User Damage Prevention Guide
You can keep your phone safe.
You can keep your phone safe by installing an antivirus and scanning it regularly.
Basic safety rules for keeping your phone safe
-
Installing an antivirus,
regular scanning Keep your antivirus up to date.
Scan for viruses regularly. -
Open trusted texts and
emails only. Do not access links in text messages
or emails from unknown senders. -
Download apps only from
official markets. Download apps only from
the U+ Store or Google Play Store. -
Keep the default operating
system (OS). Do not modify the default OS
provided by the phone manufacturer. -
Caution for
wireless functions Connect Bluetooth only when needed.
Avoid unsecured Wi-Fi. -
Virus scan for apps Open the downloaded app
after scanning for viruses.
Tips for safer use
-
Change your passwords regularly, and constantly use the lock screen.
-
Avoid unsecured Wi-Fi.
-
Erase all your personal information before switching to a new phone.
Guide to installing a free antivirus for your phone
Search for a vaccine on the U+ Store or other mobile phone markets to download it for free.
-
Install ALYac on Android.
-
Install V3 Mobile
Scan for viruses on your phone regularly.
- You can monitor, diagnose, or remove malicious code in real time.
What is spamming?
Spamming means sending unsolicited bulk messages or voice calls to an unspecified number of people, mostly for commercial purposes.
* Spam is always unrequested. The Individual recipient must be discreet and take proper actions.
Block spam messages and calls
- Information on subscribing to the free spam-blocking service provided by U+
- The spam-filtering service is a free additional service to update and block spam and unsolicited messages reported to the Korea Internet & Security Agency (KISA),
such as gambling, pornography, and illegal loan offers.
- How to use: LG U+ website ¡æ Product service ¡æ Additional service for mobile phones ¡æ Call/message ¡æ Blocking spam or customer service (dial 114 on a mobile phone)
- The spam-filtering service is a free additional service to update and block spam and unsolicited messages reported to the Korea Internet & Security Agency (KISA),
- Using the ¡°Register a spam number and phrase¡± function
-
Registering a spam number
-
Register a spam phrase
-
Block commercial messages on 019-114
- Commercial and information messages are sent only when individuals consent to receive a commercial message. If they do not want to receive them, they can call the 114 Customer Center to withdraw consent for commercial messages.
* Essential information, such as service change notification, emergency error notification, emergency alerts, and safety tips, will be sent even if you opt out.
How to report spam
- Long-press a spam message on the phone screen, which will automatically be reported to 118 Call Center by the KISA Spam Response Center.
Spam Response Center | Korea Spam Response Center (http://www.spamcop.or.kr) |
---|
What is smishing?
Smishing is a portmanteau of ¡°SMS,¡± meaning message, and ¡°phishing.¡± It involves free coupons, a first birthday party invitation, a mobile wedding invitation, etc.
If you click the address link in the message, malicious code is created on your mobile phone. It can cause financial damage and
personal/financial information leakage, leading to further damage.
* The variant malicious code used for smishing not only steals micro payment verification numbers. Recently, contacts, photos (copies of resident registration cards and security cards),
joint certificates, and even personal information stored in the user¡¯s smartphone have been targeted, potentially causing greater financial damage.
Example of smishing messages

- ½º¹Ì½Ì ¹®ÀÚ ¿¹½Ã À̹ÌÁö : [À¥¹ß½Å][CJ´ëÇÑ/Åë¿î]°í°´´ÔÅùè/ÁÖ¼ÒºÒ¸í»óÅÂÀÔ´Ï´ÙÁ¤È®ÇÑÁÖ¼ÒÀÔ·Â,(¸µÅ©)
- ½º¹Ì½Ì ¹®ÀÚ ¿¹½Ã À̹ÌÁö : 9/23Àϵî±â¼ÒÆ÷Àü´ÞºÒ°¡(ÁÖ¼ÒÁöºÒ»ó)»óÅÂÀÔ´Ï´Ù.½º¸¶Æ®È®Àοä¸Á(¸µÅ©)
- ½º¹Ì½Ì ¹®ÀÚ ¿¹½Ã À̹ÌÁö : Åä¿äÀϰáÈ¥½ÄÀØÁö¸»°íÃູÇÏ·¯¿ÍÁÖ¼¼¿ä¿þµùø(¸µÅ©)
How to prevent damage
- Avoid clicking the address in messages from unknown senders.
- Even if the caller is identified, try double-checking by calling.
- Increase cell phone security to avoid unverified apps.
How to increase security: Setting ¡æ Security ¡æ Device Management ¡æ Unselect Unknown Sources - Install an antivirus on your phone and update it regularly.
- Download apps from an authorized open market.
Measures
- In the case of financial damage
- - Report to a financial institution¡¯s customer center.
- - Submit the Incident Confirmation issued by the police to the relevant business operators, such as mobile carriers, game companies, and payment agencies.
- - Delete the APK malicious file on your phone.
* If the malicious file is not deleted, ask for help at the service center.
- If no financial damage has occurred
- - Use preventive services provided by the mobile carrier.
What is phishing?
Phishing is a portmanteau of ¡°private data¡± and ¡°fishing.¡±
It is a new type of cybercrime using spam messages, impersonating a financial institution to cause financial damage.
* Case: This was a URL sent to an email titled ¡°Credit card transaction history for September.¡± The link connected a user to a fake bank site to enter all security card numbers,
resulting in unauthorized transfer.
Preventive measures
- Use a onetime password (OTP) and security token (password copy protection).
- Immediately delete emails from unknown sources or different email addresses from those of financial institutions.
* If an email attachment has a compressed file with an extension such as .exe, .bat, .scr, etc., do not open or download it. - Do not enter the entire security code card numbers.
- Check whether the link is correct.
* The fake website is similar to that of the original one, but there is a difference in the character string order and insertion of special characters.
<First prevention by checking the URL,
second prevention by identifying the green address bar and yellow lock>

