The Ministry of Public Security has announced 5 typical cases of telecommunications network fraud targeting corporate finance and accounting personnel
2024-07-31
According to the website of the Ministry of Public Security, there has been a high incidence of "precision poisoning" telecommunications network fraud cases in which companies use Trojan viruses to invade their computers and impersonate business owners or customers to defraud accounting personnel, causing huge losses to related enterprises. The Ministry of Public Security attaches great importance to this and has deployed local public security organs to quickly take action and launch heavy handed attacks, successfully solving a number of key cases and cracking down on a number of fraud gangs. Today, the Ministry of Public Security announced 5 typical cases to effectively enhance the anti fraud awareness and ability of relevant enterprises and personnel. After investigation, it was found that in such fraud cases, fraudsters usually disguise the developed Trojan viruses as tax reporting tools, office software, electronic invoices, tax related documents, etc., and lure enterprise personnel to click on the download through email or push download links, thereby implementing Trojan attacks. Once the computers of related enterprises are invaded by Trojan viruses, fraudsters can remotely monitor the computers and accurately analyze the basic situation of the enterprise and personnel information such as finance, management, and sales through office files, chat records, and other information. Subsequently, the fraudster remotely controlled social media platforms such as QQ and WeChat of finance and accounting personnel, and added the accounts used for fraud to their friend list without their knowledge. When the time is ripe, fraudsters will then "transform" their fraudulent accounts into QQ or WeChat accounts of the company's owner or customers, fabricate various reasons to request financial and accounting personnel to transfer money, and thus carry out fraud. During the process of committing the crime, fraudsters are extremely secretive and confusing, whether they use Trojan viruses to invade computers in the early stage or impersonate bosses or customers to request transfers and remittances in the later stage. They even gradually understand the chat habits of relevant personnel and the financial approval process of the enterprise through long-term concealment, and may fall into fraud traps with even a slight carelessness. The relevant person in charge of the Criminal Investigation Bureau of the Ministry of Public Security stated that in response to the frequent occurrence of such fraud cases, the Ministry of Public Security has deployed local public security organs to carry out anti fraud propaganda for relevant personnel of enterprises based on typical cases, guide the investigation and removal of phishing software, enhance system security protection capabilities, and effectively eliminate risk hazards. At the same time, the public security organs remind enterprises and the public to effectively raise their awareness of prevention, regularly disinfect computers, and immediately delete and change chat software login passwords once fraudulent accounts disguised as friends are discovered. If you encounter unit leaders, business owners, or company customers requesting transfer or remittance in chat software, be sure to verify in person or by phone to avoid property losses. Five typical cases are as follows: Case 1: On September 21, 2023, the Public Security Bureau of Tiantai County, Taizhou City, Zhejiang Province, received a report of a telecommunications network fraud case. The victim, Zhu, was a finance and accounting personnel of a technology company. The fraudster impersonated the company owner and transferred more than 10 million yuan through WeChat group chat. After the case occurred, the public security organs at the city and county levels in Zhejiang Province jointly established a special task force to urgently carry out work such as stopping fund payments and investigating the case. After receiving the report, the public security organ captured the first suspect involved in the case in only 6 hours, and successfully saved more than 6 million yuan of losses for the company. After careful investigation and in-depth exploration by the special case team, 41 suspect involved in the fund, communication and other links of the case were successfully captured in many parts of the country, achieving a full chain strike. Case 2: On October 25, 2023, the public security organ of Mount Wuyi City, Fujian Province, received a report from Zheng that his company's finance was suspected of being defrauded by the telecommunications network of more than 14.8 million yuan. After receiving the report, the public security organs immediately carried out the work of stopping payment and reversing losses of the involved funds. On the same day, they successfully stopped payment and froze more than 9.3 million yuan of the involved funds, involving 529 accounts. After investigation, before the incident, the fraudster remotely controlled Zhang's computer by dropping a Trojan virus program, and then secretly deleted the company boss account in his WeChat friends, and added the fake boss's WeChat as his friend. Subsequently, the fake boss pulled Zhang into a WeChat work group and asked him to pay the cooperative company's goods in advance, thus committing fraud. At present, 51 suspect have been arrested in the whole case, 8 black ash production gangs have been eliminated, and more than 12 million yuan of losses have been saved. Case 3: On May 22, 2024, the public security organs in Fuyang City, Anhui Province received a report from a company personnel that the company's finances were suspected of being defrauded by telecommunications networks. After investigation, it was found that Wang, the finance officer of the company, downloaded and ran an unknown file in the work WeChat group, and his computer was implanted with a Trojan virus. Overseas fraudsters remotely controlled Wang's computer through a Trojan virus, secretly stole relevant information, and used a disguised "company leader" WeChat account to demand that he transfer funds to a designated account. Wang believed it to be true and transferred 1 million yuan to the account, only to realize he had been scammed when asked by company leaders. After the incident, the public security organ of Fuyang City immediately carried out the recovery of stolen goods and damage and the line strike, successfully recovered the loss of 850000 yuan for the company, and arrested 6 suspect. Case 4: On March 21, 2024, the Port Coast Police Station of Penglai Branch of Yantai Public Security Bureau in Shandong Province received a face-to-face dissuasion instruction from the National Anti Fraud Center: a company within its jurisdiction was at risk of being deceived. After receiving the instructions, the police officers at the police station immediately carried out face-to-face dissuasion work. It is reported that after installing an activation software purchased online, employee Chi Mouwei's computer was implanted with a Trojan virus and remotely controlled by fraudsters, automatically performing operations such as typing and sending messages. Subsequently, the fraudster used WeChat disguised as a company employee to send a message to the accountant, requesting a transfer of 1 million yuan to a designated account. After understanding the situation, the police quickly organized a Trojan virus investigation and killing of the company's computers, while also promoting anti fraud knowledge to relevant personnel, successfully avoiding property losses for the enterprise. Case 5: On May 27, 2024, the public security organs in Songjiang District, Shanghai received a request for help from a company manager named Li, who claimed that his company's employees were suspected of being victims of telecommunications fraud. After investigation, the financial director of the company, Mr. Xiong, received a WeChat friend application on the same day, with his profile picture and name both being his company boss. After adding a friend, the other party chatted with Xiong in the tone of the boss's daily speech, and later requested him to transfer 4.986 million yuan to a designated company account under the pretext of paying for goods. Xiong remembered the prevention reminder in the anti fraud propaganda of the public security organs that "confirm in person or by phone before transferring funds", and did not hastily transfer funds but immediately called the company owner. Due to multiple unsuccessful attempts to contact the boss, Xiong informed Li of the relevant situation. Subsequently, the public security organs assisted Xiong in contacting the company owner, successfully exposing the scam and preventing the company from suffering property losses. After investigation, Xiong's company's computer was recently infected with a Trojan virus. Scammers gradually found out about the company's personnel and business situation through the Trojan virus, disguised themselves and waited for the opportunity to carry out fraud. (New Society)
Edit:Lubaikang Responsible editor:Chenze
Source:chinanews.com
Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com