On October 19th, the Chinese Consumers Association (hereinafter referred to as 'China Consumers Association') requested Apple and third-party payment platforms to compensate for the theft of a large number of Apple mobile phone users.
China Consumers Association issued a statement saying that Apple’s statement in the statement that “trying to make a profit by attempting a fraudulent refund has increased”, hacking reasons, and “crashing” means cannot be excused, and should not If you confuse your own problems with attempts to be fraudulent, and ask Apple and third-party payment platforms to have no sufficient evidence to refute them, they should pay full compensation without discrimination.
Regarding consumer rights, China Consumers Association said that operators should provide goods and services, and consumers should be protected from property rights. Whether or not consumers open confidential payments, operators should protect consumer transactions. Not only that, the operator should also make reasonable reminders when the consumer opens the confidential payment, and inform the obligation. After the consumer opens the confidential payment, each transaction should still be confirmed by the consumer. Payment should be limited to exempting the consumer from entering the password. The operator should still fulfill the obligation to prompt the consumer for each transaction, and the consumer can confirm the payment and deduct the transaction.
In addition, China Consumers Association also reminds consumers that consumers have the right to claim compensation from the operator or third-party payment company for the money that has been stolen. If the negotiation fails, the consumer has the right to use legal weapons to protect his legitimate rights and interests. When defending rights through litigation, the operator and the third-party payment company can be regarded as co-defendants.
Recently, many mobile phone users in the country have reported that they have been stolen in Apple's payment. It is estimated that the number of people who have been stolen by the current number has exceeded 700. The large-scale stealing is closely related to the secret payment function of Apple and Alipay. These victims are closely related. Almost all of them were stolen in September. Stolen funds are used to recharge some unnamed games, buy 'equipment', or open some fee-based subscription services, and the total amount of stolen money is from hundreds to 10,000 yuan, and the stolen consumers have used subscription services for confidential or automatic debits.
It is understood that the Apple account must agree to open the 'exempt payment' when opening the Alipay payment function, and the premise that the Apple App Store will open the WeChat payment is also the default to allow the opening of the 'exempt payment function'. In this regard, Apple customer service staff said that It is not clear why it is necessary to force the opening of the confidential payment function. However, Apple staff revealed that the user will provide a percentage of the payment function through the Apple platform, and Apple will prorate it in proportion. The opening of 'free payment' is undoubtedly While increasing the convenience of user consumption, it also brings more divisions to Apple.
After the incident was exposed, Apple made a formal response on October 16. Apple issued a statement saying: 'The first time to organize engineers to find the root cause of the stolen brush incident. ' Apple related person in charge said that various measures are currently taken Protecting users has prevented a significant amount of fraudulent transactions.
The statement said that Apple apologized for the inconvenience caused by phishing scams. Apple's investigation found that a small number of users' accounts were experiencing phishing scams without having double-certified. At the same time, through false and fraudulent refunds. There has been an increase in the number of applications for profit. The company is actively identifying suspicious activity and getting in touch with affected users. It is strongly recommended that all users turn on dual authentication to prevent unauthorized access.