Workflow
无需扫码下载、涉诈软件全装好,警惕“云手机”诈骗
Bei Jing Ri Bao Ke Hu Duan·2025-08-13 00:57

Core Viewpoint - The emergence of "cloud phone" scams represents a new method used by fraudsters to exploit individuals, particularly targeting the elderly who may be less familiar with technology [1][4]. Group 1: Scam Mechanism - Fraudsters utilize "cloud phone" services, which are virtual phone programs that run online, to conduct scams without requiring victims to download any suspicious software [4]. - The scam involves creating a false sense of security by pre-installing fraudulent investment applications and private chat software on the "cloud phone," making it easier for scammers to manipulate victims [4]. - Victims, like Zhao and Zhang, are lured into investing money under the guise of insider trading information, only to find that their funds are unrecoverable once they attempt to withdraw their "earnings" [2][3]. Group 2: Victim Profile - The primary targets of these scams are older individuals who may lack familiarity with mobile technology, making them more susceptible to such fraudulent schemes [1][4]. - Victims often develop trust over extended online interactions, which fraudsters exploit to gain access to their financial resources [2][3]. Group 3: Law Enforcement Response - Authorities, such as the Beijing Anti-Fraud Center, have issued warnings about the rise of "cloud phone" scams and the tactics employed by fraudsters [1][5]. - Law enforcement emphasizes the importance of vigilance when engaging in online interactions, particularly on dating and social networking platforms [6].