Received instructions from the boss to transfer money!
As a financial person, do you do it right away?
July 2024
Binzhou Bincheng police received a report
The company has suffered huge losses!
Police remind
Transferring money without verification is very dangerous
Financial personnel must be vigilant
Before the transfer
To call and check with the owner!
X is the CEO of an enterprise in Bincheng District
In July of this year
It was seen in the industry exchange group called Related
"List of Tax Authorities and Penalties for Enterprises Spot-checked"
It was then transferred to the financial little Z
Xiao Z, who was not aware of the anomaly, clicked on the link to download the file
The displayed file is a compressed package
There is no response after downloading and decompressing it many times
He didn't pay any more attention
July 18 at 1 p.m
Xiao Z suddenly received a payment prompt from the "boss" on WeChat
The "boss's" avatar and nickname are exactly the same as usual
Xiao Z didn't suspect it, so he immediately transferred the money
10 minutes after the transfer is completed
The boss called to ask where the huge sum went
After checking, Xiao Z realized that he had been deceived
The Ben Cheng police found it on the financial computer
There is third-party control software
The reason is actually in the beginning
The boss is sharing the file compressed package with Xiao Z
List of Tax Inspections and Penalties for Enterprises Spot-checked by the Taxation Bureau
Implanting a Trojan virus into a computer
Scammers use viruses to gain access to the computer's backend
Real-time screenshots, screen recording, monitoring, etc
Hidden "observing" the company's financial transfers and internal exchanges
Find the right time to remotely control the financial computer to add
Fake company boss WeChat (modified to the same nickname, avatar)
A "clone" account appears to start a conversation with Finance
Committing fraud
Routine analysis
After investigation, the main target of this kind of fraud is the financial personnel of the enterprise, who make Trojan horse programs and disguise them as documents, spread them through the mass distribution of enterprises, and then control the work computers of the enterprises and log in to the chat tools after the enterprise personnel open the program and log in to the chat tool, disguise their identities and wait for the opportunity to carry out fraud and secondary dissemination of Trojan horse programs.
1
Dropping Trojan viruses
Scammers send phishing files with names such as "Pay Taxes" and "E-Invoices" via group chats or emails, which are actually Trojan viruses.
2
Control the computer remotely
After the recipient clicks on download and unzips, the computer is implanted with a Trojan virus. Scammers use viruses to remotely control computers and get hold of files and chats on them.
3
Impersonate the boss to "direct" the transfer
Then the scammer deletes the boss's real chat account and adds a "clone" account (using the same avatar and nickname, or even imitating the tone!). ), or pull the financial staff into the scam group chat, and then "direct" the transfer.
Police tips
1. When you encounter a self-proclaimed leader who adds friends through social tools such as QQ, WeChat, and SMS, please do not believe it easily and add it cautiously before verifying the identity of the other party.
2. Do not blindly remit money to unfamiliar accounts, and be vigilant against abnormal borrowing and remittance requirements, call the leader, video or ask for verification in person, and be sure to verify and confirm before operating.
3. Do not click on URLs, links, files, emails, etc. from unknown sources, and do not easily disclose personal information to strange netizens, so as to enhance the awareness of prevention.
4. Financial personnel should regularly check and kill computer viruses, strengthen prevention capabilities, and avoid criminals stealing computer information through Trojan viruses.
Source: Shandong Internet Police