Joke Collection Website - Blessing messages - Why are more than 70% of fraudulent text messages aimed at e-commerce and banks?

Why are more than 70% of fraudulent text messages aimed at e-commerce and banks?

The "SMS thief" stole nearly 800 mobile phone accounts, and the amount of fraud exceeded 1.5 million.

More than 70% of scam messages are aimed at users' money.

"This is your child's report card." "Do you know this man?" ..... After receiving this short message from an acquaintance, click the link attached to the short message, the mobile phone will be implanted with a Trojan horse, and the money in the bank card will be looted. Recently, the police in Huaibei City, Anhui Province successfully cracked a "SMS thief" Trojan horse theft case. With the technical support of 360 Security Center, Huaibei police destroyed the entire criminal gang that produced, disseminated, stole and sold Trojans, and arrested 9 suspects across four provinces. According to the preliminary investigation, in only half a year, nearly 65,438+10,000 mobile phones were infected by Trojans, nearly 800 people suffered economic losses, and the amount of gang fraud exceeded 1.55 million.

The bank card was stolen after clicking on the short message of an acquaintance.

Not long ago, Mr. Liu, a citizen of Huaibei, suddenly received a short message and wrote: "Haifeng, do you think this woman is familiar?" There is a link after the text. Seeing the information sent by an acquaintance, Mr. Liu clicked on the link without much thought. After going in, I found that I didn't understand English, so Mr. Liu deleted the message.

Early the next morning, Mr. Liu suddenly received short messages continuously, and his bank card was spent twice 1960 yuan. The password has never been told to others. How can I spend it? Worried about the safety of funds in the card 1 10,000, Mr. Liu quickly went to the bank for help, transferred the balance in the card, and then reported the case to the police.

Huaibei public security found that Mr. Liu's mobile phone was actually a scam message. After clicking on the SMS link, the mobile phone automatically installed a Trojan horse program, and information such as address book and SMS was intercepted and stolen by criminals. According to the stolen SMS verification code and other information, criminals stole the money from the bank card bound by Mr. Liu's mobile phone. At the same time, after Mr. Liu clicked on the link, similar short messages were automatically sent to many of his address book friends.

Nearly 654.38+10,000 mobile phones in China were infected and controlled.

According to Huaibei police, when analyzing the Trojan horse program, the task force found that it was bound with a mobile phone number and email address used to intercept the victim's short message, and the information stolen by the Trojan horse would be returned to this mobile phone and email address. The task force then sought technical support from 360. Through the analysis of Trojans, 360 mobile phone security experts found that 199 Trojans were associated with the source code, and these 199 Trojans * * * were bound with 2 mailboxes and 7 mobile phone numbers to receive the victim's short messages.

According to the technical analysis clues provided by 360, Huaibei police further investigated the email address and mobile phone number set by Trojan horse, and a criminal black production chain integrating Trojan horse production, Trojan horse spread, Trojan horse fraud (stolen brush) and online fence gradually surfaced. Huaibei police confirmed that Dong, a native of Xingtai, Hebei, was responsible for making horses, and Meng, a native of Binyang, Guangxi, bought servers and mobile phone numbers, sent short messages such as "Looking at children's report cards" and "There are many good-looking videos here" in a targeted manner, and used viruses to steal bank cards, buy virtual items such as game cards, and then sell the virtual items to Zheng in Sichuan and Dou in Liaoning for cash.

360 bonfire laboratory security experts said that the mobile phone made by Dong was extremely confusing. If professional detection and interception software is not installed on the Android phone, once you click the Trojan link in the short message, it will be easy to get caught. Not only will your online banking verification code be stolen by criminal gangs, but it may also hurt relatives and friends. After Trojan infects the mobile phone, it will automatically send a short message with Trojan link to the contacts in the address book, and fill in the names of friends in the address book in the short message. "Many people will relax their vigilance when they see text messages sent by acquaintances and call themselves. This worm-like message Trojan will infect a large number of' streaking' mobile phones in a short time. "

At the beginning of March, in order to smash the whole criminal chain in one fell swoop, the task force was divided into four roads and rushed to Xingtai, Hebei, Binyang, Guangxi, Deyang, Sichuan and Anshan, Liaoning for arrest. According to the police, the gang upgraded mutant Trojans according to different periods. At present, hundreds of Trojan horses have been mutated. In half a year, there were nearly 654.38+10,000 mobile phones for infection control in China, with a loss of nearly 800 people. The amount of gang fraud exceeds 1.55 million. At present, the case is under further investigation.

Among spam messages, fraudulent messages account for 7.6%.

The "20 17 China Mobile Phone Security Risk Report" released 360 days ago shows that 99.99% of Android phones in the survey have system security vulnerabilities. Last year, the phishing platform * * * received online fraud reports submitted by users all over the country, involving 654.38+95 million yuan.

360 Mobile Guardian selected 42 vulnerabilities with the highest detection rate in Android and Chrome security bulletins in the past two years, including 8 serious vulnerabilities, 23 high-risk vulnerabilities and 1 1. Through the analysis of 700,000 vulnerability detection reports actively uploaded by 360 lens users, the results show that 99. 1% of Android devices are harmed by medium-risk vulnerabilities, and 99.9% of devices are vulnerable to attacks.

At the same time, from 20 12, the number of mobile malicious programs jumped from hundreds of thousands to tens of millions, entering a stable high-incidence period. Among all malicious programs, malicious programs that steal privacy steal users' personal privacy, bank account number, SMS verification code and other information. , the most harmful to users. When malicious applications counterfeit apps directly related to payment accounts, such as e-commerce and online banking, it is even more confusing.

20 17 in the first quarter, 360 mobile guards intercepted about 2.40 billion spam messages for users nationwide, with an average of 26.66 million spam messages intercepted every day. Although fraudulent short messages only account for 7.6% of spam messages, more than 70% of them pretend to be e-commerce and banks, in order to steal users' money and trick users into paying information and related personal privacy.