Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)
published in(发表于) 2016/4/10 8:07:28
CCTV exposure: 5 minute buy online to thousands of bank card details and passwords

English

中文

CCTV exposure: 5 minute buy online to thousands of bank card details and passwords-bank cards, fishing site-IT news

"Card on the body, money somehow went" a lot of people said it couldn't be done. Guangzhou Mr Wu had also agreed that it was impossible, but this incredible scene just happened to him.

Bank cards 50,000 deposits in the body for a week just 300 yuan

Last December, he received a message from a strange number. Message that says his name, Wu, also is a no deposit number of friends, just click the picture in a message.

Because cell phones did not appear unusual, Mr Wu will not care too much. A week later, banks suddenly sent a consumer messages, there are more than 50,000 yuan a bank card, the balance has left more than 300 yuan.

Mr Wu inquiry found that this week he gradually to transfer money out of your bank card, but consumption more than 10 messages from banks, he never received one. Mr NG customer service check the handset, were told his mobile phone had Trojan horse virus, loses the ability to receive text messages in a week, a week after the failure of Trojans and viruses, SMS functionality is restored.

? Bank card and put it on the money is gone

Mr NG usually not quite 60 years old with a smart phone, cell phone do not have online banking, PayPal and other clients, so even if poisoning by phone, Bank passwords will not leak. And the bank card has been on his own, the password known only to him. He cannot understand: money in the bank card, what's not?

"Whistle-blowers" 5 minute buy online to thousands of bank card password

In the Wu case soon, this reporter received a self-proclaimed Xu whistle-blowers to report. Xu said that in cyberspace, there is a large black of stealing bank cards industry chain. Mr incredible encounters, he's a piece of cake.

"Like old Wu, this information is easy to get in the black market, and it takes me 5 minutes to get 1000 of such information, including cardholder name, card number, ID, phone number, and his banking passwords, 1000 is no problem as long as 5 minutes. ”

▲ Whistle-blowers

In order to verify their own truism, Xu opened few QQ Group, in less than 5 minutes, sent reporters a 33-page document. It recorded more than 1000 pieces of bank card information in the document, each information cardholder name, card number, social security number, Bank reserve phone numbers and banking passwords. Reporter files randomly selected 70 different provinces to verify the information. Among them, the identity and telephone number all right, in addition to 5 banking password error, all of the remaining 65 a bank card password is correct.

Whistle-blowers "Xu" provides information for journalists to see the underground "black" exists. Then, the black market where so many secret bank information is it? In Xu's help, the reporter on the black market for up to 3 months of investigation. Step by step to see the hidden secrets in the dark industry chain.

? Black market secrets

Secrets stolen bank card information three ways

If you want to transfer the money in the bank card, usually one or two can be accomplished by criminals. They need to build a complete industrial chain. Roles in this chain of criminals, usually with only Exchange QQ Group of acquaintances, trading. "Xu" with the help of reporters into the QQ Group, criminals bank card information in the group known as the "material" to collect banking card information is called "cutting people", turning out of the money of bank card called "wash". From "feeding people" buy "stuff" is the first step of the entire crime. So, these "feeding people" "leaks" come from?

? Bank cards stolen brushed dark industry chain

Method one: pseudo-base stations send phishing text messages

Reporters interviewed dozens of stolen bank cards of the victims, found that many people have had the same experience, that received similar 10086, 95533 call messages from telcos or banks, was asked to enter the password after login.

These are actually criminals using the base station "packaging" and send to users with phishing messages. In these phishing sites on fake Web pages, the user will be asked to enter your account number, login password, name, social security number, Bank reserve phone number and other information, and when filling out this information, cheats can be cheated the user money.

It is understood that the phishing site updates very quickly, every 5000 and 8,000 new phishing sites are monitored.

Method two: free WIFI stealing personal information

In addition to using a phishing site to obtain personal information, the reporter found that criminals will take advantage of free WIFI to steal personal information.

Pei Zhiyong introduced a WIFI security mainly depends on who is the erection of it, if a liar or hackers set up a free WIFI, once the user access, all Internet data can be listen by hackers or theft.

Method three: converted POS machine bank card information

? Refit POS machine

In addition to the above two ways of obtaining information, the reporter found that criminals in the black market there is a third way--using converted POS machines to extract user credit card information.

On the black market, POS machines to extract information are called "tracks", quantity is much less than on a phishing site to extract information. But the price is higher, balance of information and even can sell for thousands of dollars a pair.

For such information, criminals often waited for more than half a year before the sale of information, designed to allow consumers to accumulate a large number of POS consumption record so that police will not be able to trace which POS machine bank card information is extracted.

Completed the "cutting" work, in this dark industry chain, the next step is to transfer money out of the bank cards of the victims, criminal procedure known as the "wash". This was the place where many victims wonder--how the hell no my money? Below follows the reporter's investigation and uncover the mystery.

