Use second-hand transactions to trick buyers into contacting privately and click on false links to make payments, thereby defrauding money
  Beware! Don't fall into the trap of "killing fish plate" on second-hand trading platform

  Reading tips

  In recent years, some criminals have attracted buyers at low prices on second-hand trading platforms, and then tricked the buyers to leave the platform, using the false links they provided to pay and scam money. Because the link page is very similar to the official platform page, it is very confusing, and it is almost difficult for buyers to detect it, and it is easy to fall into the "killing plate" of this kind of online fraud.

  Nowadays, many consumers transfer idle items to others through second-hand trading platforms, so that they can not only be recycled, but also allow themselves to earn some pocket money, but this also allows criminals to smell "business opportunities."

  A reporter from "Workers Daily" recently interviewed and learned that the use of second-hand transactions to trick buyers into contacting privately and clicking on false links to make payments. This kind of online fraud has an exclusive term called "shayupan." It follows the characteristics of Internet fraud and casts the net, consisting of a "captain" who provides technical support and is responsible for money laundering and distribution, a "fisherman" who finds victims and guides payment, and a victim "fish" who buys goods on a second-hand trading platform. "Kill the fish" means the deception is successful.

  Blocked after payment

  On October 15 last year, consumer Xiaoma in Wujin, Changzhou, Jiangsu Province, when buying a camera on a second-hand platform, he encountered a "killing fish plate" and called the police.

  Xiao Ma met a seller selling second-hand cameras on a second-hand trading platform, and the seller suggested WeChat to discuss it in detail. After the price is agreed, the other party sends a payment link. After opening the link, Xiao Ma found that he did indeed pay for the second-hand platform payment page he had previously viewed, so he immediately paid. However, the second after the payment arrived, he found that he had been blocked by the seller.

  The police combed and analyzed the suspect's WeChat and QQ account information, and finally confirmed that Yimou in Hebei had a major suspect. On November 2 last year, the police went to Hebei and successfully arrested the suspect, Yi.

  Yi confessed that he met "online" in a QQ group, and this "online" taught him how to use fake shopping links to make extra money. The two have a clear division of labor. Yi is responsible for finding the target and negotiating the price. "Online" is responsible for sending the false payment link to Yi. After the fraud is successful, each order can be divided into 70%.

  Through the analysis of the content of "Online" chat with Yi and the transfer of money and other information, the police further locked the true identity of the suspect. On November 15 last year, He was arrested at his residence.

  Through in-depth research and judgment on He Mou's social software, the flow of funds in bank accounts, and information flow, the police found that He Mou had more than 10 off-line and peer "captains" in the same role as Yi Mou, one posing as a second-hand shopping Platforms and criminal gangs that make false links to implement online fraud have entered the police's field of vision. In November last year, all members of the gang were arrested by the police.

  At the end of last year, the suspect Yi Mou was arrested by the People's Procuratorate of Wujin District on suspicion of fraud. From December 2, 2019 to January 21 this year, 19 suspects in the entire case were successively submitted for review and arrest.

  How to determine the amount of crime for the "missing" of the victim?

  Ordinary telecommunications network fraud is usually a point-to-point payment method. However, in the "killing fish pan", the victim's money is not directly credited to the defendant's account, but an electronic shopping card on an e-commerce platform is purchased.

  The reporter learned that in the above-mentioned "Kill Fish Pan" case, the link to the phishing website provided by the defendant was very similar to the real second-hand shopping platform website, and it was difficult for the victim to distinguish it. But after clicking to pay, the phishing website will link to a shopping platform through the pre-fetched interface, and the victim's payment will be used to purchase the shopping card of the shopping platform.

  By checking the chat history between the defendant and the victim, the chat history between the scam gang’s online and offline, the hacked victim’s account, and the order of the defendant’s shopping platform account, the undertaking prosecutor verified more than 400 victims. However, since the various social software accounts and shopping platform accounts used by the defendant were purchased "small numbers" and were not real names, a large number of victims' information could not be accurately verified.

  In the case that the victim is "missing", can the transfer records between the defendants in this case still be recognized as the criminal amount?

  The undertaking prosecutor told reporters that the defendant’s account was indeed fraudulent, the e-commerce platform’s account order was indeed paid for by others, and other economic transactions on and off the line were excluded through the evidence of the whole case, and reasonable suspicion was ruled out. Victim statements, transaction records, electronic data, etc. are sufficient to prove the exclusivity of the "illegal source". Therefore, the undertaker finally determined the online and offline transfer records as the criminal amount, and the total amount involved in the case amounted to more than 1 million yuan.

  Leaving the formal platform is easy to step on "thunder"

  New types of telecommunications network fraud emerge in an endless stream, and there are so many "routines" that people can hardly prevent.

  According to the Blue Book of the Rule of Law in 2020, telecommunications network fraud is still showing a high incidence, and the mode of operation is showing a more obvious trend of professionalization and groupization. Criminal methods are becoming more and more intelligent, and telecommunications network fraud criminal groups have gradually formed malicious The complete chain of upstream and downstream links such as registration, drainage, fraud, and money laundering has also formed a "new paradigm" of telecommunications network fraud.

  In the case of telecommunications network fraud handled by the People’s Procuratorate of Wujin District, in addition to the "killing fish plate" used for fraud through low-priced second-hand transactions, there are also the establishment of a "killing pig plate" in the name of investment and financial management to implement fraud and use the Internet to scan orders Cash back to implement fraud, use naked chat as a bait to obtain user information illegally through APP software to implement fraud or extortion, implement fraud on dating websites, implement fraud on dating websites, and set up various names to require deposits to implement fraud based on loan processing.

  According to reports, the victims of these telecommunications network scams are widespread and the means of committing crimes are more concealed. Criminals often lurking in major forums, post bars and shopping platforms, first looking for "prey" on formal platforms, and then inducing victims to leave the platform and switch to On WeChat or QQ, click on the "high imitation" website link provided by them to trade.

  For this reason, experts reminded that whether it is online shopping or online dating, you must choose a formal platform and use the communication system provided by the platform to communicate and trade. Anything that bypasses the unknown APP software or website links provided by strangers on the platform, QR code, don’t click to download and register easily. At the same time, major e-commerce platforms should also strengthen network security, effectively prompt and block off-site phishing websites, strengthen technology upgrades, and prevent criminals from grabbing links to create "high imitation" websites. Suspicious illegal information should be blocked or blocked, etc. , Maintain the security of the network environment from the source.

Wang Wei