Joke Collection Website - Public benefit messages - What is phishing software?

What is phishing software?

Phishing software usually uses well-designed fake web pages to lure users into being deceived to steal bank account numbers, credit card numbers, etc., which is illegal.

Phishing usually refers to websites that disguise themselves as banks and e-commerce and steal private information such as bank account numbers and passwords submitted by users. You can use Computer Manager to detect and kill them. "Phishing" is a type of online fraud, which refers to criminals using various means to counterfeit the URL address and page content of a real website.

Or use vulnerabilities in the real website server program to insert dangerous HTML code into some web pages of the site to defraud users of their bank or credit card account numbers, passwords and other private information.

The most typical phishing attack lures the recipient to a carefully designed phishing website that is very similar to the website of the target organization, and obtains the sensitive personal information entered by the recipient on this website. Usually this The attack does not alert the victim.

Extended information:

There are many "phishing" methods used by online hackers, which can be summarized as follows:

1. Sending spam emails Luring users into taking the bait

This type of method uses false information to lure users into the trap. Hackers send a large number of fraudulent emails. These emails often use content such as winning prizes, consultants, and reconciliation to lure users into filling in their financial account numbers and information. Password, or for various urgent reasons, require the recipient to log in to a webpage and submit user name, password, ID number, credit card number and other information, and then steal user funds.

2. Establish fake online banking and online securities websites

The hackers defrauded user accounts and passwords to carry out theft. The hackers established domain names and web page contents that were very similar to real online banking systems and online securities trading platforms. Websites that induce users to log in and enter information such as account numbers and passwords, and then steal funds through real online banking and online securities systems.

3. URL hiding

According to the rules of Hypertext Markup Language (HTML), hyperlinks can be made to text, which gives phishers an opportunity. Looking at the source code of the letter will quickly reveal the mystery, as the phisher wrote it like this. In this way, Bbank's URL is displayed on the screen but it actually links to Abank's trap website.

4. Use fake e-commerce to commit fraud

Hackers set up e-commerce websites, or publish false product sales information on relatively well-known and large e-commerce websites. Hackers After receiving the victim's shopping remittance, he disappeared. Except for a few hackers who build their own e-commerce websites, most hackers are employed on well-known e-commerce websites.

5. Use Trojans and hacking techniques to steal user information and then commit theft

Hackers spread Trojan programs by sending emails or hiding Trojans on websites. When users infected with Trojans During online transactions, Trojan horse programs can obtain user accounts and passwords and send them to designated email addresses. User funds will be seriously threatened.

6. Use vulnerabilities such as weak user passwords to crack and guess user accounts and passwords

Hackers use some user passwords to set accounts that are too simple to crack account passwords. There are many weak password cracking hacking tools available for free download on the Internet. They can crack various relatively simple usernames and passwords in a very short time.

Baidu Encyclopedia - Fishing Website

Baidu Encyclopedia - Fishing

People's Daily Online - "Technology Geek" was sentenced for illegally profiting from "online game gift package website" by phishing and stealing accounts