Intercepting SMS verification code at the end of two kinds of methods

QQ Group, there are a lot of people every day "wash the intercepted material" ads. These people are called "washing people", they can transfer money from the victims ' bank cards will appear on the "main" specified in the card number to get 30% to 50% of the Commission. Their main concern is the user text messaging verification code.

? Bank cards stolen brushed dark industry chain

Method one: mobile phone blocking CAPTCHA steal money

Verification code is a user of financial institutions such as changing password, transfer operations, reserved to the user phone number sent one-time passwords, no validation code you will not be able to transfer, and so on. If you want to get code, criminals in the most commonly used method is to target phone sends a Trojan. Article at the beginning of Mr Wu is the victim of cell phone Trojan.

As long as the victims click on the Trojans, mobile phone text messages will be intercepted by criminals. Criminals by master card in advance a primary personal information bank card bound to a third-party payment platform, and then transferred the money. While the victim's phone does not receive consumer reminded or not receive verification code, card money was transferred.

Method two: jamming cell phone signals at close range block code

Mobile phone virus is the most common way of intercepting the verification code, however it is not the only way. Reporters found on the black market, has been without a Trojan virus can intercept the validation code. Their method is through the modification of the special equipment cell phone signal jamming, but this method has a limitation, that is, the device must be in the target phone within one km radius. Therefore, using this kind of interception must be close to the victims.

So, how do criminals target location? "In fact, this is a simple, general approach is to call that goal, says you are delivering a package, you write to this address is not clear, let him repeat the address, as long as he said addresses, we can in a km range interception of his bank card verification code. "Old Xu said.

Found bank cards stolen brush you should do

Frozen cards, preventing losses continue to expand--loss or call customer service through phone bank operation. Most banks have "lost card protection" services, 48 or 72 hours before the loss of fraudulent claims.

Immediately report filing receipts--so that when the banks claim to be saved have been documented.

Collect evidence – the correct way is: to a nearby bank to withdraw immediately, and print documents. Do this to the bank card in your hand, and deals were forged cards elsewhere.


央视曝光:5分钟网上买到上千银行卡详细信息及密码 - 银行卡,钓鱼网站 - IT资讯

“卡在身上,钱莫名其妙地被转走了”,很多人会说这不可能。广州的吴先生原本也认为这不可能,但这匪夷所思的一幕就在他身上发生了。

银行卡在身上5万存款一周只剩300元

去年12月,吴先生收到了一条陌生号码发来的短信。短信上写着自己的名字,吴先生以为是某个没存号码的朋友发来的,就点击了短信中的图片。

由于手机并未出现什么异常,吴先生便没太在意。可一个星期之后,银行突然发来一条消费短信,原本存有5万多块钱的一张银行卡,余额竟然只剩下300多块钱了。

吴先生查询发现,在这一个星期里他的银行卡陆续在往外转钱,但银行发来的十几条消费短信,他一条也没接到。吴先生把手机拿到客服检查,被告知他的手机中了木马病毒,在一个星期内丧失了接收短信的功能,一个星期后木马病毒失效,短信功能才恢复。

▲银行卡在身上钱却没了

60岁的吴先生平常就不太会用智能手机,所以手机中没有网银、支付宝等客户端,所以即便手机中毒,银行密码也不会泄露。而银行卡也一直在他自己身上,密码也只有他自己知道。吴先生百思不得其解:银行卡里的钱,到底是怎么没的呢?

“爆料者”5分钟网上买到上千银行卡密码

就在吴先生案发不久,记者接到了一位自称老徐的爆料人的举报。老徐说,在网络空间存在着一个规模庞大的盗取银行卡的黑色产业链。吴先生匪夷所思的遭遇,在他看来只是小菜一碟。

“像老吴这种信息在黑市里很容易搞到,我用5分钟就能搞到1000个这种信息包括卡主的姓名、卡号、身份证、电话号码,还有他的银行密码,只要5分钟1000个没有问题。”

▲爆料人

为了验证自己所言不虚,老徐打开了几个QQ群,在不到5分钟的时间里,发给了记者一份长达33页的文件。这份文件里记录了1000多条银行卡信息,每条信息都有卡主的姓名、银行卡号、身份证号、银行预留手机号码以及银行密码。记者在文件中随机选取了七十个不同省份的信息进行验证。其中,身份信息和电话号码全部正确,除了5个银行密码错误,其余65个银行卡密码全都正确。

爆料人“老徐”提供的资料让记者看到了这个地下“黑市”的存在。那么,这个黑市中这么多隐秘的银行信息究竟是哪儿来的呢?在老徐的帮助下,记者对这个黑市进行了长达3个多月的调查。一步步看到了这个黑色产业链中隐藏的秘密。

▲黑市秘密

揭秘盗取银行卡信息三大方法

要想把银行卡里的钱转走,通常不是一两个犯罪分子能够完成的。他们需要建立一个完整的产业链条。在这个链条上分工不同的犯罪分子,通常是用只加熟人的QQ群进行交流、交易。在“老徐”的帮助下记者进入了这类QQ群,在群里犯罪分子将银行卡信息称为“料”,搜集银行卡信息的人叫做“下料人”,而把银行卡的钱往外转的人叫做“洗料人”。从“下料人”手里买“料”是整个犯罪的第一步。那么,这些“下料人”的“料”是怎么来的呢?