Measures
- In the case of financial damage
-
- Damage relief: After requesting to stop the payment through the 112 or financial institution¡¯s customer center, submit a request for a refund of the damage by submitting
the Incident Confirmation issued by the police to the relevant bank.
* Refund process (Special Act on the Prevention of Loss Caused by Telecommunications-based Financial Fraud and Refund for Loss)-
Step 1Requesting a suspension of payment
- An individual calls 112 or the financial institution¡¯s customer center to request payment suspension.
- Suspension of payment by the bank Submit the
Incident Confirmation provided by the police.
-
Step 2Extinguishment of claims of the account holder
- by the Financial Supervisory Service
- Public announcement of commencement of extinguishment of claims of the account holder
- The claims are extinguished after two months of the announcement.
* The account holder can file an objection before it reaches two months.
-
Step 3Refund for victims
- by the Financial Supervisory Service
- The Financial Supervisory Service determines the
refund amount within 14 days after the account
holder¡¯s claims are extinguished and informs the
victim¡¯s financial institution. - The financial institution pays damages.
-
- - Report fake websites that conduct phishing to KISA at (http://www.boho.or.kr ).
-
- If no financial damage has occurred
- - Delete received emails.
- - Change the entered financial data via the relevant financial institution.
- - Use an OTP.
What is pharming?
This is a scam that steals financial data by manipulating website traffic, where malicious code is created. If a computer is infected by malicious code,
it connects to a phishing (fake) website even after accessing an original website. Then, it steals financial data and transfers them to
a fake bank account used for crime.
* (Phishing website) This is shown as an original website such as http://*Kb*bank.com, asking for financial data (e.g., security card numbers) to be entered. It¡¯s a new type of financial fraud.
* Case: Financial data were stolen from 184 victims by the pharming scheme. Financial certificates were reissued, and KRW 1.3 billion was transferred without permission.
Preventive measures
- Use an OTP and security token (password copy protection).
- Immediately delete emails from unknown sources or different email addresses from those of financial institutions.
* If an email attachment has a compressed file with an extension such as .exe, .bat, .scr, etc., do not open or download it. - Do not enter the entire security code card numbers.
- Check whether the link is correct.
* The fake website is similar to that of the original one, but there is a difference in the character string order and insertion of special characters.
<First prevention by checking the URL, second prevention by identifying the green address bar and yellow lock>

Measures
- In the case of financial damage
- - Damage relief: After requesting to stop the payment through the 112 or financial institution¡¯s customer center, submit a request for a refund of the damage by submitting the Incident
Confirmation issued by the police to the relevant bank.
* Refund process (Special Act on the Prevention of Loss Caused by Telecommunications-Based Financial Fraud and Refund for Loss)-
Step 1Requesting a suspension of payment
- An individual calls 112 or the financial institution¡¯s customer center to request payment suspension.
- Suspension of payment by the bank Submit the Incident Confirmation provided by the police.
-
Step 2Extinguishment of claims of the account holder
- by the Financial Supervisory Service
- Public announcement of commencement of extinguishment of claims of the account holder
- The claims are extinguished after two months of the announcement.
* The account holder can file an objection before it reaches two months.
-
Step 3Refund for victims
- by the Financial Supervisory Service and Bank
- The Financial Supervisory Service determines the refund amount within 14 days after the account holder¡¯s claims are extinguished and informs the victim¡¯s financial institution.
- The financial institution pays damages.
-
- - Deleting malicious code: Clean and format your infected computer using a vaccine software.
- - Use the Remote Desktop Inspection service of the KISA at (http://www.boho.or.kr ).
- - Damage relief: After requesting to stop the payment through the 112 or financial institution¡¯s customer center, submit a request for a refund of the damage by submitting the Incident
- If no financial damage has occurred
- - Remove malicious code.
- - Modify previously entered financial information via the relevant institution.
- - Use an OTP and security token (password copy protection).
What is memory hacking?
It is a scheme that illegally withdraws money, even only the first or last two digits of the security number card are entered.
Types of crime
- [Scheme 1]
- - The PC is infected by malware.
- - Transfer is done through a regular Internet banking procedure (first or last two digits of security numbers).
- - An error occurs repeatedly (transfer information not delivered).
- - After a while, the criminal enters the same security numbers and transfers money to their bank account.
- [Scheme 2]
- - The PC is infected by malware.
- - After normal account transfer, a security pop-up appears that requires entering the first or last two digits of security numbers.
- - Money is transferred to the criminal¡¯s account after a while.
Case: Unauthorized withdrawal of KRW 27 million, the entire amount of the victim¡¯s deposit, by the memory hacking scheme
Preventive measures
- Use an OTP and security token (password copy protection).
- Do not store financial certificates, photos of security numbers, and passwords for computers and emails.
- Keep Windows and antivirus software updated.
- Use electronic anti-financial fraud services (designating computers for financial certificates).
- Do not open files or emails from unknown sources and delete them immediately.
- Avoid accessing free download websites for movies and pornography.
Measures
- In the case of financial damage
- - Report to a financial institution¡¯s customer center
- - Discard financial certificates and security code cards and use an OTP.
- If no financial damage has occurred
- - Delete malicious code.
- - Modify previously entered financial information via the relevant institution.
- - Use an OTP.