers will ask the victims to turn on screen sharing or remote control functions, cooperate with them to log in to mobile banking, enter passwords, verification codes and other information, and induce the victims to transfer money to external parties or directly control the mobile phones to transfer funds in the card, thereby successfully carrying out the fraud.

Source: Criminal Investigation Bureau of the Ministry of Public Security

Although there are two words "UnionPay"

It's actually a Trojan virus

According to the police, the "UnionPay Conference" APP is a Trojan software. Although the word "UnionPay" is in its name, it has nothing to do with China UnionPay. After downloading and installing the authorized software, it can remotely control the victim's mobile phone and then operate the transfer to infringe the victim's property.

On February 25, the WeChat official account "China UnionPay Release" issued a solemn statement: "UnionPay Conference APP" is not a China UnionPay product.

What types of Trojan viruses are there?

Experts say that Trojan viruses can generally be divided into three types based on the different ways of invasion:

Exploit vulnerabilities in the mobile phone operating system to conduct remote attacks.

The Trojan program itself is an application that, once installed on a mobile phone, can perform related operations.

The practice of bundling Trojans and virus programs into normal applications is highly concealed. When you open the mobile application, you can use it normally, but the Trojan control program has been quietly started in the background.

According to network security experts, Trojan viruses are mainly classified into information theft and remote control types based on their functions. Criminal gangs will choose Trojan viruses with corresponding functions based on their criminal purposes.

How to determine whether your mobile phone is infected with a Trojan virus?

Has your phone been running slower recently?

Check whether the phone becomes uncontrollable, automatically logs into other interfaces, or automatically opens applications during daily use.

During the use of funds, are there any transaction records without actual operations?

If any of the above situations occurs, be alert to the possibility that your mobile phone may be implanted with a Trojan virus.

Once your phone is infected with a Trojan virus, how can you completely remove it?

According to network security experts, there are three types of treatment methods for Trojan viruses:

The system has a built-in detection function. This function can detect primary Trojan viruses and remove them by simply uninstalling them.

Use professional security software. Professional security software can not only identify Trojan viruses, but also find hidden files left by the program in the operating system.

There is also a type of Trojan virus that is packaged to avoid detection by security software and can only be completely removed by restoring the phone to factory settings.

Mobile phone anti-fraud, but also beware of these "pitfalls"

▲Do not download APPs at will

When using a mobile phone to download an APP, be sure to search in the app store and download it through formal channels. Do not click on unknown links, scan unknown QR codes, or click on unknown APK installation packages.

▲Use NFC function with caution

NFC is a short-range wireless communication technology that allows devices to exchange data within 10 centimeters. In daily life, people can use the NFC function of their mobile phones to make payments.

How do scammers use NFC to defraud money?

Induce victims to download the Uni-pay APP; require victims to log in to their accounts; as long as they log in and use this APP, the victim's mobile phone will become a "POS machine" that can directly swipe cards to receive payments; induce victims to turn on the NFC function of their mobile phones; as long as the victims put the bank card on the back of the phone for sensing, the money in the card will be swiped away.

Keke reminds: Fraudulent methods are emerging in an endless stream, so you should develop good habits in using your mobile phone and surfing the Internet. Do not click on unknown links easily, do not download unofficial applications, and do not disclose personal information at will.

Note: The cover image is a copyrighted image. Reprinting it may cause copyright disputes.

<<:  Why are there "colorful lights" hanging in the fields? It turns out that it is a "trap" set for them...

>>:  A fox is not a raccoon, and an alligator is not a crocodile? How did the ancients name animals?

Recommend

User reading is fragmented, how to improve conversion rate?

According to the research report "Special An...

Event promotion and operation: 8 hot creative forms of H5!

It cannot be denied that, on the basis of guarant...

Why Foxconn, Xiaomi and Huawei are rushing to India

Recently, there was news that Xiaomi has achieved...

How to convert "popularity" into "sales"? Learn these 5 fan marketing skills!

I have been paying attention to a question recent...

Peng Lei: Worried about becoming an Internet antique

On August 27, the Internet Conference was held in...

Event planning and operation skills!

Today I want to talk to you about how to plan an ...

Polymer fluids: Uncovering the amazing science behind everyday products

summary: As a special state of existence of matte...

Can drinking help you sleep? The harm of alcohol to sleep

Many people are used to drinking milk before goin...

Analyze the algorithm mechanism behind Tik Tok!

Understanding the platform rules is the key to pl...