Workflow
企业人员请注意!警惕新型诈骗手法,保护企业财产安全
招商银行App·2025-07-10 07:42

Core Viewpoint - The article highlights the increasing prevalence of telecom network fraud targeting companies, particularly through the use of Trojan viruses to impersonate company leaders or clients, leading to significant financial losses for businesses [1][2]. Common Fraud Patterns - Impersonation of Leaders: Fraudsters disguise Trojan viruses as tax tools or office software to trick employees into downloading them, allowing remote monitoring and data theft. They then impersonate company leaders to request fund transfers under false pretenses [2][3]. - Impersonation of Clients: Scammers steal business emails to monitor communications and create lookalike email addresses to send fake payment instructions, tricking employees into transferring funds to fraudulent accounts [5][6]. - Subsidy Scams: Fraudsters pose as tax or social security officials, sending fake emails about labor subsidies that lead victims to phishing sites where they unwittingly provide sensitive information [8][9]. Case Studies - A case from May 27, 2024, involved a company in Shanghai where a finance director received a fraudulent request for a transfer of 4.986 million yuan, which was avoided due to prior awareness of fraud prevention tips [3]. - Another case involved a foreign trade company where a finance employee was tricked into transferring tens of thousands of yuan due to a lookalike email from a supposed client [6]. Fraud Tactics Breakdown - Phishing Attack: Scammers develop Trojan viruses disguised as common software to lure employees into downloading them [10]. - Monitoring and Analysis: Once the Trojan is installed, fraudsters monitor the company's operations to gather sensitive information [11]. - Impersonation and Deception: Scammers create fake accounts to impersonate company leaders or clients, requesting fund transfers when the time is right [11]. Prevention Measures - Identity Verification: Companies should verify identities before processing any transfer requests, ensuring that communication is confirmed through direct contact [12]. - Systematic Management: Establishing strict financial management protocols and training employees on fraud recognition can mitigate risks [12]. - Privacy Protection: Employees should avoid clicking on unknown links or providing sensitive information on untrusted platforms [12]. - Timely Reporting: In case of suspected fraud, it is crucial to preserve evidence and report to authorities immediately to minimize losses [13].