▲银行卡盗刷黑色产业链

方法一:伪基站发送钓鱼短信

记者采访了数十位盗取银行卡的受害者,发现其中很多人都有过相同的遭遇,就是收到了类似10086、95533等所谓的电信运营商或银行发来的短信,登录后被要求输入密码。

这些其实都是犯罪分子利用伪基站“包装”后发送给用户的含有钓鱼网站的短信。在这些钓鱼网站的虚假网页上,用户登录后就会被要求输入账号、密码、姓名、身份证号、银行预留手机号等信息,而一旦填写了这些信息,骗子就可以把用户的钱骗走了。

据了解,钓鱼网站的更新速度非常快,每天都有5000到8000个新的钓鱼网站被监测到。

方法二:免费WIFI窃取个人信息

除了使用钓鱼网站获取个人信息,记者发现犯罪分子还会利用免费WIFI窃取个人信息。

裴智勇介绍,一个WIFI的安全性主要取决于它的架设者是谁,如果是骗子或者是黑客架设了一个免费WIFI,用户一旦接入,所有互联网的数据都可以被黑客监听或窃取。

方法三:改装POS机提取银行卡信息

▲改装pos机

除了以上两种获取信息的方式,记者发现黑市中的犯罪分子还有第三种方法——那就是利用改装的POS机提取用户银行卡信息。

在黑市中,POS机提取的信息被称为“轨道料”,数量上要远远少于钓鱼网站上提取的信息。但是卖价却很高,余额较大的信息甚至可以卖到几千块钱一条。

而对于这些信息,犯罪分子通常会等半年以上才把信息出售,目的是让消费者积累大量POS机消费记录,这样警方就无法追查是哪台POS机提取了银行卡信息。

完成了“下料”的工作,在这个黑色产业链上,下一步就是将受害者银行卡里的钱转出来,犯罪分子把这个步骤称为“洗料”。这也是很多受害者最疑惑的地方——我的钱究竟是怎么没的?下面就跟随记者的调查,一起揭开这个谜底。

起底拦截短信验证码两种方法

在QQ群中,每天都会有很多人发“洗拦截料”的广告。这些人被称为“洗料人”,他们可以把受害者银行卡里的钱转出到“料主”指定的卡号里,从而获得30%到50%的提成。而他们主要关注的就是用户短信验证码。

▲银行卡盗刷黑色产业链

方法一:让手机中毒拦截验证码盗取钱财

验证码是金融机构在用户进行诸如修改密码、转账等操作时,向用户预留手机号码中发送的一次性的密码,没有验证码则无法进行转账等操作。而要想获取验证码,犯罪分子最常用的手段就是向目标手机里发送木马。文章开头的吴先生就是手机木马的受害者。

只要受害者点击木马程序,手机短信内容就会被犯罪分子拦截。犯罪分子通过事先掌握的银行卡主的个人信息将银行卡绑定在第三方支付平台,然后把钱转走。而此时受害者的手机既收不到消费提醒也收不到验证码,卡里的钱就这样被转走了。

方法二:近距离干扰手机信号拦截验证码

手机病毒是最为常见的拦截验证码方式,然而却不是唯一的方式。记者发现在黑市中,已经有人不需要木马病毒就可以拦截验证码。他们的方法就是通过特殊的改装设备对手机信号进行干扰,但这种方法有一个限制条件,那就是这个设备就必须处在目标手机一公里范围之内。因此,使用这种拦截方式必须要靠近受害者。

那么,犯罪分子要怎么确定目标的位置呢?“其实这个很简单,一般的手法就是给那个目标打电话,说你自己是送快递的,你这个地址写得不是很清楚,让他把地址再说一遍,只要他把地址说出来,我们就能在一公里范围之内拦截他银行卡的验证码。”老徐说。

发现银行卡被盗刷你该这么做

冻结卡片,防止损失继续扩大——拨打客服挂失或者通过手机银行自行操作。多数银行有“失卡保障”服务,在挂失前48或72小时发生的盗刷可赔付。

立即报案,立案回执要保存——这样在向银行主张权利时才有据可查。

留取证据——正确的做法是:立刻到附近银行取现,并打印凭证。这样做是为了证明银行卡在你手中,而其他地方发生的交易均为伪卡。






If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759