Joke Collection Website - Public benefit messages - The old machine was implanted with a Trojan horse and intercepted more than 5 million verification codes. What did they do?

The old machine was implanted with a Trojan horse and intercepted more than 5 million verification codes. What did they do?

Their ultimate goal is to profit from the stolen personal information, but there is a huge profit-making group behind them, which can realize the stolen personal information.

Have you ever been infected with a virus on your mobile phone? Or we can ask, if your mobile phone is infected with a virus, do you know if your mobile phone is broken or infected with a virus? I think this question is difficult for many elderly people to answer, and the suspects involved are also interested. Taking advantage of the fact that the elderly can't skillfully operate mobile phones and have imperfect knowledge of viruses, they began to implant Trojans in their computers to illegally intercept their personal information. This information includes verification codes issued by many official platforms to the elderly.

What kind of confusion will the verification code get if it is intercepted by Trojan virus? It will undoubtedly bring inconvenience to the elderly. For example, if you want to download or log in a software or apply for a program on your mobile phone, the elderly may not be able to do so because they can't receive the verification code. Secondly, the personal information of the elderly has been leaked, and privacy is not guaranteed.

So how do they operate to steal the personal information of the elderly and intercept the huge system behind their verification code? A Trojan horse is implanted in the elderly's computer, which can intercept these messages and send them to the code matching platform. Then the staff responsible for code matching will find out which software sent this verification code, and then these obtained personal information may be resold to some platforms that collect personal information again. These platforms or individuals can use these verification codes to register new software and get coupons and red envelopes for newcomers, thus stealing personal information and verification codes. Of course, there are many other ways to realize cash. But no matter which one, its ultimate goal is to profit from it. The direct use of trojans to intercept is to make money, and the platform for buying personal information is also to make money.