Joke Collection Website - Public benefit messages - What happened when I received the verification code inexplicably?

What happened when I received the verification code inexplicably?

With the development of the times, our life has been surrounded by technology everywhere. For example, the mobile phone we need now is the product of technological development. With the rapid development and popularization of smart phones, the powerful functions of mobile phones make our life more and more convenient and fast, which makes us inseparable from smart phones. Even many young people say that if there is no mobile phone, life may become very long and painful. Many young people find it difficult to accept losing their mobile phones as an important channel for receiving external information.

Do you know the hidden income of mobile phone manufacturers?

Nowadays, with the increasing frequency of upgrading mobile phones, the functions of smart phones are becoming richer and more powerful. I believe that everyone has encountered this situation. As soon as you open the new mobile phone, you can see that there are many pre-installed applications in it. In fact, I didn't know that these pre-installed software would also bring considerable profits to mobile phone manufacturers, because these application promotion and advertising push will bring high economic benefits to mobile phone manufacturers, and even some mobile phone manufacturers can get tens of millions of profits by pushing advertisements on their mobile phones a year.

On the other hand, the appearance of these advertisements also bored many users. After all, advertisements that pop up suddenly when using a mobile phone will make people feel resistant, and some advertisements can't even be blocked. This is actually one of the ways for mobile phone manufacturers to make money. In fact, smart phones also have security risks, and advertising harassment is still a trivial matter. What's more, you can transfer money directly on your mobile phone.

Sniffing devices cannot guarantee the security of mobile phone information.

Now some people find that their mobile phones and bank cards are not lost, scan unfamiliar QR codes, reveal SMS verification codes, or receive fraudulent calls, but the money in the bank cards is gone. This is an advanced deception sniffing technology.

Sniffing devices are actually a profitable way to obtain private content by stealing users' mobile phone information. Criminals can grasp the information content of users' mobile phones, including short messages, in real time through sniffing equipment. When the sniffer steals information, it will interfere with the user's mobile phone signal, cut off the user's 4G network and only use the 2G network, thus stealing the SMS verification code in the mobile phone. The function of SMS verification code is actually similar to variable password. Once leaked, it means that the criminals have mastered the password of the bank card.

Sniffers are easy to manufacture, have sales channels, and are not difficult to obtain. The price of common sniffer equipment is about 3000-6000 yuan, and the coverage is relatively large, 500-4000 meters, and the interception effect is very good. On the other hand, in order to make the sniffer equipment sell better, the seller even introduced a tutorial to teach how to use it, so it is not difficult to get started with the sniffer equipment.

A method of discovering theft

Then many people will have questions: how does the sniffing device steal the property in the mobile phone? Usually, the operation of sniffing cheating depends on teams, and each team has a clear division of labor.

One is to intercept the SMS verification code within the sniffing range. Sniffing devices can automatically collect this information, and at the same time, they can use other mobile phones to log in various accounts and applications registered by users. Therefore, when a mobile phone receives a suspicious verification code, it may be targeted by a sniffing device.

After the above operation of intercepting information, criminals will piece together the personal information of users, and form an information network through these fragmented information to obtain the bank card number and corresponding identity information of users. Once the information is pieced together, the user's mobile phone will receive a large number of SMS verification codes in a short time, and criminals will sort out the user's personal information through the information after these verification codes.

After the information collection is completed, criminals can easily log on to the user's shopping platform by using the user's personal information, and use the user's payment tool to complete the purpose of transferring the user's money. What's more, they even use this information to make online loans.

Through the above methods, criminals can easily obtain users' personal information only through sniffing and these three steps, threatening users' property security.