The Simba fake bird's nest incident has recently become the focus of attention in the live streaming industry. Some criminals pretended to be Simba customer service personnel to commit fraud. According to the victim’s disclosure, as of December 11, there were as many as 53 “victims” participating in the spontaneously formed “victims’ WeChat group”. Because the other party can tell accurate shopping information, it can gain the victim's trust. The victim followed the other party's instructions and was defrauded of thousands to hundreds of thousands of dollars by transferring money. ?
Nowadays, there are many telecommunications frauds. Some of these cases involve consumers being deceived due to illegal leakage of information after online shopping, resulting in heavy losses. In the "Simba Customer Service" form of fraud exposed by the media, the tactics are not new. They mainly use accurate information about consumers' shopping information to deceive their trust, and then use the excuse that the product has problems and requires a refund. Inducing consumers to make online transfers and loans to defraud money.
It can be seen that in the "Simba Customer Service" online fraud case, the key is that the scammer obtained the consumer's shopping information, including accurate information such as purchase time, items, address and order number. Only after gaining the trust of consumers and mistakenly thinking that it is really "Simba Customer Service" will they transfer money according to the instructions of the scammer. Therefore, the focus of the investigation of this case is to find out which link went wrong and who leaked the shopping information of Simba fans, allowing telecom fraud criminals to obtain the information, resulting in many consumers being deceived and suffering huge losses. .
Judging from past telecom fraud cases, criminals illegally obtain user information, mainly through purchasing through black and gray product chains, which are large and cheap, while black and gray product chains illegally steal , internal and external collusion, hacker stuffing, Trojans and other methods to obtain a large amount of data from platforms, merchants, express companies, etc., then classify and process it, and sell it to "customers" with different needs. Obviously, the source of relevant information for this "Simba Customer Service" telecom fraud case should be similar. The problem lies in those key links. The police can trace the source and find out which link was leaked.