Workflow
华福融达
icon
Search documents
行情来了,诱骗炒股的李鬼也多了,注意这些套路
Feng Huang Wang· 2025-08-13 08:09
Core Viewpoint - The rise in illegal securities activities is correlated with the warming of capital market conditions, leading to significant financial losses for investors due to fraudulent schemes [1][2]. Summary by Sections Illegal Securities Activities - Multiple securities firms, including CITIC Securities, Galaxy Securities, and others, have reported cases of fraud where criminals impersonate legitimate companies and their staff to conduct illegal securities activities [1][2]. - The fraudulent schemes involve a comprehensive imitation system, including fake trading software and social media accounts, which mislead investors [2]. Fraud Techniques - Criminals have developed five main fraudulent tactics targeting investors' psychological weaknesses, such as the desire for high returns and trust in authority [4][5][6]. - Techniques include creating false trading channels, promising high returns, charging various fees, forging regulatory documents, and extending scams into offline activities [4][5][6]. Identification and Prevention - Securities firms have issued guidelines to help investors identify illegal activities, emphasizing the importance of verifying the legitimacy of institutions and their personnel [7][8]. - Key identification methods include checking the qualifications of the entity, scrutinizing website and software details, being cautious of exaggerated marketing claims, and ensuring that payments are made to legitimate company accounts [7][8].
行情来了,诱骗炒股的李鬼也多了,注意这些套路
财联社· 2025-08-13 07:59
Core Viewpoint - The rise in illegal securities activities is correlated with the warming of the capital market, leading to significant financial losses for investors due to fraudulent practices by criminals impersonating legitimate securities firms and their employees [1][2]. Summary by Sections Overview of Illegal Activities - Multiple securities firms, including CITIC Securities and Galaxy Securities, have reported cases of fraud where criminals impersonate their companies or employees, resulting in financial losses for investors [1]. - The fraudulent methods include a comprehensive imitation system that ranges from official branding to business scenarios, making it difficult for investors to discern the authenticity [2]. Methods of Fraud - Criminals have developed a series of counterfeit trading apps, with examples such as "GFZY" and "Institutional Terminal" from Guangfa Securities, which are designed to mislead investors [2]. - Social media platforms have become key venues for these scams, with fake groups and accounts established to lure investors into fraudulent schemes [2]. Impersonation of Employees - Fraudsters have been known to use the photos and personal information of both current and former employees to directly contact investors, creating a false sense of legitimacy [3]. Common Fraud Schemes - Five primary fraudulent schemes have been identified: 1. Creation of fake trading channels promising special access to entice investors to download illegal software [4]. 2. Promises of high returns and profit-sharing to lure investors into depositing funds [4]. 3. Collection of various fees under different pretexts, often leading to obstacles during withdrawal attempts [6]. 4. Forgery of regulatory documents to enhance the credibility of the scams [6]. 5. Offline activities that extend the deception beyond online platforms, increasing the likelihood of investor engagement [6]. Identification and Prevention - Securities firms have proposed four methods for investors to identify illegal activities: 1. Verify the qualifications of the entity involved in securities trading through official regulatory websites [7]. 2. Pay attention to discrepancies in URLs and software details to spot counterfeit platforms [8]. 3. Be cautious of exaggerated marketing claims and promises of guaranteed returns [8]. 4. Ensure that all transactions are conducted through official company accounts, avoiding personal accounts [8]. - Investors are advised to keep records of all communications and transactions related to fraudulent activities for potential legal action [8].