A gang of Vietnamese people in Cambodia impersonated electricity and tax officials, called people and asked them to 'update information' and then took over their phones and bank accounts.
On January 24, Bac Ninh Provincial Police announced a special project to dismantle a cross-border fraud ring that used high technology to defraud 1,000 billion VND from 13,000 people. Of which, Bac Ninh alone had more than 300 victims, who were defrauded of over 31 billion VND.
Of the 60 people arrested, the investigation agency determined that 42 suspects had sufficient grounds to prosecute for fraud and property appropriation. The main players are: Nguyen Van Manh (36 years old, from Quang Ninh), Do Van Nghia (25 years old, from Bac Giang), Dinh Nhu Quynh (23 years old, from Phu Tho), Nguyen Duc Toan (32 years old, from Hai Phong), Pham Thi Huyen Trang (26 years old, from Hai Phong).
According to initial investigation, this gang operates in Tam Thai Tu area, Ba Vet city, Svay Rieng province, Cambodia. They impersonate district and ward police, or tax, electricity, and education officials to call victims and ask them to update their citizen identification information, submit online school admission applications, have health check-ups, and declare taxes.
When a victim falls into the trap, they take over the phone and steal money from the victim's bank account.
In which, Trang is a senior manager, responsible for building fraud scenarios, training and coaching theScratch 1, Scratch 2, Scratch 3into "a closed circle". According to this group's confession, the scenarios are very suitable for the real situation and the difficulties in solving the problems that people are facing.
In there,Scratch 1will pretend to be a ward police officer and call the victim, informing them of information related to personal identification code, declaration procedures, and data synchronization for citizen identification.
Scratch 2Then they will guide the next procedure. This group will guide the "prey" to carry out procedures related to citizen identification through online public administration applications. When the victim trusts them, they suggest using a mobile phone using the Android operating system to access links impersonating the website of a state agency, and install the fake application. When the user successfully installs it, they take control of the phone.
Scratch 2immediately coordinated withScratch 3to withdraw money from a bank account. The task ofScratch 3At this time, the computer is used to access and control the victim's phone that has been hijacked and then log into the banking application.
Go to the banking application step that requires biometric authentication by face, fingerprint,Scratch 3in cooperation withScratch 2Use appropriate excuses to ask the victim to perform biometric authentication on his own phone.
After many coordinated actions like above, they took all the money in the victim's bank account.
In addition, one of the links in the chain is Manh - the person assigned to recruit and manage human resources. Every day, Manh assigns, takes attendance, repairs and replaces machines for employees. Bonuses are based on weekly revenue, if the target is met, a bonus of 1% is given;Scratch 1, Scratch 2, Scratch 3add up and divide by 3
The group of employees stated that each person when entering the company was registered for a Telegram account to exchange internal information during work. This account was named after a code number specified by the company. Telegram accounts could only be used on computers during working hours at the company, and could not be used on personal phones outside of working hours.
After discovering the crimes, Bac Ninh Provincial Police coordinated with other units to mobilize nearly 200 officers and soldiers to deploy 43 working groups at Moc Bai and Tay Ninh border gates, Tan Son Nhat, Noi Bai and Cat Bi airports and other localities to arrest the suspects.
The case is under further investigation.
TH (according to VnExpress)