news

it’s terrifying to think about it! your phone may be being monitored... shanghai police urgently warn

2024-08-31

한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina

friends, please imagine

the following scenarios

■ the person sitting over there is typing, buteverything he said could be heard here;

■ he put his phone aside, evenyou can see his face remotely without unlocking the phone;

■ he picked up his phone and chatted with people on wechat.the chat content can also be viewed in real time across the air;

these scenarios

not in the movie

but it really happens around you!

isn’t it “terrifying when you think about it”?

is your personal information safe?

information security

it concerns personal privacy and even property safety

once a leak occurs, the consequences will be disastrous.

nowadays, people’s daily lives have long been inseparable from mobile phones, which store a large amount of personal communication information, photos, consumption data, etc. however, this information has been targeted by some people and has become a tool for them to make illegal profits.

someone is taking advantage of a system vulnerabilitymade

dedicated tools

to steal other people's information

and sell these tools online

not only the "scene re-enactment" at the beginning, but also people's short video platform browsing, wechat calls and phone recordings, real-time positioning, and even the screen information currently being viewed can all be "under control".

recent

the reporter found on a social platform

someone is selling it publicly

tools that can spy on other people's privacy

in the chat group, the group owner released a variety of monitoring tools, claiming that theyit only takes one minute to turn the phone of the person you want to monitor into an eavesdropping device or chat recorder, and monitor the phone screen, audio and video in real time.

after contacting the seller,

the other party said

↓↓↓

● if you have an android phone, you can realize all these functions by spending about 2,000 yuan. the simplest one only requires you to know the other party’s mobile phone number.

● for apple phones, they also have a way to view each other’s wechat messages simultaneously without showing the login on other devices.

the seller also sent a demonstration video

shows that they will give each other their phone first

send a remote push

prompt the other party that the software needs to be updated

once the user clicks

a pop-up will appear on your phone

automatic authorization information

then your phone

become the other party's surveillance

the software is hidden and difficult to detect!

to verify

the reporter paid

afterwards

the other party sent two mobile phone installation files

one is installed on the controlled mobile phone. once the file is opened, the software will automatically set the required permissions in less than a minute. then click to hide.the program will disappear from the desktop.when checking background running tasks,it is difficult for ordinary users to notice anything unusual.

the app will then disappear from the phone desktop.

after installing the second installation package on another mobile phone, you can conduct all-round monitoring of the previous mobile phone.you can know what messages the other party sent, what videos they watched, and what they said.moreover, it is difficult for the owner of the accused mobile phone to discover that he has entered "streaking mode".

lawyer yang zouhua:

in fact, it is very difficult to find the victim, and it may be a long time before such things are finally discovered. therefore, in this case, it will bring greater difficulty to the investigation.

the reporter also asked

cybersecurity expert

it is reported that the seller's program can control other mobile phones because it may have exploited a vulnerability in the android system. even if wechat, tiktok and other software use encrypted communication during transmission, malicious programs can still be used to read other app data, activate cameras and microphones, and perform other operations locally.some mobile phone models lack obvious prompts when related permissions are called.it is easier for these unscrupulous businesses to exploit them and engage in illegal activities.

jiang kaida, deputy director of the information promotion office and network information center of shanghai jiao tong university:

for example, when you install it, you agree that it can always use your microphone, which is very common. if you always use the microphone, it will always monitor your microphone;

there is another situation, that is, your mobile phone itself has a vulnerability. in this case, others may not need your consent to download a program. the malicious program intentionally created by the attacker can read more content, which may lead to the leakage of a lot of sensitive personal information.

invasion of others' privacy is a crime

legal experts pointed out that according to relevant laws and regulations, selling related programs harms the interests of others, and purchasing such programs to monitor the behavior of others,may constitute a crime.if the collected videos, recordings, etc. are used to commit other crimes,face multiple punishments.

lawyer yang zouhua:

merchants who sell this type of product online are guilty of providing tools to illegally access and control computer systems;

if the buyer involves some financial information in the system and uses this financial information for profit, then it may involve financial crimes;

using hacking techniques to obtain the privacy of others and then blackmailing a party may constitute the crime of extortion.

so is there any way

try to avoid

how do these situations occur?

experts say,update your mobile phone system to the latest version through official channels in a timely manner.it can significantly reduce the possibility of system vulnerabilities being exploited by attackers.install and update through official app storesmobile phone applications are safer and more trustworthy.

in recent years, public security in many parts of the country

all have been cracked

selling mobile phone location monitoring software case,

case of a gang illegally manufacturing and selling mobile phone monitoring software, etc.

police tips:

↓↓↓

citizens' personal privacy is protected by law and cannot be violated. illegally obtaining other people's information and violating personal privacy are both illegal acts, and those who constitute a crime must bear criminal liability.

platforms and relevant departments should also strengthen supervision to safeguard the bottom line of information security for the people on the internet.

(please click on the video for detailed report↓)