Notice: Undefined index: OS in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/const.inc.php on line 64 Notice: Undefined variable: siters in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 2414 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/const.inc.php on line 108 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 70 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 74 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 158 Notice: Undefined index: SID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 177 Notice: Undefined index: UID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 179 Notice: Undefined variable: UserName in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 180 Notice: Undefined variable: Mobile in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 181 Notice: Undefined variable: Email in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 182 Notice: Undefined variable: Num in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 183 Notice: Undefined variable: keyword in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 184 Notice: Undefined index: ac in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 189 Notice: Undefined index: CHtml in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 191 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 201 Notice: Undefined index: t in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 40 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined variable: strimg in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 1 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 617 Notice: Undefined index: enseo in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3076 Notice: Undefined variable: TPath in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 125 Will mobile phone charging be implanted with a "Trojan"? It's possible-瞭望新时代网-瞭望时代,放眼世界

Sci-Tech

Will mobile phone charging be implanted with a "Trojan"? It's possible

2023-09-18   

Insert the phone into a charging station to charge, and it is implanted into a "Trojan horse" in just a few seconds; Scan the QR code on the street and the payment password will be obtained; After ordering some emails, I was caught in a scam trap... are these rumors true? At the recently held 2023 National Cybersecurity Promotion Week Cybersecurity Expo, staff simulated such a scenario. Fu Jia, Director of the Product Center of Beijing Hongshan Ruida Technology Co., Ltd., inserted his phone into a charging station that had been modified by criminals to charge it. In just a few seconds, the Trojan program was implanted into the phone, and the monitoring terminal on the other end obtained real-time information such as phone photos, recordings, contact lists, file lists, and location. Fu Jia said that this demonstration is to remind everyone to use their own power bank for charging as much as possible, and not to covet cheap use of free charging devices. Meanwhile, Fu Jia suggests that consumers should purchase charging equipment from legitimate manufacturers and try to use original products for charging cables. If the phone is implanted with a Trojan program that can change phone numbers, the risks go far beyond these. Wang Haiqi, Sales Director of the Operations Center of Beijing Hongshan Ruida Technology Co., Ltd., opened the number changing software and entered the phone number. After dialing, the incoming call number on the other end was directly modified to any number set by him. Illegal individuals will use account changing software to disguise their mobile phone numbers as familiar numbers in daily life, such as bank phone numbers, and then impersonate customer service to induce recipients to click on links and input some personal information, thus engaging in fraud, "said Wang Haiqi. In addition, scanning QR codes on the street to receive gifts may also be a scam. Some unscrupulous individuals may simulate the use of static QR codes to induce participants to register personal information, extract payment passwords from users, and then scan and transfer funds, resulting in economic losses. At the expo, the staff demonstrated a scene of scanning codes for payment on site. As soon as the operation was completed, the payment amount, payment password, payment time, and other records on the monitoring screen were immediately displayed - it turned out to be a QR code modified by criminals. Regarding the email virus, Wang Xin, Senior Vice President and Dean of the Research Institute of Hangzhou Anheng Information Technology Co., Ltd., introduced that some criminals will hide the Trojan virus in emails in advance and send it to the target group. Once they click to view it, the virus will obtain computer permissions, change the identity information of friends in the contact book when the target group is not paying attention, forge the identity of acquaintances, superiors, and other individuals, and carry out fraud on the victims. In addition, naked chat fraud, 'pig killing disk' fraud, and counterfeit financial fraud are typical current fraud methods. The common trick is for fraud gangs to disguise themselves as beautiful women and deceive victims into installing live streaming software with viruses. The software will obtain naked chat screenshots through mobile camera permissions and use them to threaten extortion victims, "Wang Xin added. Experts remind that everyone is responsible for personal privacy information and property security, not seeking small gains, and should always be vigilant. For example, to repair a mobile phone, you need to go to a regular repair point, download application software from an application store, do not point to links with unknown sources, and do not scan unfamiliar QR codes. (New News Agency)

Edit:Hu Sen Ming Responsible editor:Li Xi

Source:XinhuaNet

Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com

Recommended Reading Change it

Links