ÈËÉú¾ÍÊDz©¡¤(Öйú)×ðÁúAGÆì½¢Ìü

ÈËÉú¾ÍÊDz©¡¤(Öйú)×ðÁúAGÆì½¢Ìü(LianLian Global)¹ÙÍøÊ×Ò³

wishÐÂÊÖ×¢ÖØ£ºÔõÑùʶ±ð²¢¾Ù±¨¿ÉÒɵĵç×ÓÓʼþ»òÐÅÏ¢ÒÔ·ÀÊÜÆ­ £¿£¿£¿£¿£¿

wishwish¿ÉÒɵçÓÊ
2021/07/23
Wish

wishÐÂÊÖ×¢ÖØ£ºÔõÑùʶ±ð²¢¾Ù±¨¿ÉÒɵĵç×ÓÓʼþ»òÐÅÏ¢ÒÔ·ÀÊÜÆ­ £¿£¿£¿£¿£¿

ÈôÊÇÄúÊÕµ½ÒÉËÆÀ´×Ô Wish »ò Wish Ô±¹¤µÄ¿ÉÒÉÓʼþ»òÐÅÏ¢£¬£¬ £¬ £¬£¬£¬£¬ÒªÇóÄúÌṩÃÜÂë¡¢ÑéÖ¤Âë¡¢API »á¼ûÁîÅÆ»ò API ¿Í»§¶ËÃÜÔ¿£¬£¬ £¬ £¬£¬£¬£¬Çë¼á³ÖСÐÄ£¬£¬ £¬ £¬£¬£¬£¬Õâ¿ÉÄÜÊÇÕ©Æ­Óʼþ/ÐÅÏ¢ ¡£¡£¡£ ¡£¡£

ÔõÑùÇø·Ö¿ÉÒÉÓʼþºÍÀ´×Ô Wish µÄÕýµ±Óʼþ £¿£¿£¿£¿£¿

ÐÐÆ­Õ߻ὨÉèÐéαÓÊÏäÕ˺ÅÀ´Ã°³ä Wish Ô±¹¤£¬£¬ £¬ £¬£¬£¬£¬ÒÔÎüÒýÊÕ¼þÕ߻ظ´»òÕßµã»÷Á´½Ó»ò¸½¼þ£¬£¬ £¬ £¬£¬£¬£¬»òÌṩÉñÃØÐÅÏ¢£¨°üÀ¨ÈκÎÕË»§µÄÃÜÂë¡¢ÑéÖ¤Âë¡¢API »á¼ûÁîÅÆ»ò API ¿Í»§¶ËÃÜÔ¿£© ¡£¡£¡£ ¡£¡£´ËÀàÓʼþͨ³£°üÀ¨ÒÔÏÂÄÚÈÝ£º

  • ÒªÇóÌṩÃÜÂë»òÑéÖ¤Âë

  • ÔÚÉÌ»§Æ½Ì¨Ö®ÍâÌṩ¸¶·ÑЧÀÍ

ÈôÊÇÄúÊÕµ½À´×Ô¡°Wish Ô±¹¤¡±»òÆäËûÈκÎÈ˵ÄÐÅÏ¢£¬£¬ £¬ £¬£¬£¬£¬ÒªÇóÄúÌṩÃÜÂë¡¢ÑéÖ¤Âë¡¢API »á¼ûÁîÅÆ»ò API ¿Í»§¶ËÃÜÔ¿£¬£¬ £¬ £¬£¬£¬£¬ÇëÎðÖ±½Ó»Ø¸´£¬£¬ £¬ £¬£¬£¬£¬ÓÉÓÚ Wish ¾ø¶Ô²»»áͨ¹ýµç×ÓÓʼþ»ò³ýÊܱ£» £»£»£»£»¤µÄÉÌ»§Æ½Ì¨£¨ÀýÈç¡°ÉÌ»§Æ½Ì¨¡±ÍøÕ¾£©ÒÔÍâµÄÏàͬÇþµÀÏòÉÌ»§Ë÷ÒªÒÔÏÂÐÅÏ¢£º

