It's terrifying to think about it! Two apps and one minute can make your phone "naked" in front of strangers? ! Police remind →

It's terrifying to think about it! Two apps and one minute can make your phone "naked" in front of strangers? ! Police remind →

Sitting far away typing

Your phone can hear everything you say

No need to unlock

I can see your face remotely.

Pick up your phone and chat with others

All chat content can be viewed in real time

A scene straight out of a movie

It's really happening around you

If you think about it carefully, isn’t it “terrifying when you think about it”?

In modern people's mobile phones

Stores everything about a person

Personal communication information, photos, consumption data

Mobile phone information security

Personal privacy and property security

Closely connected

But someone was watching

This information on the phone

Exploiting system vulnerabilities to create

Dedicated tools

To steal other people's information for illegal profit

recently

The reporter found on the social platform

Someone is selling it publicly

Tools that can spy on other people's privacy

In the chat group, the group owner released a variety of monitoring tools, claiming that it only takes one minute for them to monitor the phone screen of the person you want to monitor, record audio and video, and even eavesdrop on the sounds around the other person's phone in real time.

The seller said that if it is an Android phone, all functions can be realized for only 2,000 yuan, and the simplest operation only requires knowing the other party's mobile phone number; even if it is an Apple phone, you can receive the other party's WeChat messages synchronously, and it will not show the login on other devices.

The seller then showed the reporter a demonstration video, which showed that the tool would first send a remote push notification to the other party, prompting the other party that there was a software update required. Once the user clicked on it, an automatic authorization message would pop up on the phone, and then the phone would completely become a surveillance camera for the other party.

To verify

After the reporter paid the fee

The other party sent two mobile phone installation files

After testing, it was found that after the controlled mobile phone opened the file, the software could automatically set the required permissions in less than 1 minute. Then click to hide and the program would disappear from the desktop. When checking the tasks running in the background, it would be difficult for ordinary users to notice anything unusual.

After installing the second installation package on the controlling mobile phone, the controlled mobile phone can be monitored in all directions, and it is difficult for the owner of the controlled mobile phone to find anything unusual.

According to network security experts, this program exploits a vulnerability in the Android system. Even if WeChat, TikTok and other software use encrypted communications during transmission, malicious programs can still be used locally to read other APP data, activate cameras and microphones, and perform other operations. In addition, some mobile phone models lack obvious prompts when relevant permissions are called, making them more easily exploited by these unscrupulous businesses to engage in illegal activities.

Legal experts pointed out that merchants who sell such products online are suspected of providing programs and tools for invading and illegally controlling computer systems. If the buyer involves some financial information in the system and then uses this financial information for profit, it may involve financial crimes. According to relevant laws and regulations, selling related programs to damage the interests of others, and purchasing such programs to monitor the behavior of others may constitute crimes. If the collected videos, recordings, etc. are also used to commit other crimes, they will also face multiple punishments.

How to avoid

These situations occur?

Experts say that timely upgrading the mobile phone system to the latest version through official channels can significantly reduce the possibility of system vulnerabilities being exploited by attackers. At the same time, mobile phone application software installed and updated through regular official application markets are also relatively more secure and trustworthy.

Police Tips:

Citizens' personal privacy is protected by law and cannot be violated. Illegally obtaining other people's information and violating personal privacy are both illegal acts, and those who constitute a crime must bear criminal liability.

Platforms and relevant departments should also strengthen supervision to safeguard the bottom line of information security for the people on the Internet.

Source: Shanghai News Radio, News Workshop

<<:  In order to get sunlight at night, they installed a large mirror on the satellite...|Environmental Trumpet

>>:  Millions of IPs Create Popular Science and Technology Talents to Strengthen the Country丨Exploring the Secrets Deep in the Earth: "Crust No. 1" 10,000-meter Drilling

Recommend

Foreign media comprehensive interpretation: iOS 9 everything we must know

[[141369]] Do you still have unanswered questions...

I was deceived for 20 years! TV contrast is actually meaningless

Generally speaking, the contrast of a TV is a ver...

How many pixels does your camera really need?

Technology is advancing at a rapid pace, which ra...

An interview question: How did Uber recruit 1,000 drivers in a week?

An interview question and answer for an Uber oper...

How to increase Internet users!

When it comes to user growth , most people will t...

App promotion tips: in-depth analysis of how to direct traffic to the app?

Introduction: Generating traffic and users is not...

Windows 10 Build 9860 is here and can only be updated via Update

On Tuesday, Microsoft updated the technical previ...

How to make a good online event promotion plan?

In marketing psychology, herd mentality, greed fo...

User operation, how to achieve a breakthrough from 0 to 1?

Users, as one of the most important factors in pr...