Chapter 459 A Business Derived from a Computer Virus



This thing will gradually extract all of a user's information, and if they have online banking, they can transfer money directly without going through an encryption shield.

This is why we often hear stories of people losing money simply by clicking on a link without doing anything.

Of course, not everyone encounters this situation. More often, attackers will monitor your every move, obtain all customer personal information, and then resell it to certain illegal organizations or illegal profit-making entities.

Those in the know can easily identify these malicious websites. Just look at the URL on the webpage. If it starts with "http", then you can browse it with confidence. But if it's "https"? My advice is to be careful, close your browser, and don't get any ideas.

Scam links are everywhere and have been around for many years. For example, I encountered them on QQ or WeChat back then. I would inexplicably receive a shared online document from a stranger with the content "XXX-XXX" that was meant to attract you, etc.

Also, your WeChat or QQ friends might send you a link that says something like "Xiao Li, Xiao Qian, Xiao Hong, 21 years old, 36G cup, 199 for a one-stop service."

Click the link to see real-life photos.

Alternatively, you can click on the link and forward it to 10 groups to receive a 100 yuan cash bonus, etc.

If you see these messages from your close friends, okay, they've already fallen for it before you; someone has impersonated them to send you messages.

As for me, I'm a poor guy with nothing to my name and no money in the bank, so why would I be afraid of getting poisoned?

It doesn't matter if you don't have money; most people are the same. He only needs to steal one piece of information out of thousands, and that's enough to live on for many years.

Furthermore, they will package your information into several pieces of information and sell them for hundreds of dollars. In short, your IP address and your phone number will be used as selling points, and you never know when they might need to use them.

In the early years, when credit cards were first introduced, they were linked to business, which meant using stolen identity information to apply for credit cards.

Even hundreds of thousands of pieces of information may not necessarily lead to the theft of ID cards, but some computers often contain ID photos.

In this way, they would print out the documents, paste them on paper, find a reputable company to process fake supporting documents, and then have the colluded business partners submit them.

Once the risk control review is complete, if it goes through, you'll make a profit; if it doesn't, there's no real loss. There's always a slight chance of it being approved.

They all have a set procedure for opening a card.

Later, they went even further, hiring an agent to invest in and start a company for him.

Those who switch to other sales channels might be selling pig feed, cosmetics, laundry detergent, or something similar.

They exploited the mobility of sales staff to process credit card applications.

How does it work? They come to you for recruitment, and when you're onboarding, you need a copy of your ID card, right?

The official explanation is that interns need to have their files created and their information updated.

That's how you get your home address, phone number, and even information about your parents and relatives.

They would leave the card collection address with the company, and basically 70% of the cards worth three to eight thousand yuan were approved.

This is a business strategy that evolved from a computer virus.

Of course, banks weren't so reckless when issuing cards later on. With comprehensive data, they could control the risk by comparing genuine and fake cards.

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List