{"id":4965,"date":"2023-07-15T16:16:24","date_gmt":"2023-07-15T09:16:24","guid":{"rendered":"https:\/\/chongluadao.vn\/blog\/?p=4965"},"modified":"2023-09-15T13:24:09","modified_gmt":"2023-09-15T06:24:09","slug":"canh-giac-voi-chieu-tro-lua-dao-sau-khi-danh-cap-tai-khoan-mxh","status":"publish","type":"post","link":"https:\/\/chongluadao.vn\/blog\/en\/2023\/07\/canh-giac-voi-chieu-tro-lua-dao-sau-khi-danh-cap-tai-khoan-mxh\/","title":{"rendered":"Be wary of scams after stealing social media accounts"},"content":{"rendered":"<p>According to a report from the Department of Information Security, fraud by stealing Social Network (MXH) accounts and sending fraudulent messages is one of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/chongluadao.vn\/blog\/en\/motsohinhthucluadao\/\" target=\"_blank\">24 most common forms of fraud<\/a>&nbsp;as of the first half of 2023. So how to recognize and avoid this scam? Let&#039;s&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/chongluadao.vn\/blog\/en\/\" target=\"_blank\">Anti-Phishing<\/a>&nbsp;(CL\u0110) learn more through the article below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">I. Current status of tricks to steal social media accounts<\/h2>\n\n\n\n<p>In early 2023, the Cyber Security and High-Tech Crime Prevention Department (ANM&amp;PCTPSDCNC) of Ba Ria-Vung Tau Provincial Police said that recently, in the province there have been a number of cases of subjects impersonating financial assets. Facebook account of a familiar person to commit property appropriation fraud.<\/p>\n\n\n\n<p>Last June, the Criminal Police Department of Da Nang City Police also temporarily detained four subjects to investigate property appropriation fraud. By hacking the Facebook social network accounts of about 500 victims across the country, the subjects then impersonated the victims to fraudulently appropriate a total of nearly 5 billion VND.<\/p>\n\n\n\n<p>This is not a new scam and has been continuously warned by authorities at all levels for many years, but still many people become victims of scams because of their gullibility. Island with an amount of up to hundreds of millions of dong.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"601\" height=\"286\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-44.png\" alt=\"\" class=\"wp-image-4966\" srcset=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-44.png 601w, https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-44-300x143.png 300w, https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-44-18x9.png 18w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">II. Identifying characteristics and fraud tactics<\/h2>\n\n\n\n<p>To be able to take over other people&#039;s social media accounts and defraud the account owner&#039;s relatives, scammers often use the following steps and tricks:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_44a1ba-e8:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_44a1ba-e8 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_44a1ba-e8 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_44a1ba-e8 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items4965_44a1ba-e8 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items4965_44a1ba-e8 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-4965_7c57c5-96 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_7c57c5-96 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_7c57c5-96 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Collect personal information<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_a292ef-64 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_a292ef-64 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_a292ef-64 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Fraudsters often use methods to exploit personal information from different sources.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_caca13-86 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_caca13-86 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_caca13-86 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">This may include collecting names, email addresses, phone numbers and other information through methods such as email or phone phishing or fake websites.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_354151-b7 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_354151-b7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_354151-b7 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Access and take over social media accounts<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_daa2f9-e1 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_daa2f9-e1 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_daa2f9-e1 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">The scammer uses the collected personal information to log into the victim&#039;s social network account.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_0a04d0-6b .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_0a04d0-6b .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_0a04d0-6b kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">They may use fraudulent methods such as deceiving users by sending fake emails, phishing messages or using password-stealing malware.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_5468bf-9e .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_5468bf-9e .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_5468bf-9e kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Change the account information<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_c6d0af-3f .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_c6d0af-3f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_c6d0af-3f kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">When scammers have access to the victim&#039;s social media account, they often change personal information, including name, profile picture, password and email address, to take complete control of the account.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_206f0b-2a .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_206f0b-2a .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_206f0b-2a kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Send phishing messages to your friends list<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_158538-15 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_158538-15 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_158538-15 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">The fraudster uses control of the victim&#039;s account to send fraudulent messages to a list of friends on social networks.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_211b8a-1c .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_211b8a-1c .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_211b8a-1c kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">These messages often contain fundraising content, requests for sponsorship, or requests for sensitive personal information.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_2afec1-14 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_2afec1-14 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_2afec1-14 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Fraud and property appropriation<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_db0ad4-fe .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_db0ad4-fe .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_db0ad4-fe kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Phishing messages may ask the victim&#039;s friends to transfer money, provide bank account information, or reveal other personal information.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_e29c00-38 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_e29c00-38 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_e29c00-38 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Fraudsters will use this information to appropriate assets from the victim&#039;s friend list.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_e931bc-65 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_e931bc-65 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_e931bc-65 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Spreading scams<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_96e310-64 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_96e310-64 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_96e310-64 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">The scammer uses the victim&#039;s social media account to spread fraudulent messages to their friend list.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_75fa8c-f3 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_75fa8c-f3 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_75fa8c-f3 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Messages may contain requests for help, such as needing urgent money, personal information, or participating in attractive investment programs. Fraudsters take advantage of the victim&#039;s trust and personal relationships to defraud and appropriate other people&#039;s property.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_abbd41-52 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_abbd41-52 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_abbd41-52 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Take advantage of hesitation and confusion<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_be09bc-4f .