Reported Victims: 0
Scammed Amount: RM 0.00
The number of victims and total scammed amount shown here are based on voluntary submissions from users. These figures do not represent the actual or complete number of victims or losses.
Case Ticket #1002
Known Scammer Information
Phone Numbers Used:
Aliases / Names Used:
Scammer Tactics – Detailed Analysis
Professional-looking ad bait & phone outreach
- Runs Facebook/Instagram ads with very low prices to attract clicks and shares.
- Calls potential victims to “explain ordering process”, creating a human connection and authority.
Forced app-download flow (primary attack vector)
- Victim is instructed to download a vendor “ordering app” (often via a direct link, sideload, or fake app store page).
- The app is malicious: requests excessive permissions (Accessibility, SMS, device admin) enabling remote control, key-logging, or SMS interception.
Social engineering + permission escalation
- Call/agent coaches the victim step-by-step to grant permissions and enter details, so victim believes actions are legitimate.
- May request OTP codes or to “confirm” banking details under pretext of activating service.
Phone takeover & silent fund transfer
- Malicious app or remote-control tool can read SMS OTPs, perform overlay attacks, or operate banking apps silently to transfer money out.
- Victim may not notice until funds are gone.
Fake verification & urgency
- Uses urgency (limited-time price, must confirm order) to lower victim suspicion and speed up the flow.
- May instruct victims to disable security prompts or install helper apps.
Ad realism & trust-building
- Page looks real (likes, posts, menu photos). Immediate WhatsApp/phone contact makes it feel official.
- Live call + guided steps create false confidence; victims think they’re interacting with a legitimate service.
Evasion & persistence
- Pages, phone numbers, and app links can be removed or changed quickly; attackers repost new ads under different names.
- Uses unidentified payment routes so tracing is hard if money is transferred.
Why it’s hard to detect
- The combination of a live phone call, guided app installation, and convincing ad content makes the supply chain seem authentic — victims trust the process and follow instructions, which lets attackers gain device-level access.
Taktik Penipu – Analisis Terperinci
Iklan umpan & panggilan untuk tarik kepercayaan
- Menjalankan iklan Facebook/Instagram dengan harga sangat murah untuk menarik perhatian.
- Menelefon mangsa untuk “terangkan cara membuat pesanan”, mewujudkan hubungan dan rasa percaya.
Arus muat turun aplikasi sebagai vektor serangan utama
- Mangsa diarahkan memuat turun “aplikasi” pesanan (pautan langsung, sideload, atau halaman palsu di stor aplikasi).
- Aplikasi itu berniat jahat: memohon kebenaran berlebihan (Accessibility, SMS, device admin) yang membolehkan kawalan jauh, pemantauan papan kekunci atau penyulitan SMS.
Sosial-engineering & eskalasi kebenaran
- Ejen membimbing mangsa langkah demi langkah untuk beri kebenaran dan masukkan maklumat, menyebabkan mangsa percayakan proses.
- Mungkin meminta kod OTP atau “sahkan” butiran bank atas alasan pengaktifan perkhidmatan.
Pengambilalihan telefon & pemindahan dana senyap
- Aplikasi/alat kawalan jauh boleh baca SMS OTP, melakukan overlay untuk mencuri data, atau mengendalikan aplikasi bank untuk memindah dana.
- Mangsa mungkin tidak sedar sehingga wang hilang.
Tekanan masa & pengesahan palsu
- Menggunakan rasa mendesak (tawaran terhad) untuk melemahkan kecurigaan.
- Mengarahkan mangsa matikan fungsi keselamatan atau pasang aplikasi bantuan.
Iklan realistik & bina kepercayaan
- Halaman nampak legit (likes, gambar menu). Hubungan WhatsApp/panggilan segera buat proses tampak rasmi.
- Panggilan pandu langkah buat mangsa yakin, lalu beri kebenaran pada peranti.
Pengelakan & kelangsungan
- Halaman, nombor dan pautan aplikasi boleh dipadam atau ditukar; penipu buka semula iklan bawah nama lain.
- Saluran pembayaran tidak jelas buat susur wang sukar dijejak.
Mengapa sukar dikesan
- Gabungan panggilan langsung, muat turun berpanduan, dan iklan meyakinkan menjadikan proses nampak sah — mangsa patuh arahan dan penipu dapat akses ke peranti.
诈骗手法 – 详细分析
伪装广告与电话联络建立信任
- 在 Facebook/Instagram 投放低价诱饵广告,吸引点击与关注。
- 通过电话或即时通话主动联系,声称要“教你下单”,以真人沟通建立信任感。
引导下载为主要攻击载体
- 受害者被要求下载“订餐 App”(可能是直接链接、侧载或假的应用商店页面)。
- 这些应用带有恶意:请求过度权限(无障碍、短信、设备管理等),允许远程控制、键盘记录或短信拦截。
社会工程与权限升级
- 诈骗者边打电话边指导受害者逐步开启权限并输入资料,使受害者认为这些操作是合理且必须的。
- 可能会要求输入 OTP 或“确认”银行信息,借口是激活或验证服务。
手机被接管与静默转账
- 恶意 App 或远程控制软件可读取短信 OTP、进行覆盖攻击,或在受害者不知情下操作银行 App 转账。
- 常见受害者直到资金被转走才发现异常。
制造紧迫感与伪造验证
- 利用限时优惠或必须立即确认的说法,降低受害者怀疑并加快流程。
- 指示受害者关闭安全提示或安装辅助型应用(以便进一步控制)。
广告真实度与信任构建
- 页面内容、点赞数、菜单照片营造真实感;电话+逐步指导让人信任流程。
- 线下电话配合线上步骤,使诈骗链看起来像正规服务。
规避查处与持续作案
- 页面、电话号码与应用链接可快速更换;举报后攻击者会重开新页面或换账号继续行骗。
- 资金路径不透明,汇款或被盗走后追款困难。
为何难以识别
- 真实广告 + 人工实时指导 + 伪造的流程,造成受害者信以为真,从而按步骤执行,给攻击者以设备控制权。
Scam Evidences
Disclaimer:
The videos, images, and audio presented here are part of scam evidence collected. Some content may show personal details or images misused by the scammer. If you believe any content infringes your rights, please contact us and we will promptly remove it.