There are many such scams.
Money should still be invested in formal banks or securities markets.
Wechat fraud method:
1. Shanzhai WeChat red envelope fraud
WeChat red envelope fraud is one of the most common means of WeChat fraud, and it is also the most gullible user. Invite friends to share and get a big red envelope? ("Congratulations, invite friends to join us. The amount of your red envelope can be variable. If it reaches 100 yuan during the activity time, it can be withdrawn. Don't grab a similar red envelope, my friend. There is no free lunch! Be careful when you receive a WeChat red envelope from a stranger. If you are accidentally trapped, you should immediately shut down the mobile phone network, modify the relevant passwords through other terminals at the first time, and carry out anti-virus operation or reinstall the system as soon as possible.
2. "Like" and "canvassing" fraud
This kind of fraud is the most. A kind of fraud begins with "how many likes are collected, and you can get a gift or discount". When the collection is full of "likes", you find that the reward you get has shrunk. The other is canvassing, which has many evaluations and rankings. . Similarly, children are the most important! Many parents are gullible and even implicate relatives and friends in canvassing. Who knows that all the information in the end is already in someone else's hands! !
3. QR code fraud
Fraudsters use commodities as bait, saying that they will give consumers rebates or be cheap. The QR code sent is actually a Trojan virus. Once installed, Trojans will steal personal information such as application accounts and passwords. Of course, there are many kinds of QR code fraud, so don't scan the QR code easily!
4. Beauty photos are faked
The temptation of beauty is actually a bottomless pit of fraud, so male compatriots must be careful. "Many netizens received strange links from WeChat friends, and lured users to click with words such as' Look at photos of beautiful women' and' There are photos of you in the album'. Hackers stole users' QQ accounts and passwords by forging space.
5. Overseas purchasing fraud
Purchasing fraud has a long history, but there are still friends who will be fooled. Through the "circle of friends" marketing, fraudsters claim that the price is very favorable. After the netizen paid, the swindler asked the netizen to pay the "tariff" on the grounds that the goods were detained by the customs. After the netizen pays, the liar often disappears and the goods are gone.
6. Winning fraud
Criminals pretend to be "Tencent Company", or pretend to be other official accounts, and spread false winning information to commit fraud. If you want to receive the prize, you need to fill in your personal details and pay the relevant fees.
7. Fraudulent dating and information fraud.
Wechat's functions such as "positioning" and "shaking" provide a way for criminals. Liars can pretend to be "Gao Fushuai" or "Bai" and others, strike up a conversation with others, cheat people's trust, and then cheat money on the grounds of borrowing money, tight business funds, surgery, etc. Liars turned WeChat into a fraud platform, using photos of beautiful women as WeChat avatars under the guise of providing "soliciting prostitutes" and "special services" to take advantage of some empty and lonely people.
8. Fake public account fraud
Fraudsters like to fabricate public account names similar to "traffic violation inquiry" on the WeChat platform, which makes you mistakenly think that this is an official WeChat account, and then commit fraud. Be wary of all kinds of public accounts, you can contact the official account for verification, and don't trade at will.
9. Pretending to be a friend for fraud
This is the least defensive, so everyone should pay attention. Fraudsters pretend to be friends, including nicknames and avatars, and then send fraudulent information. Similar cases include: sending a "classmate party photo" and other contacts. After the victim clicks, the mobile phone automatically downloads the Trojan horse, while the scammer easily steals the information in the victim's mobile phone, including the bank card information bound to the mobile phone.