云手机诈骗

Search documents
法治在线丨“男友”给我25万,结局却是我的钱没了?警惕“云手机”骗局
Yang Shi Xin Wen· 2025-08-14 07:17
Core Viewpoint - The Beijing Anti-Fraud Center has issued a warning about new fraud methods using "cloud phones," targeting vulnerable groups such as the elderly through investment traps [1][10]. Group 1: Fraud Mechanism - Fraudsters exploit the virtual nature of cloud phones, which are less likely to raise suspicion, to deceive victims [1][8]. - A victim, Ms. Zhao, was manipulated into using a cloud phone to engage in fraudulent investment activities after being lured by a supposed romantic partner who transferred over 250,000 yuan [2][4]. - The fraud involved pre-installed fake investment apps and niche chat software on the cloud phone, making it easier for the scammers to control the situation [5][8]. Group 2: Victim Experience - Ms. Zhao was convinced to withdraw nearly 200,000 yuan from her savings to purchase supermarket gift cards, which were then used to fund the fraudulent investment platform [4][5]. - After a week of investment, when Ms. Zhao inquired about withdrawing her earnings, the fraudster became unreachable, indicating a classic scam pattern [4][7]. Group 3: Technology Utilization - Cloud phones are a type of cloud service provided by network service providers, allowing for the installation of software and applications without a physical device [5][10]. - The use of cloud phones eliminates complex operations like clicking unfamiliar links or scanning QR codes, which could alert potential victims, thus making the scam more effective [10][12].
警惕!骗子利用“云手机”实施诈骗,北京警方发布预警提示
Xin Jing Bao· 2025-08-13 12:32
Core Insights - Recent incidents in Beijing highlight the rise of scams utilizing "cloud phones," targeting vulnerable groups such as the elderly through investment traps [1][2] - The Beijing Anti-Fraud Center has issued a warning urging citizens to remain vigilant against these new types of scams [1] Group 1: Scam Mechanism - Scammers exploit the virtual nature of cloud phones, which are less likely to raise suspicion, to deceive victims [2] - The cloud phone allows for pre-installed investment software and communication tools, facilitating fraudulent activities without the need for complex software downloads [2] Group 2: Victim Cases - A 70-year-old woman was deceived into investing over 200,000 yuan after being manipulated into believing she was making profitable investments [1] - Another case involved a man who transferred 5,000 yuan under the pretense of investing in international gold stocks, but was saved from further loss due to a family member's intervention [2] Group 3: Police Warnings - Police emphasize that scams often begin with false online friendships, where trust is built before victims are lured into fake investments [2] - Citizens are advised to be particularly cautious of any investment invitations involving cloud phone operations and to report suspicious activities immediately [2]
无需扫码下载、涉诈软件全装好,警惕“云手机”诈骗
Bei Jing Ri Bao Ke Hu Duan· 2025-08-13 00:57
Core Viewpoint - The emergence of "cloud phone" scams represents a new method used by fraudsters to exploit individuals, particularly targeting the elderly who may be less familiar with technology [1][4]. Group 1: Scam Mechanism - Fraudsters utilize "cloud phone" services, which are virtual phone programs that run online, to conduct scams without requiring victims to download any suspicious software [4]. - The scam involves creating a false sense of security by pre-installing fraudulent investment applications and private chat software on the "cloud phone," making it easier for scammers to manipulate victims [4]. - Victims, like Zhao and Zhang, are lured into investing money under the guise of insider trading information, only to find that their funds are unrecoverable once they attempt to withdraw their "earnings" [2][3]. Group 2: Victim Profile - The primary targets of these scams are older individuals who may lack familiarity with mobile technology, making them more susceptible to such fraudulent schemes [1][4]. - Victims often develop trust over extended online interactions, which fraudsters exploit to gain access to their financial resources [2][3]. Group 3: Law Enforcement Response - Authorities, such as the Beijing Anti-Fraud Center, have issued warnings about the rise of "cloud phone" scams and the tactics employed by fraudsters [1][5]. - Law enforcement emphasizes the importance of vigilance when engaging in online interactions, particularly on dating and social networking platforms [6].