Joke Collection Website - Blessing messages - Can I open a short message with a link to the party photo?
Can I open a short message with a link to the party photo?
In the last two days, Mr. Liu is not the only one who has received this kind of "poison message". Morning Post, Weibo and the "Rumor Crusher" column in the background of WeChat all received a lot of similar complaints and inquiries.
Dong, a network expert and senior engineer of China Great Wall Broadband, pointed out that at present, mobile phone viruses of telecom fraud are emerging one after another, and have entered the 2.0 era. In recent years, so-called short messages, which contain video and photo links of classmates and family gatherings and hide Trojan virus, have emerged in an endless stream, and there is an outbreak trend in recent days. Many smart phones are associated with online banking functions such as Alipay and WeChat wallet, so it is urgent to prevent mobile phone viruses.
The "party photo" virus in the mobile phone automatically sends text messages in groups.
The host made dozens of phone calls afterwards to "save the scene"
Mr. Liu, who is in his fifties, uses a smart phone of several hundred yuan. At 6 o'clock yesterday morning, Mr. Liu received the above information from his uncle. "The text message starts with a name, which should be sent by my uncle." Curious for a while, Mr. Liu clicked on the link and found that there were no videos and photos. The magic thing was that the news disappeared automatically.
Mr. Liu said that he thought it was a prank at first. Soon, he received many phone calls from relatives and friends asking him why he sent some inexplicable spam messages. Only then did Mr. Liu realize that the mobile phone had just automatically sent hundreds of short messages to more than 100 relatives and friends in the mobile phone address book in his tone.
Just in case, he had to inform his relatives and friends one by one and ask them to stop texting. Nevertheless, I recruited some relatives and friends. Fortunately, many people changed their online banking passwords in time, so far, there is no economic loss.
"It's strange that not everyone has received the text message." Mr. Liu said that his son's Apple mobile phone was not received, but was received by the daughter-in-law of the old Apple 4.
Yesterday morning, Mr. Liu specially rushed to the mobile business hall and asked someone to brush his mobile phone and format it thoroughly. Fortunately, he is not used to online banking at ordinary times, and the funds in the bank card are safe and sound. However, because his mobile phone has been sending harassing short messages, the operator has suspended its short message function, and he reapplied for opening after brushing his mobile phone.
Bank managers fight against mobile phone viruses.
"Almost every month, customers who accidentally open suspicious text messages come to the bank to ask for a password change." Yesterday, Liu Feng, manager of Xinhua Jiayuan Sub-branch of a bank, revealed that he had been cheated.
Liu Feng said that in April this year, he received a short message from his son's primary school teacher to the effect that "your child's exam results, please link (website)". He clicked, but he didn't expect that his mobile phone had been receiving harassing text messages for more than two weeks. These short messages are nothing more than "money has been transferred, website consumption is XXX, please contact XXX if the account is abnormal". These short messages are basically sent in the name of websites or bank customer service, and some links have mandatory advertisements, so you can't even read them.
"At that time, it gave people the illusion that someone was using your bank card." Liu Feng said that as a bank employee, he has a strong sense of fraud prevention. Because the brush machine deleted some useful information, he adopted the method of "answer blows with blows". That is, every number that sends text messages is blacklisted. "Continuous setting, afraid of twenty or thirty, maybe I didn't respond, and the other party sent less later."
Later, he asked the professional technicians of the bank to install several anti-virus software on his mobile phone, and really scanned out two viruses and another stubborn malicious program from his mobile phone. It took three days to unload. In order to be sure, I also changed my mobile phone card again.
Now, Liu Feng concluded, be skeptical about everything, and don't click on unknown documents and links in short messages easily. If you are not sure, you will never be blind.
Focus problem one
What is the principle of "party photos" communication?
Dong, a network expert and senior engineer of China Great Wall Broadband, introduced the spreading principle of "party short message" to the reporter: usually, the first poisoned person is sent by a malicious attacker through a pseudo base station and a short message, and a short message with a hidden webpage link is obtained by casting a net all over the sky. In order to attract you to click, these short messages usually say that there are photos of classmates and family members gathering in the link; Others are sensational, claiming to have a wife or husband's cheating video, which attracts you to click.
"Once clicked, it will spread geometrically." Dong Gong said that clicking will activate the Trojan horse program hidden in the short message, and the Trojan horse will automatically search the phone address book, modify the sender and the recipient, and make the recipient mistakenly think that it is a short message sent by the owner.
"This is very deceptive!" Dong Gong said that most people have anti-fraud awareness now, but they usually have little defense against the information of acquaintances. This kind of chain communication will cause the spread of a large number of toxic short messages in a short time.
Focus problem 2
Why would someone send these viruses?
Dong Gong said that the spread of short messages through viruses often has several purposes:
The first is to attract mobile phone users to click on links to promote products or marketing.
The second is that once Trojans and viruses take root in the mobile phone, they directly control the mobile phone address book and send it to the background database. These personal information will be directly sold by hackers.
The third is the most terrible: because mobile phones are usually bound to online banking such as Alipay and WeChat wallet, once these key information are leaked, it means that hackers swipe their cards, just like taking things from their bags.
Dong Gong said that these poisonous text messages are usually operated by criminal teams with high IQ. Relatively speaking, these people are carefully laid out, which makes people hard to prevent.
Focus problem three
Why are some people arrested and others not?
This virus outbreak, the same person in the mobile phone address book, why did some people recruit and some people didn't recruit?
Dong explained that this is because someone has set up a mobile phone firewall or installed anti-virus and security software, and the security software will automatically classify the messages with poison as spam messages and compare them to block them.
In addition, operators have also established an early warning system for spam messages. If the system detects that a certain number sends a large number of identical short messages abnormally, it will also trigger an alarm, automatically lock and terminate the short message sending function of the mobile phone, and cut off the transmission source.
Focus question 4
How to prevent viruses from entering the 2.0 era?
"Compared with mobile phone virus messages similar to class reunions, mobile phone viruses have evolved and upgraded and entered the 2.0 era." Dong Gong said they were more hidden and deceptive! For example, through mobile games, lottery, red envelopes and other forms, elaborate composite production.
Dong pointed out that it is necessary to guard against these toxic short messages. First of all, we should restrain our curiosity. If you receive a similar message, don't click it rashly, you can check it first. Secondly, mobile phones should be equipped with security software such as mobile phone housekeeper and guard, and the virus database should be updated in time.
In addition, the associated online banking password should be changed as regularly as possible. Don't use the same password to avoid being destroyed. Passwords should also be harder to crack, using uppercase and lowercase letters and numbers. In particular, don't casually enter the account number and password information of unfamiliar linked web pages; In addition, the verification code is the last hurdle. Don't lose without official website.
Focus problem five
If you have been poisoned, how to detoxify?
Install anti-virus software on the mobile phone and immediately run the killing; In case of crash, you can connect to the computer and scan the mobile phone disk through software such as mobile phone security guards.
The new reset system of brush machine can generally be solved; You really can't "lose your car" to change your mobile phone.
- Previous article:Talk about the mood of waiting for unsealing
- Next article:Welcoming Freshman Speech
- Related articles
- What are the words of apology between parents?
- Hummingbirds crowdsource. The display device does not exist.
- What is a communication assistant?
- Judicial recourse tells SMS to freeze.
- Clean up spam SMS platform
- How to withdraw the money from the US Mission?
- Is People's Daily a new media for government affairs?
- What is a hilarious chicken?
- How to send SMS to telecom numbers to open Super QQ?
- Credit card bill import mailbox