It's terrifying to think about it! Two apps and one minute can make your phone "naked" in front of strangers? ! Police remind →

It's terrifying to think about it! Two apps and one minute can make your phone "naked" in front of strangers? ! Police remind →

Sitting far away typing

Your phone can hear everything you say

No need to unlock

I can see your face remotely.

Pick up your phone and chat with others

All chat content can be viewed in real time

A scene straight out of a movie

It's really happening around you

If you think about it carefully, isn’t it “terrifying when you think about it”?

In modern people's mobile phones

Stores everything about a person

Personal communication information, photos, consumption data

Mobile phone information security

Personal privacy and property security

Closely connected

But someone was watching

This information on the phone

Exploiting system vulnerabilities to create

Dedicated tools

To steal other people's information for illegal profit

recently

The reporter found on the social platform

Someone is selling it publicly

Tools that can spy on other people's privacy

In the chat group, the group owner released a variety of monitoring tools, claiming that it only takes one minute for them to monitor the phone screen of the person you want to monitor, record audio and video, and even eavesdrop on the sounds around the other person's phone in real time.

The seller said that if it is an Android phone, all functions can be realized for only 2,000 yuan, and the simplest operation only requires knowing the other party's mobile phone number; even if it is an Apple phone, you can receive the other party's WeChat messages synchronously, and it will not show the login on other devices.

The seller then showed the reporter a demonstration video, which showed that the tool would first send a remote push notification to the other party, prompting the other party that there was a software update required. Once the user clicked on it, an automatic authorization message would pop up on the phone, and then the phone would completely become a surveillance camera for the other party.

To verify

After the reporter paid the fee

The other party sent two mobile phone installation files

After testing, it was found that after the controlled mobile phone opened the file, the software could automatically set the required permissions in less than 1 minute. Then click to hide and the program would disappear from the desktop. When checking the tasks running in the background, it would be difficult for ordinary users to notice anything unusual.

After installing the second installation package on the controlling mobile phone, the controlled mobile phone can be monitored in all directions, and it is difficult for the owner of the controlled mobile phone to find anything unusual.

According to network security experts, this program exploits a vulnerability in the Android system. Even if WeChat, TikTok and other software use encrypted communications during transmission, malicious programs can still be used locally to read other APP data, activate cameras and microphones, and perform other operations. In addition, some mobile phone models lack obvious prompts when relevant permissions are called, making them more easily exploited by these unscrupulous businesses to engage in illegal activities.

Legal experts pointed out that merchants who sell such products online are suspected of providing programs and tools for invading and illegally controlling computer systems. If the buyer involves some financial information in the system and then uses this financial information for profit, it may involve financial crimes. According to relevant laws and regulations, selling related programs to damage the interests of others, and purchasing such programs to monitor the behavior of others may constitute crimes. If the collected videos, recordings, etc. are also used to commit other crimes, they will also face multiple punishments.

How to avoid

These situations occur?

Experts say that timely upgrading the mobile phone system to the latest version through official channels can significantly reduce the possibility of system vulnerabilities being exploited by attackers. At the same time, mobile phone application software installed and updated through regular official application markets are also relatively more secure and trustworthy.

Police Tips:

Citizens' personal privacy is protected by law and cannot be violated. Illegally obtaining other people's information and violating personal privacy are both illegal acts, and those who constitute a crime must bear criminal liability.

Platforms and relevant departments should also strengthen supervision to safeguard the bottom line of information security for the people on the Internet.

Source: Shanghai News Radio, News Workshop

<<:  In order to get sunlight at night, they installed a large mirror on the satellite...|Environmental Trumpet

>>:  Millions of IPs Create Popular Science and Technology Talents to Strengthen the Country丨Exploring the Secrets Deep in the Earth: "Crust No. 1" 10,000-meter Drilling

Recommend

Inventory of the most effective App promotion channels at present!

What exactly is APP promotion for? Is it a channe...

How did Momo gain tens of millions of users in just one year?

In June 2011, Boss Wang (Wang Li called himself B...

As a new app, you can't miss these free resources

For a new app, you may hope to get some market re...

How to build a marketing platform from 0 to 1?

Marketing platform , different people have differ...

Guide to creating a Tik Tok corporate account!

Entering 2018, "Two Weibo and One Douyin&quo...

Analysis of the four factors in the game between Tik Tok and its users!

Based on the four elements of game theory, this p...

Tech keywords for 2016: layoffs, VR/AR, IoT

2015 has been a long and busy year, and my crysta...