The strange text message left me feeling restless in the office.
"Ding," another text message came in. It was a spending alert from the credit card center: Your card ending in 5872 has just been charged 35,800 yuan at "Tianhong Mall."
This is impossible! My credit card is right here in my bag!
With trembling hands, I opened my online banking app, and a more terrifying reality unfolded—within the past 24 hours, my credit card had been used for several large transactions at different locations, from malls and hotels to upscale restaurants, totaling nearly 100,000 yuan!
"Calm down, calm down..." I forced myself to take deep breaths and immediately dialed the credit card center's number.
"Hello, Miss Lin," the customer service representative's response only heightened my panic. "The system shows that these are all transactions made by you, with your signature on each one. There are no discrepancies."
"That's impossible! My card is right here!" I pulled my credit card out of my bag.
"I'm sorry, but the system indicates that your card is in normal use. Each transaction has your signature, which matches the one on file."
After hanging up, my hands were already cold. First my social media accounts, and now even my bank card had been compromised? But how did they manage it? Copying my card was one thing, but how could they forge my signature?
Just as I was contemplating whether to go directly to the bank, a new email popped up in my company inbox. This time it was a group email from the project team, sent by my direct supervisor, Zhang Zhen:
"After approval from the R&D department, we have accepted Lin Xia's resignation request. Considering that the digital certification project is currently at a critical stage, please complete your work handover within this week. Li Wei will take over related tasks..."
What?! The resignation request was approved so quickly?
I immediately called Zhang Zhen, but found his phone was turned off. This was unusual; given Zhang Zhen's personality, he would definitely ask me about this in person first. Unless...
Cold sweat trickled down my back. I quickly checked the contact information of my other colleagues—every member of the Project Team was unreachable!
"Ding dong," my phone chimed again. It was an email from Human Resources:
"Hello Lin Xia, we have received your work handover document. The information is very detailed; thank you for your hard work. As per procedure, please come to the HR department tomorrow morning to complete your resignation process..."
Work handover document? When did I send that?
I hurriedly opened my sent emails and indeed saw a detailed document sent to HR half an hour ago, which not only included project progress but also all technical documents and the Source Code!
No, this can't be right! The project's Source Code is strictly controlled and can only be accessed in a specific development environment. Even if they hacked my email, it wouldn't be possible...
Wait!
I suddenly recalled a detail—the company had just updated the access control system for the Code Repository last week. The new system employed multiple Biometric Technologies, including fingerprints, facial recognition, and even typing habits, reportedly to prevent identity theft to the greatest extent.
As a member of the Core Project Team, I was among the first batch of test users. That means...
"Please note, your Company ID Card has just been scanned on the 15th floor server room." A notification popped up from the company's security system.
The 15th floor? That's where the core servers are stored!
My mind buzzed. It was two in the morning, and aside from me, there shouldn't be anyone else in the entire building. So, who exactly was "I" in the server room?
A more terrifying thought emerged—this person was not only stealing my social media accounts and bank cards; they had perfectly replicated my fingerprints, facial features, and even my typing habits!
Just as I was about to call the police, my phone screen suddenly flickered, displaying a video call request.
Caller: Lin Xia.
Yes, I saw my own name and profile picture.
But at that moment, I was holding my phone in my hand and hadn’t dialed any number.
Strangely compelled, I clicked to answer.
On the screen appeared a familiar face—
It was myself.
Comment 0 Comment Count