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_be09bc-4f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_be09bc-4f kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">When phishing messages are sent from the victim&#039;s social media account, it can create hesitation and confusion in the minds of their friends.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_2f2c95-b9 .kt-svg-icon-list-single{color:#fd0000 !important;}.kt-svg-icon-list-item-4965_2f2c95-b9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_2f2c95-b9 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Scammers use this emotion to persuade and motivate unsafe or untrustworthy actions on the part of friends, such as transferring money or providing sensitive information.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>There are two easily recognizable characteristics of people who take over other people&#039;s accounts to commit fraud:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_d0b3aa-7a:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_d0b3aa-7a ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_d0b3aa-7a ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_d0b3aa-7a ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items4965_d0b3aa-7a ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items4965_d0b3aa-7a kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-4965_554963-c2 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-4965_554963-c2 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_554963-c2 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Lack of accurate information about the victim<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_c32be9-52 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-4965_c32be9-52 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_c32be9-52 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">In some cases, the scammer may not provide enough information about the victim in the scam message.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_1a8713-b1 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-4965_1a8713-b1 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_1a8713-b1 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">This can cause friends to believe that messages sent from the victim are accurate and of mutual interest, leading to blind trust and taking actions they should not take.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_b53a99-a6 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-4965_b53a99-a6 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_b53a99-a6 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Using unsafe payment methods<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_21bb14-ce .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-4965_21bb14-ce .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_21bb14-ce kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Scammers often request money transfers through unsecured payment methods, including cash transfers, unknown bank transfers, or unverified cryptocurrency services.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_0a96aa-5a .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-4965_0a96aa-5a .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_0a96aa-5a kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">This makes tracking and refunding money difficult and creates favorable conditions for fraudsters to misappropriate assets.<\/span><\/li>\n<\/ul><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-45.png\" alt=\"\" class=\"wp-image-4967\" style=\"width:600px;height:424px\" width=\"600\" height=\"424\" srcset=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-45.png 800w, https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-45-300x212.png 300w, https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-45-768x542.png 768w, https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2023\/07\/image-45-18x12.png 18w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">III. How to prevent property appropriation<\/h2>\n\n\n\n<p>If you are the recipient of a surprising text or email from someone you know, pay attention:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_f13f0f-37:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_f13f0f-37 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_f13f0f-37 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_f13f0f-37 .kb-svg-icon-wrap{color:#20c997;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_f13f0f-37 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items4965_f13f0f-37 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items4965_f13f0f-37 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-4965_f344ba-a5 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_f344ba-a5 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Verify information<\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_868e4f-0e .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_868e4f-0e kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Try contacting them directly through other means (phone, text, email) to verify if the message is from them.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_8ce93b-b4 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_8ce93b-b4 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Do not use contact information provided in suspicious messages for verification.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_fc358e-be .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_fc358e-be kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Reporting and warnings<\/strong> If you notice any signs of fraud<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_a584dd-76 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_a584dd-76 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Please report the affected friend immediately.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_db220e-90 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_db220e-90 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_cornerDownRight kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"15 10 20 15 15 20\"\/><path d=\"M4 4v7a4 4 0 0 0 4 4h12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Report the incident to the social media platform or email service so they can take necessary measures<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>If you are the person whose account has been hijacked and misused, please take the following measures:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_eb71f3-a7:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_eb71f3-a7 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_eb71f3-a7 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items4965_eb71f3-a7 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items4965_eb71f3-a7 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items4965_eb71f3-a7 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-4965_483b17-b7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_483b17-b7 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Immediately change the password of your social network account and use a strong password, including uppercase letters, lowercase letters, numbers and special characters.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_25a748-a9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_25a748-a9 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Report problems via social networks or other contacts such as phone, email.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-4965_a0fbfc-17 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-4965_a0fbfc-17 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M22 11.08V12a10 10 0 1 1-5.93-9.14\"\/><polyline points=\"22 4 12 14.01 9 11.01\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Notify your friends and family about the situation and warn them not to trust or respond to scam messages.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<p>In addition, always stay vigilant and follow basic security measures such as not sharing personal information and passwords with anyone, not clicking on unknown links or suspicious messages, and periodically update security software to avoid security vulnerabilities.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>According to a report from the Department of Information Security, fraud by stealing Social Network (MXH) accounts and sending fraudulent messages is one of the 24 most common forms of fraud as of the first half of 2023. So what to do? How to recognize and avoid scams [...]<span class=\"screen-reader-text\"> from Be wary of scams after stealing social media accounts<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":4851,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-4965","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-chieu-tro-lua-dao-pho-bien"],"_links":{"self":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/4965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/comments?post=4965"}],"version-history":[{"count":2,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/4965\/revisions"}],"predecessor-version":[{"id":5115,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/4965\/revisions\/5115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media\/4851"}],"wp:attachment":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media?parent=4965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/categories?post=4965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/tags?post=4965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}