Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)delv
published in(发表于) 2014/1/2 7:51:50
Cell phone rings in the early morning, 5.03 million flies

Cell phone rings in the early morning, 5.03 million fly-Telecom scam-IT Info Cell phone rings in the early morning, 5.03 million flies

Bank card still in the bag, cell phone text message Tip 5.032 million RMB yuan, victimisation alarm query found card cloning fraudulent. Guangzhou police launched the silver interlocking quick search of police freezing mechanism, freezing to keep the victim more than 1.3 million Yuan financial security, and additional funds have been transferred to bank accounts over more than 180 were suspects scattered away.

Recently, the province of Guangzhou smashed this year within the single largest amount of credit card fraud. As of November of this year, Guangzhou has cracked the credit card fraudulent 159 cases were big, crime gangs knocked out 37, and recoup their losses of more than 10 million Yuan for the masses.

Report

Brush 5.032 million stolen, 5-hour police save more than 1.3 million

On April 10, Madam Leung in Hong Kong visitors will be woken SMS alert tone, eyes Misty, and she opened my eyes and took a glance at the mobile, scaring the "free" to sit--received three pieces of information displayed, their name on a piece of a State-owned commercial bank's debit card, just one credit card for three funds, all 5.032 million Yuan.

"Card has been stolen! "Her first reaction, immediately checked his bank card, but found that banking still lay their packages.

Aware of bank card cloning may be fraudulent, she'll call the card customer service center for complete details of the transaction, inform the card to its consumption. Banks immediately told her visiting the Guangzhou Public Security Bureau economic investigation team report as soon as possible. It also for the first time to economic investigation team reflects the situation.

Query quickly by Guangzhou police silver linkage freezing mechanism, Guangzhou police identify brush 5.032 million worth of funds were stolen by criminals through online banking, quick to over more than 180 transfer of funds to a bank account, ready to spread.

Police team up with banks to cooperate, to encircle the transfer of funds, after 5 hours of racing against time and criminal elements "battles", freezing to keep the victim more than 1.3 million dollars for security. Victim Madam Leung also arrived at the gate of the Guangzhou City Public Security Bureau economic investigation team at this time.

Detection

Restaurant consumption card information were recorded on the side

The key tools which is the fraudulent use of POS machine, where can find it through the line break. Task force found the installation of the POS machine, Zhongshan city, a store, the clerk said, "there's no POS machine".

Police find a POS machine is a member of Zhongshan city, a joint-stock commercial bank. It turns out that a staff member of the Bank for personal gain, falsified information, on-line sale of the POS machine. With regard to whom, he don't know, only know each other were used in contact with QQ number and a phone number. But after the incident, the other side immediately deactivate the telephone and POS machines, this clue to this appears to have been interrupted.

Other cases police through the victim's bank card transaction history, identified the locations of stolen information is a restaurant in Shenzhen, row to identify the restaurant had left the Western Guangdong foreign employees of Chen with suspicion. But this time, Chen has disappeared. In early March, victims, Ms Leung had dinner for the staff in this hotel, brush card spending more than 1000 Yuan. While her this card, cash flow remained at 5 million Yuan.

Two clues seem to have broken. Task force again will breakthrough of target aiming POS machine, around crime suspects purchased POS when of features full aspects troubleshooting, from large of network, and more than 180 multiple bank account trading information, and ATM machine trading records, and more than 30 over Bank of monitoring video interception of more than 100 more Zhang suspects screenshots photos than on in the, eventually study out a has Organization, and has premeditated, and personnel numerous of clone bank card stolen brush crime groups.

Modus operandi

Big bank accounts over more than 180 ratings

Today's 20-year old Chen earlier planned to commit crimes. From about 15 years old, he followed fellow engaged in telecommunications fraud, as police intensified, feel the "entrepreneurial difficult" and went into a hidden crime, higher-IQ clone cards. He was not satisfied with "money" acquiring and preparing over-eager, one vote.

"Aniseed" is his. Chen lurks a restaurant in Shenzhen last 3 months, while the victim paying her credit card, not only recorded the card information, Toms also get a bank card password. Back to the Maoming dianbai made cloned bank cards, upon enquiry found card money 5.032 million Yuan.

Then for nearly a month, Chen is to cash in with his work. He had virtual space over the network, from Zhongshan city in the hands of a staff of joint-stock commercial bank to buy a POS machine, using high-tech means to crack bundle fixed-line number move restriction program, Zhongshan POS machines to get home, use of Maoming dianbai.

Chen a bright also mustered brothers fellow "starts": way by he with in Maoming home near of Hill Shang through private pulled phone line connection POS machine and mobile computer Internet; another way sent more than 10 over "rider" sent Guangzhou, and Dongguan, and Zhanjiang, and Yangjiang, and Maoming, to of Bank, prepared through online bank will proceeds dispersed transfers to prior prepared of, and risked with others ID pieces account of more than 180 more Zhang bank card in the for mention now.

The morning of April 10, Chen Gang was started. Them through POS machines in three 5.032 million dollars into your bank account via online banking more than 180 small ranging from the large amounts of money into funds transfers to bank accounts over more than 180 or network pays the valuable account. In just 3 hours, nearly 3.7 million Yuan through bank teller machines.

"Lost 1.3 million dollars! "Chen realized that police had been vigilant and were with their" race to the bottom ", immediately modus used POS machines, computers and cell phones destroy and discard down the mountain pond, scattered with dormant after the split up.

