Who would study psychology if they didn't have some kind of problem?

Chapter 505 Never try to understand others based on your own thoughts.

Chapter 505 Never try to understand others based on your own thoughts.
It's true that more aggressive language is more likely to attract attention.

Finally, these students were able to escape a somewhat "quiet" atmosphere; it wasn't easy.

Nan Zhuren smiled and explained, "I wasn't insulting anyone; I was just stating a fact."

"I'm not saying that fraud gangs are heinous, morally bankrupt, and utterly despicable, and that they don't even deserve to be human—although that's certainly true of them."

Laughter began to erupt from among the students.

Nan Zhuren didn't offer much explanation, but instead turned around and started playing the PowerPoint presentation.

Today he did not use the verbatim transcript format as before, because today it was no longer necessary to analyze every word to uncover the scammer's tactics to lure the victim into the trap.

There's no need to analyze the underlying psychological principles.

Moreover, the previous format was chosen primarily to focus students' attention; while the case Nan Zhuren chose today, even in its simplest form, is enough to grab attention.

"In the case materials presented below, I have used a pseudonym. The victim is 'Ms. D'."

As he spoke, Nan Zhuren pressed the laser pointer—

In June 2017, Ms. D was contacted by an online shopping customer service representative posing as a criminal while making an online purchase. The criminal claimed that Ms. D had left a negative review for the latest product. After negotiation, the fake customer service representative offered to "guarantee the goods and compensate" her, promising a full refund without requiring a return of the item...

Upon seeing this, some students' spirits, which had just lifted slightly, began to wane again.

Online shopping scams and fake order scams have been mentioned countless times in various advertisements. Even if you are scammed, it's probably only a few dozen yuan, which is not a big deal.

Only a few students with relatively strong curiosity were still looking at the PPT. They found that the case presented by Nan Zhuren seemed to be more detailed than the usual cases and more interesting than the usual warning cases.

They usually only know that they might be scammed in this situation, but they don't know exactly how they were scammed.

Nan Zhuren glanced at the students' reactions and knew that the beginning of this case was relatively uninteresting, so he started reading aloud.

The deep, steady voice seemed to have a penetrating power, forcibly squeezing into the ears of some students who were too lazy to listen.

After the negotiations concluded, the scammers sent Ms. D a "link to edit the comment." Upon clicking the link, Ms. D was redirected to the login page of the online shopping platform she was using.

The interface indicated that Ms. D needed to log in to her account again. Ms. D usually used her QQ account to log in to the platform with one click. After discovering that the "one-click login" function was not working, Ms. D entered her QQ account and password in the username and password fields.

[Subsequent technical analysis revealed that the "login page" was a forgery by criminals; all links and buttons were merely images, and only the "Account Input," "Password Input," and "Login" sections were functional.]

Some students' expressions changed; they had initially thought it was a sophisticated scam involving clicking a link to implant a Trojan virus.

Now it seems... a bit mind-bending?
Other students were struck by the images in their minds because they had indeed encountered similar scenarios—clicking a link and being redirected to a login page, where they had to re-enter their username and password.

This kind of operation seems commonplace in daily life, which means that criminals are less vigilant when they use this method to scam people. [After entering her account and password, Ms. D was redirected to a page that took a full minute to load. The criminals used this minute to log into Ms. D's QQ account and verify the authenticity of her account and password.]

Some students exclaimed in surprise that the methods behind this were quite sophisticated.

Everyone's used to network lag, so they don't panic when it happens. Who knew criminals would use this brief "lag" to verify accounts and passwords?
Some students had initially thought that if they entered the wrong account and password, they wouldn't be scammed, but now their expressions turned conflicted.

Some students started whispering among themselves, wondering if the next step after stealing the QQ account would be to use the victim to send fraudulent messages to their friends.

After stealing the QQ account, the fraud gang immediately logged into the user's online photo album, copied all private information, and gained access to join the user's main chat groups. Ms. D discovered the unauthorized login to her QQ account in the backend and immediately changed her password, but it was too late.

Criminals used Ms. D's personal photos and selfies to create a large number of obscene images and videos for blackmail.

During the extortion, the criminals repeatedly reassured the victim, saying they "only want money, not life." Ms. D was subsequently guided by the criminals to transfer a total of over 24 yuan, including her bank balance and online loans, to the criminal gang's account.

The rustling from below the stage grew louder, and the girls, feeling the same way, began to whisper amongst themselves, their expressions turning indignant.

Some students looked incredulous, as it was the first time they had heard that this method of "photoshopping fake photos and videos to blackmail" actually existed.

Their discussion was occasionally punctuated by bursts of laughter.

They thought the incident was over.

But it's not over yet.

Two hours later, the criminals had obtained all of Ms. D's assets. After realizing they couldn't gain anything more, they used the pretense of "making the most of what they had" to distribute forged images and videos in large groups Ms. D belonged to, including work groups, study groups, hobby groups, and family groups.

[Subsequently, Ms. D jumped from the building and died despite attempts to resuscitate her.]

The occasional bursts of laughter from the audience subsided.

The students who were still discussing the matter fell completely silent.

Regardless of their thoughts or ideas, everyone chose to remain silent upon hearing the news of the sudden death.

After a long silence, Nan Zhuren slowly spoke: "The more painful the tragedies of the past, the more we must learn from them and draw lessons from them."

“In this case, the first point,” Nan Zhuren held up one finger, “is naturally to present the details of the crime to everyone. When faced with unfamiliar links and unfamiliar login pages, what you may encounter is not a Trojan virus, but a carefully designed disguise.”

“Secondly,” Nan Zhuren held up a second finger, then tapped his head, “that is, when dealing with criminals, never regard them as ‘people’.”

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like