Joke Collection Website - Public benefit messages - How do telecom fraudsters obtain identity information?

How do telecom fraudsters obtain identity information?

First, Trojan virus steals information.

Among all the criminal means, Trojan SMS has become a common fraud means for criminals. They pretend to be school teachers, classmates and even mistresses, and send Trojan messages to mobile phone users around them through pseudo base stations. As long as the user clicks on the SMS link, all kinds of online banking accounts, passwords and SMS verification codes will be stolen by Trojans and forwarded to criminals.

Second, use website vulnerabilities to steal information.

Major websites were exploited by criminals because of network loopholes, which led to the disclosure of a large number of users' personal information. According to the data, in 20 15 years, 360' s "patch the sky" platform (the largest vulnerability broadcast platform in China) collected 14 10 vulnerabilities that may lead to the disclosure of personal information on websites, involving 1282 websites, with 5.53 billion pieces of personal information that may be leaked. If the total number of netizens in China is 650 million, it means that in 20 15 years, at least 8 pieces of personal information of each netizen in China will be leaked. What is even more worrying is that these websites are not active in fixing vulnerabilities, and the overall repair rate is only 8.0%.

Third, free WiFi and QR code hide "black hands".

"Dead vines and old trees faint, air-conditioned WiFi watermelon, Ge You sofa with the same paragraph, sunset, I will go there." This paragraph explains the indispensability of the combination suit of mobile phone and WiFi in people's lives. Because of this, free WiFi has become the hardest hit by privacy leaks. The data shows that Tencent mobile phone housekeeper users have more than 200 million WiFi connections every day, of which about 600,000 are connected to risky WiFi every day. Once connected to fraudulent WiFi, your online banking, payment account number, password and other information may be stolen by criminals without your knowledge.

In addition, malicious QR codes are also one of the means of criminals. The user scans the malicious QR code, which is equivalent to clicking a short message link with Trojan virus, and the mobile phone will be implanted with Trojan virus. According to the survey data, among teenagers aged 7- 19, the proportion of "frequently scanning QR codes regardless of safety" is as high as 40.3%.

Fourth, the login password is simple and unified, and it is easy to be cracked.

A code is easy to use and easy to remember, but there are many security risks. When criminals steal or crack one of your accounts, they will try to log in the corresponding data of other websites or accounts. The technical term is "library collision".