Shocking! Mobile hotspots have become a new scam den, and you may lose everything if you are not careful!

Shocking! Mobile hotspots have become a new scam den, and you may lose everything if you are not careful!

In today's digital age, mobile phones have become an indispensable part of our lives, and the mobile hotspot function provides us with a convenient way to access the Internet without Wi-Fi. However, you may not know that this seemingly convenient function may be used by criminals as a new means for them to commit fraud. Today, we will unveil the mystery of mobile hotspot fraud and let everyone be vigilant! Protect your property safety!

1. What are the scams using mobile hotspots?

Scam 1: Obtaining a hotspot connection by claiming to recharge phone bills

Scammers will look for targets on the streets or in public places, usually people traveling alone. They will make up various excuses, such as their mobile phone is suspended due to arrears, quarrels with family members, etc., and then ask to borrow your mobile hotspot to recharge the phone bill.

After you turn on the hotspot and tell them the password, the scammers will pretend to recharge on their own phones, but in fact they are using some technical means to obtain personal information in your phone, such as mobile phone number, bank card number , etc. They may even use some malicious software to link your phone with their devices for subsequent fraudulent use.

Scam routine 2: Log in to the account to get the verification code

Scammers will ask to borrow your mobile phone hotspot on the grounds that their mobile phones cannot log in to certain accounts (such as WeChat, Alipay , etc.), and will need you to provide a verification code to help them log in.

If you believe them and provide the verification code, the scammer can use this verification code to log into your account and transfer your funds or obtain your personal privacy information.

Scam routine three: Using hotspot connections to implant malicious programs

This method is more covert. The scammers will prepare some files or links containing malicious programs in advance. When you turn on the hotspot to let them connect, they will trick you into clicking on these files or links .

Once you click, the malicious program will be automatically downloaded to your mobile phone, stealing various information in your mobile phone, including account passwords, address books, photos, etc. , causing you serious losses.

2. How to prevent mobile hotspot fraud?

①Be vigilant and don’t trust strangers easily

When you encounter a stranger asking to borrow a mobile hotspot, be highly vigilant and don't easily believe what they say. If the other party really needs help, you can suggest that they go to a nearby business hall or use public Wi-Fi to operate.

② Protect your personal information and do not provide verification codes at will

Under no circumstances should you provide your verification code, account password or other important information to strangers. The verification code is an important credential to protect the security of your account. Once leaked, it may cause you huge losses.

③Update mobile phone systems and security software regularly

Timely updating of mobile phone systems and security software can fix some known vulnerabilities and improve the security of mobile phones. At the same time, security software can also monitor mobile phones in real time, detect and block the operation of some malicious programs in time.

④ Turn off unnecessary functions

When you are not using your mobile hotspot, it is recommended to turn it off to avoid being exploited by criminals. At the same time, you should also turn off unnecessary functions such as file sharing in your mobile phone to prevent others from accessing your device.

⑤Pay attention to abnormal conditions of the mobile phone

If you find any abnormal situation with your phone after using the mobile hotspot, such as abnormal data consumption, receiving unknown text messages or calls, etc., you should promptly check whether the phone has been implanted with malicious programs and take appropriate measures as soon as possible, such as changing your account password, uninstalling suspicious software, etc.

3. In addition to lending a mobile phone to open a hotspot, you should also pay special attention to the following situations when lending a mobile phone:

① Use WeChat payment code to pay without password

Criminals pretend to borrow the victim's mobile phone to make a call, but actually open the victim's WeChat without the victim's knowledge and use the password-free payment function to make payments.

② Set up call forwarding to the scammer’s phone

The scammer first calls his own mobile phone to obtain the victim's mobile phone number, then pretends that the call is not connected and enters relevant information to activate the call forwarding service. Subsequently, the scammer uses the SMS verification information received by the victim's mobile phone to log in to WeChat, Alipay accounts and mobile banking, and transfer the money away.

③ Impersonate a courier and borrow a mobile phone to obtain a verification code

This type of fraud usually involves the scammers obtaining the victim's bank card password and other information through other means, and only the verification code is missing. Therefore, the scammers pretend to be couriers and use the verification information as an excuse to check the victim's mobile phone text messages and obtain the verification code.

④Use screen recording function to steal payment password

Scammers often pretend to be customers, gain the victim's trust by offering to help them with their business, and then borrow their mobile phones for various reasons. After the victim agrees out of courtesy, the scammer turns on the screen recording function to steal the payment password.

⑤ Implant malicious programs by scanning the QR code to vote

Criminals disguised themselves as part-time college students, asking victims to scan the code to vote, and also gave them small gifts (such as folding fans, tissues, etc.), and staged a "sad drama", claiming that their families were poor, their parents were sick, and they worked to earn tuition. If they failed to complete the task and could not leave work on time, they would even be deducted money. In fact, criminals implanted malicious programs into the victim's mobile phone by scanning the code, obtained information in the mobile phone from the background, and then carried out illegal acts to steal the victim's money.

Nowadays, new scams emerge in an endless stream. We must always be vigilant and improve our awareness of self-prevention to avoid becoming the target of scammers. Only in this way can we protect our property and personal information security while enjoying the convenience brought by mobile phones.

<<:  “Never seen him in Beijing before”, who is this “mysterious guest”?

>>:  What is the nutritional value of the cabbage that people in the north love to stock up on?

Recommend

These 7 steps helped me reach 1 million users in 6 months

Achieve 100,000 users in 6 months I had just arri...

105-year-old IBM is overwhelmed by reform. Can artificial intelligence save it?

Some companies embrace reform, while others are o...

What are the requirements for opening a Baidu framework account?

It is quite troublesome to open a Baidu account n...

Practical example of setting up a bidding OCPC account

Many friends have not tried ocpc yet. In fact, oc...

Chinese scientists discover new cell type, plants can move now!

The world we live in is colorful because of the e...

Rent a server to build a website

Renting a server to build a website. With the rap...

Dr. Mo explains the Apple-Google smartphone war: Both giants face challenges

[[124508]] The American technology blog Re/code w...