Joke Collection Website - Public benefit messages - I watched a TV story today. The page showed that hackers were invading your mobile phone, and then downloaded it.

I watched a TV story today. The page showed that hackers were invading your mobile phone, and then downloaded it.

To save trouble, deduct the answer directly from Zhihu.

At present, we haven't seen the actual attack case of vulnerability attack to obtain mobile phone information. The description of this piece in the usual news is just a folk story.

The actual steps are divided into several situations:

1. The SMS link points to a phishing website where the victim submitted his ID number, mobile phone number and bank card information. Then it will induce online submission of verification code, or induce downloading of Trojans that intercept mobile phone short messages;

2. Download Trojans that intercept mobile phone messages directly. Criminals obtained the victim's identity information and bank card through other channels (buying in the black industrial chain).

Both of the above will lead to the theft of bank card funds.

Author: Li Tiejun

Link:/question/34579825/answer/59337058

Source: Zhihu.

Copyright belongs to the author. Please contact the author for authorization.