It became known that the strategy of development fraudsters is divided into 4 groups 966446 | Voice of tomorrow



[ad_1]

After the arrest of 9 members, including the head of the development fraud ring, their strategy became known. The members of the circle divide into four groups and cheat. At first, the members of the field level took the position of customers in different stores to collect the phone numbers of the customers.

They started cheating by taking pictures of the store’s development transaction book and sending it to the second group. With these numbers, the customer’s money is manipulated by calling the bKash sej store or the sej customer service officer.

The Social Media Crime Investigation Team of the Dhaka Metropolitan Police (DMP) Cybercrime and Special Detective Division arrested nine people, including the head of the Bikash Fraud Circle, in raids in different areas of the capital and Gazipur on Friday (October 18). Saiful Islam (22), Liton Hossain (23), Jubayer Sheikh (22), Golam Kibria Mandal (19), Imran Mollah (23), Shaon Hossain Mandal (18), Minzarul Islam Mollah (25) and Ashraf Mollah were arrested. (26) and Sagar Ahmed (25).

Five mobile phones of different models, 10 SIM cards and a laptop were recovered from them.

Based on the initial questioning of the detainees, DMP (DC) Deputy Commissioner Walid Hossain said that members of the bKash scammers are mainly divided into four groups and carry out fraudulent activities. The first group took a field-level position to develop money in various development shops. At one point, he took a photograph of the developed development book and sent it to the second group on WhatsApp, mentioning the area.

The second group calls the bKash merchant on those numbers to find out if they have received the money sent and if they have collected it. Cheating, it kept saying: ‘Your number has also been blocked along with some numbers due to complaints about sending money from my store to multiple numbers at the same time. They will unlock it by calling from the bKash ‘office.

Soon after, the third group, Bikash, introduced themselves as a customer service manager. By cloning bKash office number through various online applications, the problem cannot be easily understood by the customer. OTP and bKash take a PIN code disguised as different words on the phone. Then the client hacks the bKash account and demands different amounts of money to unlock the account.

The money thus seized is sent to the last, that is, to the fourth group. Those who charge by changing hands make it nearly impossible to pinpoint the location of the scammers.

A case has been filed against those detained at the Ramna Model police station, DC Walid Hossain said.



[ad_2]