Cybercrimes
Have you heard about "Cybercrimes"? Cybercrimes are fraudulent activities committed using computers and communications networks, particularly the Internet. In Malaysia, the average of cybercrime
involves about 16,661 cases and the lost is about RM1.8 billion in 2013. Most of the victims are not realize that they have been involves into this situation which is the nature of this crimes is getting someone to a "new relationship" from Internet with a new "cyber friends". More over it become worst when it becomes to trust their new friends and will gives anything to this particular strangers. In this post, I would like to share with you about some cybercrimes which was reported to Royal Malaysia Police (PDRM) nowadays. Here are some of it;
Parcel Scam
Victims
of parcel scam cases that has been reported will normally get to know the suspects through media social
networks. The suspects will then try to convince the victim that they’ve fall in love
with the victim and intend to send a parcel to the victim as proof of their
love. In that parcel which is consists of handphone, laptop, jewellery, perfumes, flowers and money. Once the parcel is sent, the victim will be contacted by someone claiming
to be a customs officer or courier company, and informed about the parcel’s
arrival. The victim is then ordered to pay tax or insurance because the package
has been found to contain undeclared funds or valuable items. The victim will
also receive calls from locals who state that the clearance money needs to be
paid into a particular account belonging to a local. The victim only realises
the scam after the promised parcel is not received and the syndicate continues
to request money from the victim through a variety of excuses.
Love Scam
The
modus operandi used in this type of fscam is not much different from the parcel
scam. The victim will usually get to know each other and get into a relationship with the suspect
through the internet. The suspects will claim that they want to come to
Malaysia to marry the victim. However, upon arrival the suspect or syndicate
member will call the victim and claim that the suspect has been arrested by the
authorities in an airport. The victim then needs to pay a sum of money to release the
suspect. Once the money had been transfered to third party account, the suspect will gone.
African Scam
Commercial and Internet scams are common and
they are often initiated from outside Malaysia. A particular region may prefer
a certain type of scam more than others. For example, African nationals and syndicates
are found to use the internet frequently, particularly social networks such as
Facebook, Tagged, Twitter and others in order to find and deceive their
victims. They tend to be a lovely person so that the victims will be trust them in order to get their money. If you properly read all the email that they sent to the victims, how they create a word or sentences, you will realize that something will happen somewhere. There are so many grammartical error when you read their sentences. As I can say that, it's all about love!!! The don't care what people said. They are in their own world!
Spoofing
Another regional trend that has been observed tells
us that Taiwanese syndicates will often use a technique called ‘ID spoofing’
for their scams. They will impersonate bank officers, call the victims and
inform them about their outstanding credit card debts. Occasionally, a
syndicate member will also impersonate a police officer and call the victim to
accuse them of involvement in a money laundering case. Interestingly, the
number that appears on the victim’s mobile phone is the actual phone number of
the bank or police. Investigations found that the syndicate members use ‘ID
spoofing’ which allows them to determine the numbers that will be displayed on
the victim’s phone. In such cases, the victim is duped by the call and will
comply with the orders given until they are finally instructed to transfer money
to the syndicate’s account.
E-Banking Fraud
Most of E-Banking fraud casesdue to the negligence of the customer who disclose their personal identification number (PIN) and passwords to a third party. In most cases, the victim receives an SMS alleging that the victim has won a cash prize. To claim the prize, the victim is instructed to open an internet banking account and follow the instruction given by the stranger. This includes disclosing their PIN. A mobile phone syndicate acts as the medium to receive the SMS with the bank's verification code.
Phishing
Phising is a uses of deception to fraudulently aquire sensitive personal information such as account numbers and passwords disguised as an official looking email. - Maybank2U- M2U
ATM Clone Card
ATM Machine
ATM slot card
The components of ATM slot card
The hole which consist of hidden camera- to record the PIN number
An electronic components- USB cable for the purpose of tranfering data from the ATM card
The stranger will take the slot card and after that transfering the data to make a new ATM card and withdraw the money outside from Malaysia without our consent.