  • Wish ÉÌ»§ÃÜÂë

  • СÎÒ˽¼ÒÓÊÏä¡¢ÒøÐлòÆäËûÕ˺ŵÄÃÜÂë

  • ÑéÖ¤Âë

  • API »á¼ûÁîÅÆ

  • API ¿Í»§¶ËÃÜÔ¿

ÔõÑù¾Ù±¨¿ÉÒɵÄڲƭÓʼþ»òÐÅÏ¢ £¿£¿£¿£¿£¿

ÈôÊÇÄúÊÕµ½¿ÉÒɵÄÓʼþ»òÐÅÏ¢£¬£¬ £¬ £¬£¬£¬£¬ÒªÇóÄúÌṩÃÜÂë¡¢ÑéÖ¤Âë¡¢API »á¼ûÁîÅÆ»ò API ¿Í»§¶ËÃÜÔ¿£¬£¬ £¬ £¬£¬£¬£¬µ«ÄúÎÞ·¨È·¶¨¸ÃÓʼþÊÇ·ñÕýµ±£¬£¬ £¬ £¬£¬£¬£¬ÄúÓ¦¸ÃÁ¬Ã¦ÏòÎÒÃǾٱ¨ ¡£¡£¡£ ¡£¡£ÒÔÏÂÊǾٱ¨·½·¨£º

  • Ê×ÏÈ£¬£¬ £¬ £¬£¬£¬£¬²»Òªµã»÷ÓʼþÖеÄÈκÎÁ´½Ó»ò·­¿ªÈκθ½¼þ ¡£¡£¡£ ¡£¡£

  • ½«¿ÉÒÉÓʼþÐÅÏ¢ÒÔ¸½¼þµÄÐÎʽ·¢ÖÁ merchant_support@wish.com (General Support) »ò merchant-support@wish.com (CN General Support)£¬£¬ £¬ £¬£¬£¬£¬ÒÔ±ãÎÒÃÇ¿ªÕ¹½øÒ»³ÌÐò²é ¡£¡£¡£ ¡£¡£

wishÉÌ»§¹ÙÍøÔ­ÎÄÏêÇ飺


How to recognize and report suspicious emails or messages to avoid scam?


If you receive a suspicious email or message that seems to be from Wish or Wish employees, and the message requests that you provide passwords, verification codes, API access token, or API client secret, be vigilant. The email may be a scam.

How to distinguish between suspicious emails and legitimate messages from Wish?

Fraudsters create fake email accounts to pose as Wish employees, in the hope that recipients will reply or click on a link or attachment, and provide confidential information including passwords and verification codes of any accounts, or API access token and API client secret. These emails or messages often contain the following:

  • Requests for password or verification codes

  • Offering paid services outside of the Merchant Dashboard portal

If you receive a message from ¡°Wish employees¡± or anyone else asking you to share passwords, verification codes, API access token, or API client secret, do not reply directly, because Wish never asks merchants for the following details via emails or external communications outside protected merchant portal (such as Merchant Dashboard):

  • Wish Merchant Password

  • Password to personal email, bank, or other accounts

  • Verification codes

  • API access token

  • API client secret

How to report potentially fraudulent / scamming emails or messages:

If you receive a suspicious email or message that requests passwords, verification codes, API access token, or API client secret, and are unsure of the legitimacy of the message, you should report it to us immediately. Here's how:

  • First of all, do not click any links or open any attachments in the email.

  • Reach out to merchant_support@wish.com (General Support) or merchant-support@wish.com (CN General Support) and include the suspicious message as an attachment so we may investigate further.


ÎÄÕÂÄÚÈÝȪԴ£ºwishÉÌ»§¹Ù·½ÍøÕ¾  

¸ü¶à
¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