Where did the boss come from?

Mondo Science Updated on 2024-03-07

Recently, Liu, an accountant of an enterprise in Hanjiang District, Yangzhou, received a letter "signed by the boss".Work mailUnexpectedly, after clicking, I fell into the serial set of ** and was deceived150,000 yuan

Case review

On February 26, Liu, an accountant of an enterprise in Hanjiang District, received an email with the content of "Establish a QQ group for work communication", Liu clicked on the email without thinking much and joined the QQ group according to the email requirements.

Seeing that the company's "boss" and "sales" are also in the group, and the avatars and nicknames of the group members are the same as usual, the "boss" is still in the group and the "sales" are docking, and Liu is not suspicious.

On the morning of February 27.

Liu working from home.

Received a message from the "boss" of the company.

Said to send money to cooperative customers in the group.

Liu thought he was accepting instructions from the boss of the company.

Financial management system: The company's large-value transfer requires "second instance".

But the company for the convenience of electronic transfers.

Both U shields are by Liu's side.

So Liu handled it with one hand and reviewed it with one hand.

Failure to contact the boss for verification through **, meeting, etc.

According to the arrangement of the "fake boss".

Transfer $150,000 to a designated account.

After the transfer was successful, Liu called the boss to report the situation, but he didn't expect the boss to know anything about arranging the transfer.

Manipulation analysis

Step 1:Spreading Trojan viruses by mail

* Through investment and financial management, financial communication, internal office WeChat, QQ group or email, spread the name"Electronic Invoice" and "Enterprise Tax Specification".and other compressed files, which are actually the systemTrojan viruses.

The day before he was deceived, the email that Liu received disguised as a "work notice" was actually a fraudulent email containing a Trojan virus.

Step 2: Use Trojan viruses to steal internal information

Once the finance person clicks ** and unzips, the computer is implantedTrojan viruses. 。**Computers can be obtained by virusesBackground permissions, implementationTake screenshots, record screens, monitorand other operations, "observing" the company's financial transfers and internal exchanges, and waiting for opportunities to commit crimes.

**Obtained the WeChat chat records between Liu and the boss, mastered the relevant information, and waited for the opportunity.

Step 3: Wait for the opportunity to pretend to be the boss to urge financial transfers and remittances

When the time is ripe, ** will "clone" the boss account (using the same avatar and nickname), pull the finance **, self-directed and self-acting to talk to the "customer" in the group, send the bank account, and urge the finance to transfer and remittance.

**Take advantage of vacation time, pretend to be the boss and sales at the same time, pull Liu**, and commit fraud.

Anti-fraud gentleman reminds

Not gullible

Do not believe in QQ (group) and WeChat (group) involving company transfer and remittance information, and carefully identify and be vigilant if the company's boss, person in charge or other personnel request transfer and remittance through online social tools.

No additions

Don't easily add unfamiliar QQ and WeChat friend applications, especially QQ and WeChat involving the name of the company's boss and person in charge, be sure to verify it in person or in person.

Transfer with caution

For the transfer and remittance required by QQ and WeChat, it must be verified and confirmed by the company's boss and person in charge in person or **, and the requirements of the relevant financial management system must be strictly implemented. Once you find out that you have been deceived, you should call the police on 110 as soon as possible.

* Yangzhou Anti-Telecom Network Fraud Center.

Related Pages