Will mobile phone charging be implanted with a "Trojan"? It's possible
2023-09-18
Insert the phone into a charging station to charge, and it is implanted into a "Trojan horse" in just a few seconds; Scan the QR code on the street and the payment password will be obtained; After ordering some emails, I was caught in a scam trap... are these rumors true? At the recently held 2023 National Cybersecurity Promotion Week Cybersecurity Expo, staff simulated such a scenario. Fu Jia, Director of the Product Center of Beijing Hongshan Ruida Technology Co., Ltd., inserted his phone into a charging station that had been modified by criminals to charge it. In just a few seconds, the Trojan program was implanted into the phone, and the monitoring terminal on the other end obtained real-time information such as phone photos, recordings, contact lists, file lists, and location. Fu Jia said that this demonstration is to remind everyone to use their own power bank for charging as much as possible, and not to covet cheap use of free charging devices. Meanwhile, Fu Jia suggests that consumers should purchase charging equipment from legitimate manufacturers and try to use original products for charging cables. If the phone is implanted with a Trojan program that can change phone numbers, the risks go far beyond these. Wang Haiqi, Sales Director of the Operations Center of Beijing Hongshan Ruida Technology Co., Ltd., opened the number changing software and entered the phone number. After dialing, the incoming call number on the other end was directly modified to any number set by him. Illegal individuals will use account changing software to disguise their mobile phone numbers as familiar numbers in daily life, such as bank phone numbers, and then impersonate customer service to induce recipients to click on links and input some personal information, thus engaging in fraud, "said Wang Haiqi. In addition, scanning QR codes on the street to receive gifts may also be a scam. Some unscrupulous individuals may simulate the use of static QR codes to induce participants to register personal information, extract payment passwords from users, and then scan and transfer funds, resulting in economic losses. At the expo, the staff demonstrated a scene of scanning codes for payment on site. As soon as the operation was completed, the payment amount, payment password, payment time, and other records on the monitoring screen were immediately displayed - it turned out to be a QR code modified by criminals. Regarding the email virus, Wang Xin, Senior Vice President and Dean of the Research Institute of Hangzhou Anheng Information Technology Co., Ltd., introduced that some criminals will hide the Trojan virus in emails in advance and send it to the target group. Once they click to view it, the virus will obtain computer permissions, change the identity information of friends in the contact book when the target group is not paying attention, forge the identity of acquaintances, superiors, and other individuals, and carry out fraud on the victims. In addition, naked chat fraud, 'pig killing disk' fraud, and counterfeit financial fraud are typical current fraud methods. The common trick is for fraud gangs to disguise themselves as beautiful women and deceive victims into installing live streaming software with viruses. The software will obtain naked chat screenshots through mobile camera permissions and use them to threaten extortion victims, "Wang Xin added. Experts remind that everyone is responsible for personal privacy information and property security, not seeking small gains, and should always be vigilant. For example, to repair a mobile phone, you need to go to a regular repair point, download application software from an application store, do not point to links with unknown sources, and do not scan unfamiliar QR codes. (New News Agency)
Edit:Hu Sen Ming Responsible editor:Li Xi
Source:XinhuaNet
Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com