Account Breaker Story: Working from a shack, but having a house with a pool, patio everything



[ad_1]

JAKARTA, KOMPAS.com – Investigators from the Cyber ​​Crimes Directorate, Bareskrim Polri, arrested 10 bank account thieves who worked from 2017 to 2020.

It is known that the number of accounts that the suspects broke into was not mitigated, that is, 3,070 accounts with the way to trick the victim into obtaining the one-time password (OTP) code.

The total losses incurred by clients reached Rs 21 billion.

Suspects with the initials AY, YL, GS, K, J, RP, KS, CP, PA and A were arrested in Tulung Selapan, Ogan Komering Ilir, South Sumatra.

Also read: Police: Fraud Syndicate in OTP mode collects crime money in village accounts

However, Chief Inspector General of the Police Public Relations Division (Pol) Argo Yuwono did not specify when the 10 people were arrested.

Chronology of the case

Argo revealed that the case began with the victims’ reports to the Criminal Investigation Unit in June 2020.

“From the public as well as from online banking and transport, losses of around Rs 21 billion were reported,” Argo said at the Bareskrim building in South Jakarta on Monday (May 10, 2020).

After receiving the report, the Cyber ​​Crimes Directorate, Bareskrim Polri formed a team to conduct an investigation.

The investigation led the police to the ten perpetrators who did their dirty work from South Sumatra.

Also read: Prevent banking crime, BRI collaborates with the Attorney General’s Office

“There were ten perpetrators. In the early morning around 04.00 WIB, the perpetrators were arrested and did not take resistance, ”said Argo.

Modus operandi

According to statements by the police, the perpetrators broke into or seized the victim’s account using the OTP code.

The suspects tricked the victim into obtaining the secret code.

“He (the suspects) phoned a bank customer, asked for his password because he was correcting his identity data, repairing the system, etc.,” Argo said.

According to him, a person may not realize that he is being cheated and thus gives the OTP code to the perpetrator.

In fact, after controlling the victim’s account, the suspects transferred the victim’s money to the holding account.

Also Read: Fake Cambodia KTP Package Allegedly Linked To Banking Crimes

Argo said the suspects had many escrow accounts.

The escrow accounts come from residents close to the perpetrator’s domicile.

“Almost one town was asked to open an account. There was a team that was the guide, he was the one who walked, attracting people around him to open an account, for that the retention account was used,” he said. .

Once collected, there are suspects who play a role in withdrawing money from the holding account.

There are also suspects in charge of preparing technological equipment. Meanwhile, the controller of this operation is suspicious AY.

The money that was withdrawn was then distributed to the suspects. The captain or the operations controller gets 40 percent and the rest is the participation of other actors.

Also read: Avoid banking crimes, this is what customers should do

According to police statements, this union operates in a structured manner. They operate from huts in the forest next to their village.

Proceeds of crime

From the information obtained by the investigators, the suspects carried out the action for financial reasons.

Argo said the robbery allegedly carried out by the suspects became his day job.

“The reason is for the economy, but after checking it, it is true that it can improve your life, there is a nice house, you have a car,” said Argo.

In total, according to police, the suspects used the act’s 8 billion rupee money.

Argo said the perpetrator used the money for personal gain, for example to buy a car or build a house.

Also read: Bareskrim arrests 10 suspects in alleged cases of account acquisition through the OTP code

In fact, the police found the attacker’s house that had a swimming pool.

Threat of punishment

In this case, the police also confiscated evidence in the form of a laptop, cell phone, ATM card, passbook, and money.

The authors are trapped by article 30 paragraph 1 of the ITE Law, article 46, paragraph 1 of the ITE Law and article 32, article 48 of the ITE Law and article 363 of the Penal Code.

“This threatens 6 to 10 years in prison,” Argo said.

So far, the police admit that they are still investigating whether there are other suspects in this case.

[ad_2]