We have experienced serious hacking incidents that have caused in significant loss. Therefore, preventing hackers is our first lesson on the job.
Here are a few key indicators that we can check together to see if we meet.
When logging in on the web, it is necessary to set up mobile SMS verification, commonly known as secondary verification.
It is necessary to restrict web login to only the city where our company is located.
The third-party client must use a separate password and cannot be the same as the web login password.
Our IT experts will carefully check our backend data, and please ask your IT experts to carefully check your backend data to see if they can discover more clues.
Here are some real examples of our company
Case 1:
After making PI for the client, the client did not pay for many days, so I reminded the client twice and attached our PI. A few days later, the client replied to me that he would be made the payment on Friday. However I still did not receive the payment on Monday, so I sent another email to the client hoping that customer could provide us the bank receipt. The next day, I received an email from the client informing that the payment had been made and attached the PI that the bank account had been changed. After checking the PI and email, I found that someone had impersonated my email address and sent client an email, it stated that the bank account could not be used due to review and asked customer to transfer the money to other accounts. Then I immediately called to customer to ask the bank to stop the transfer. The customer is waiting for the bank to refund the money now.
Case 2:
My new client has been targeted by a hacker. After the client placed the order, the hacker disguised as customers' domain name and send us an email that the payment has already been made and more than paid, then let us transfer the extra amount to the bank account of one of his freight forwarders, but which account actually belongs to the hacker, and the rest is the service fee to us. This incident was caused by lack of experience and failure to carefully check the customer's email address. When it comes to amounts, we should check our email addresses carefully.
Case 3:
It was a hacker who created two mailboxes that looked very similar to mine and my client. After the hacker intercepted our emails, he edited and changed some of information in our emails. Since the customer had already paid a 30% deposit before, (the amount of the order was quite large at that time) when the client paid the balance, the Hacker tampered with the bank information, then caused client transfer the 70% balance payment to the hacker's account.
Case 4:
Before placing order, the client received and clicked an email with the attachment “tgz”, but the anti-virus software did not detect anything. In the future emails, the hacker registered another domain name which similar to mine and broke into the client’s mailbox at the same time, the hacker may have set up automatic forwarding in the background of the client's mailbox, causing every emails that I send to client to be forwarded directly to the hacker's computer. After I sent the PI to customer, the hacker stepped in and informed client that the bank account had been changed in the name of our company, that caused client paid the money to the hacker's account.
Hacker' s standard mode of operation:
1. Through phishing websites, or Trojan virus email attachments to obtain the password.
2. Secretly listen to your email, then wait until the critical moment of payment.
3. Sending an email to customer, telling the customer that the bank account has changed.
Therefore, if there are any changes before payment or during the remittance, we will contact you by phone, please do not trust the information from any other channels!
In a word, do not click on unknown links, images, websites, etc, and change the email password regularly.
What should we do if you’ve been scammed?
1.Race against time
Within 1-3 days after payment, the money may still be in transit at the intermediary bank and has not reached the hacker's bank account yet. At this time, you must contact the bank asap and request to terminate the payment and refund the money to account.
2.Send telegram to the beneficiary bank
Be sure to ask the paying bank to send a bank telegram to the beneficiary bank that the money is suspected of fraud and needs to be returned.
Kindly remind: It is a very serious issue to modify the bank account, we will not inform you to change the bank account by email, whenever you encounter any changes in our bank account, please verify the information through our official website: https://www.kernal-automation.com/page/about-page?id=8