Recently, Xiao Pan, a female college student, received a call from a man claiming to be a financial institution. She realized that it was a telecommunications fraud and exposed the man on the spot. After the scammer admitted it, instead of giving up, he asked the girl if she needed a partner. Pan's series of soulful persuasion made the other party speechless: "You lied to me again, and then you couldn't lie to me, which means your IQ is not as high as mine. After all, you don't have money, you don't look good, and your voice is not good, ugh... Let’s do something serious.”
According to Xiao Pan, she had received scam calls before and learned about the scammers’ methods after searching online. So the scammer was more vigilant when he called the second time and was not fooled.
After receiving the call, the other party asked if she had used Jingdong Baitiao. She knew it was a liar as soon as she heard it. The liar knew that his identity had been discovered, so he started chatting and asked if he needed a partner. This resulted in this "soul persuasion".
Extended information
Common telecom fraud methods
1. Pretend to be a public prosecutor and law fraud
Criminals pretend to be "police officers" and "prosecutors" "Judge" and other roles, falsely claiming that the victim is involved in serious crimes such as money laundering and drug trafficking, and inducing the victim to transfer funds to a so-called "safe account" actually held by the scammer. This type of fraud often causes large losses.
2. Impersonating leaders and acquaintance fraud
Criminals obtain the mobile phone numbers and social account passwords of the victim’s relatives and friends through illegal channels, and master the victim’s social relationships, thereby defrauding the victim. People trust them, and then make up excuses such as "urgent need for money in case of accident", "capital turnover", "paying phone bills on behalf of others", etc. to induce the victim to transfer money.
Whenever there are issues such as borrowing or remittance between relatives and friends, you must verify the identity of the other party by calling the other party's commonly used number, or video chat, etc. before making a decision.
3. Pretend to be employees of shopping websites, banks, telecommunications, etc. to commit fraud
Criminals use pseudo base stations, number-changing software and other technologies to send disguised text messages to victims. The perpetrator mistakenly believed that there was a problem with the account or product, and then called as a staff member, used "verification and verification" and other reasons to defraud the verification code and steal money.
Criminals often take advantage of the victim's panic. In order to complete the fraud in a very short time, they often urge the victim to complete the transaction. Be calm and cautious when facing abnormal balance changes, and do not easily share important information such as verification codes with others.
4. Loan and financial scams
This type of scam usually advertises that unsecured loans can be obtained. As long as a certain fee is paid, one can easily obtain a loan, or provide the victim with By providing certain financial management projects with extremely high yields, investors will receive high returns on investment. In the early stages of investment, criminals will receive rebates on time. After further investment, they will lose all their money.
China.com - After being caught in a phone scam, a man asked a girl if he could have a date