After three months, the Group has arrested 5 suspects. 5 other persons on suspicion of Beijing Telecom fraud, captured by police in Beijing on June 24. At this point, the King clone fraudulent credit card groups all 10 suspects at large.


(

凌晨手机响,503万飞走 - 电信诈骗 - IT资讯
凌晨手机响,503万飞走

银行卡还躺在包里,手机短信却提示已消费503.2万元,事主惊慌中查询发现卡被人克隆盗刷。广州警方启动警银联动快速查询冻结机制,冻结保住事主130多万元资金安全,而另外的资金则早被转移到180多个银行账户,遭嫌疑人分散提走。

近日,广州警方破获这单今年省内单笔金额最大的信用卡诈骗案。今年截止11月份,广州已破获伪卡盗刷大要案件159宗,打掉作案团伙37个,为群众挽回损失1000多万元。

报案

被盗刷503.2万,警方5小时保住130多万

4月10日凌晨3点,身在香港的梁女士睡梦中被手机短信提示音吵醒,睡眼朦胧的她睁开眼瞄了一下手机信息,吓得“腾”地坐了起来——收到的三条信息显示,其名下一张某国有商业银行借记储蓄卡,刚刚被人刷卡消费了三笔资金,共503.2万元人民币。

“卡被偷了!”梁女士第一反应,立即翻查自己的银行卡,但发现银行卡仍躺自己的包里。

意识到银行卡可能被人克隆盗刷,她马上打电话给银行客服中心查询该卡的交易情况,告知该卡非其本人消费。银行立即告知梁女士尽快前往广州市公安局经侦支队报案。该行也第一时间派员向经侦支队反映了情况。

通过广州警银联动快速查询冻结机制,广州警方查明被盗刷的503.2万元资金正在被犯罪分子快速通过网上银行向180多个银行账户转移资金,准备分散提走。

警方立刻与银行密切配合,对转移资金进行围追堵截,经过与犯罪分子争分夺秒的5个小时“保卫战”,冻结保住事主130多万元资金安全。事主梁女士此时也才赶到广州市公安局经侦支队门口。

破案

酒楼消费储蓄卡信息被侧录

该案的关键作案工具就是盗刷所用的POS机,找到它的下落就可以循线突破。专案组找到安装这部POS机的中山市某商店,店员却说,“没POS机”。

警方再找到POS机所属的中山市某股份制商业银行。原来,该银行一名职员为谋取私利,伪造虚假资料,在网上贩卖了该POS机。至于卖给谁,他也不清楚,只知道对方联系用的QQ号和曾经使用的一个电话号码。但案发后,对方立即停用了该电话和POS机,这条线索到此似乎已经中断。

另一路办案民警通过事主银行卡的消费记录,确定了卡被盗取信息的可疑地点是深圳市某酒家,排查出该酒楼已离职的粤西籍员工陈某有重大嫌疑。但此时,陈某已不知去向。3月初,事主梁女士曾在这家酒店宴请员工,刷储蓄卡消费1000余元。而她的这张卡,资金流基本保持在500万元左右。

两条线索似乎都断了。专案组重新将突破的目标瞄准POS机,围绕犯罪嫌疑人购买POS机时的特征全方面排查,从大量的网络、180多个银行账户交易信息、ATM机交易记录,以及30多家银行的监控录像截取的100多张嫌疑人截图照片比对中,最终研判出一个有组织、有预谋、人员众多的克隆银行卡盗刷犯罪团伙。

作案

干票大的180多个银行账户分级提现

如今20岁的陈某亮对作案早有预谋。大约从15岁开始,他就跟随同乡从事电信诈骗活动,随着警方打击力度加大,感觉到“创业艰难”,转而投向更隐蔽、更高智商的克隆卡犯罪。他不满足于“小钱”的猎取,准备放长线钓大鱼,干一票大的。

“大料”被他等到。潜伏深圳某酒家近3个月的陈某,趁事主梁女士刷卡埋单,不仅侧录了该卡信息,还偷瞄得到银行卡密码。回到茂名电白克隆制成银行卡,经查询发现卡内资金有503.2万元。

随后的近一个月,陈某亮都是带着手下进行套现准备工作。他事先通过网络虚拟空间,从中山市某股份制商业银行职员手里购买了POS机,利用高科技手段破解了捆绑固话号码限制移机的程序,将中山的POS机拿到茂名电白老家使用。

陈某亮还纠集兄弟老乡“开工”:一路由他带着在茂名老家附近的山头上通过私拉电话线连接POS机和手提电脑上网;另一路派出十多名“车手”分赴广州、东莞、湛江、阳江、茂名等地的银行,准备通过网上银行将赃款分散转账到事先准备的、冒用他人身份证件开户的180多张银行卡中进行提现。

4月10日凌晨,陈某亮团伙正式开工。他们先通过POS机分三次将503.2万元划到自己掌握的银行账户,再通过网上银行将大额资金分成不等的180多笔小额资金,转账到180多个银行账户或网络支付宝账户。在短短的3个多小时内,通过银行柜员机提现近370万元。

“少了130万元!”陈某亮意识到警方已警觉并正在与自己“赛跑”,立即将作案用POS机、电脑及手机销毁并丢弃到山下的水塘里,在分赃后分散潜伏了起来。

历时三个月,专案组先后抓获5名犯罪嫌疑人。另外5人因涉嫌北京一电信诈骗案,在6月24日被北京警方抓获。至此,这个特大克隆盗刷银行卡团伙10名犯罪嫌疑人全部归案。


)


If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759