Joke Collection Website - Talk about mood - More than three million elderly computers have been implanted with Trojans. How are these viruses implanted?

More than three million elderly computers have been implanted with Trojans. How are these viruses implanted?

These Trojan viruses are implanted into the motherboard of the mobile phone for the elderly. As long as you buy the mobile phone and insert the phone card into the mobile phone for the elderly, the Trojan horse program will obtain the phone number, personal information, etc. in the mobile phone, and these The Trojan horse program can also automatically intercept verification and transmit the verification code to the backend database of the Internet company where the Trojan horse is implanted. Technology companies that produce Trojan programs cooperate with companies that produce mobile phones, resulting in 3.3 million elderly machines being implanted with Trojan viruses. Wu, who created the Trojan virus company, was sentenced to 4 years and 6 months in prison and fined 600,000 yuan. The 6.16 million yuan he earned illegally will also be recovered. Other people who committed illegal crimes were also punished by law.

Network technology companies sell this personal information, and then use verification codes to perform verification work. The code matching work is to ensure that the mobile phone number is consistent with each verification code, and then they sell the intercepted verification codes to illegally obtain profits. These verification codes will be purchased by groups and individuals. They will use these users to register a large number of software, and then use the coupons, red envelopes, traffic, likes, etc. inside. Individual or group behavior is called fleecing wool, and huge benefits can be obtained from it. ?

With the development of technology, criminal methods are becoming more and more sophisticated, catching us off guard. And now people are paying more and more attention to personal information. When we use mobile phones, personal information is invisibly obtained by some illegal software, and this information will be sold by these illegal Internet companies.

Nowadays, we often receive calls from various individuals on our mobile phones. We are very surprised. We have never left a phone number with these companies before, nor have we contacted them. Why do they have our phone numbers? ? Therefore, our phones are sold by these illegal Internet companies, which causes our privacy to be violated and brings a lot of trouble to our lives.