2024-08-31
한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina
friends, please imagine
the following scenarios
■ the person sitting over there is typing, buteverything he said could be heard here;
■ he put his phone aside, evenyou can see his face remotely without unlocking the phone;
■ he picked up his phone and chatted with people on wechat.the chat content can also be viewed in real time across the air;
these scenarios
not in the movie
but it really happens around you!
isn’t it “terrifying when you think about it”?
is your personal information safe?
information security
it concerns personal privacy and even property safety
once a leak occurs, the consequences will be disastrous.
nowadays, people’s daily lives have long been inseparable from mobile phones, which store a large amount of personal communication information, photos, consumption data, etc. however, this information has been targeted by some people and has become a tool for them to make illegal profits.
someone is taking advantage of a system vulnerabilitymade
dedicated tools
to steal other people's information
and sell these tools online
not only the "scene re-enactment" at the beginning, but also people's short video platform browsing, wechat calls and phone recordings, real-time positioning, and even the screen information currently being viewed can all be "under control".
recent
the reporter found on a social platform
someone is selling it publicly
tools that can spy on other people's privacy
in the chat group, the group owner released a variety of monitoring tools, claiming that theyit only takes one minute to turn the phone of the person you want to monitor into an eavesdropping device or chat recorder, and monitor the phone screen, audio and video in real time.
after contacting the seller,
the other party said
↓↓↓
● if you have an android phone, you can realize all these functions by spending about 2,000 yuan. the simplest one only requires you to know the other party’s mobile phone number.
● for apple phones, they also have a way to view each other’s wechat messages simultaneously without showing the login on other devices.
the seller also sent a demonstration video
shows that they will give each other their phone first
send a remote push
prompt the other party that the software needs to be updated
once the user clicks
a pop-up will appear on your phone
automatic authorization information
then your phone
become the other party's surveillance
the software is hidden and difficult to detect!
to verify
the reporter paid
afterwards
the other party sent two mobile phone installation files
one is installed on the controlled mobile phone. once the file is opened, the software will automatically set the required permissions in less than a minute. then click to hide.the program will disappear from the desktop.when checking background running tasks,it is difficult for ordinary users to notice anything unusual.
the app will then disappear from the phone desktop.
after installing the second installation package on another mobile phone, you can conduct all-round monitoring of the previous mobile phone.you can know what messages the other party sent, what videos they watched, and what they said.moreover, it is difficult for the owner of the accused mobile phone to discover that he has entered "streaking mode".
lawyer yang zouhua:
in fact, it is very difficult to find the victim, and it may be a long time before such things are finally discovered. therefore, in this case, it will bring greater difficulty to the investigation.
the reporter also asked
cybersecurity expert
it is reported that the seller's program can control other mobile phones because it may have exploited a vulnerability in the android system. even if wechat, tiktok and other software use encrypted communication during transmission, malicious programs can still be used to read other app data, activate cameras and microphones, and perform other operations locally.some mobile phone models lack obvious prompts when related permissions are called.it is easier for these unscrupulous businesses to exploit them and engage in illegal activities.
jiang kaida, deputy director of the information promotion office and network information center of shanghai jiao tong university:
for example, when you install it, you agree that it can always use your microphone, which is very common. if you always use the microphone, it will always monitor your microphone;
there is another situation, that is, your mobile phone itself has a vulnerability. in this case, others may not need your consent to download a program. the malicious program intentionally created by the attacker can read more content, which may lead to the leakage of a lot of sensitive personal information.
invasion of others' privacy is a crime
legal experts pointed out that according to relevant laws and regulations, selling related programs harms the interests of others, and purchasing such programs to monitor the behavior of others,may constitute a crime.if the collected videos, recordings, etc. are used to commit other crimes,face multiple punishments.
lawyer yang zouhua:
merchants who sell this type of product online are guilty of providing tools to illegally access and control computer systems;
if the buyer involves some financial information in the system and uses this financial information for profit, then it may involve financial crimes;
using hacking techniques to obtain the privacy of others and then blackmailing a party may constitute the crime of extortion.
so is there any way
try to avoid
how do these situations occur?
experts say,update your mobile phone system to the latest version through official channels in a timely manner.it can significantly reduce the possibility of system vulnerabilities being exploited by attackers.install and update through official app storesmobile phone applications are safer and more trustworthy.
in recent years, public security in many parts of the country
all have been cracked
selling mobile phone location monitoring software case,
case of a gang illegally manufacturing and selling mobile phone monitoring software, etc.
police tips:
↓↓↓
citizens' personal privacy is protected by law and cannot be violated. illegally obtaining other people's information and violating personal privacy are both illegal acts, and those who constitute a crime must bear criminal liability.
platforms and relevant departments should also strengthen supervision to safeguard the bottom line of information security for the people on the internet.
(please click on the video for detailed report↓)