QQ Hidden Behind The Small Penguin Black Hacking Industry Chain
It is understood that the virtual currency of the Internet world has reached tens of billions of yuan. The number of registered users of Tencent has reached 400 million, and the number of active users is 170 million. The 100 million QQ number is a huge virtual property. However, as we all know, QQ is the most vulnerable and highly stolen.
A senior practitioner engaged in QQ transactions posted a popular forum on the name of "grab and rush" and wrote what he saw and heard in the industry chain over the past few years, revealing all the little known insider in QQ transactions.
Fry originated QQ Trading
"Grab and rush" said that the number of QQ has been increasing due to the surge of QQ users. The number of short positions has soared since the official stop selling 6 beautiful numbers in 2007. The 6 digit number has risen from about 100 yuan to 1000 yuan at that time, and 5 has risen from several hundred yuan to three thousand or four thousand yuan. The surge in prices has also made the theft industry flourishing.
"Grab and rush," said Trojan horse is the main force of the stolen number. When you browse the web, you may unwittingly get into the Trojan horse, and the latest Trojan horse is free from kill. You can kill it without killing. "The anti-virus software is updated every day, and those who write Trojan horses will not be idle." The Trojan gets your QQ password and automatically sends it to the web page or mailbox that hackers make. Then the seller sells these stolen QQ passwords in his own business circle, and divides them into 1000 numbers and one package. This package is called a letter, which is the QQ envelope, the first stage - the end of the theft.
Sweep the information of the loser.
"Grab and rush" and then reveal the next link in the industry chain. The stolen QQ code was sold in 1000 packages wrapped as "envelopes" and sold to the next house. The person who got the envelope could not log in one by one, so the corresponding professional software came out of the letter. It takes about 1 to 2 hours to check the information of 1000 QQ numbers with scanning software. The principle is to find corresponding addresses to inquire directly, so the QQ number of the owner will not be logged. Scanning software can find out the level of QQ, password protection status, qq COINS, QQ points, shopping vouchers, coupons, QQ groups, QQ diamonds, and whether it is Liang Hao and so on. So far, the second stage of the industrial chain has basically been completed.
Then the professional "eat goods" role was born. If the QQ coins and QQ points on the QQ number can be sold to the professional receiver at a few discount prices, the QQ coins will be consumed in an instant, which is called "seconds to eat". Although Tencent has been making measures, there is always a way to keep you clean.
"Grab and rush" said that the 7 QQ has a relatively high risk factor in the near future, because the 5 and 6 prices are high, 8 and 9 are not worth doing, so a large number of "practitioners" have turned to 7 places.
He reminded you that if your number is 5, 6, 7 or 8 or 9 very beautiful numbers or high grades, it happens that it is not the two generation password protection, you have not opened a member, then you have to be careful. What you need to do is upgrade to two generation password protection as quickly as possible.
"Now that the two generation password protection wants to break, only by finding the real answers to questions, 5, 6 or other beautiful numbers, those who break numbers will not give up easily. Birthplaces, careers and spouse birthdays are the easiest to crack. Information about parents needs special means. So another industry was born - checking accounts. Do this in various ways to enter the public security network, check your account is very simple. If you encounter a problem like your parents' name and birthday, and your QQ number is very attractive, your account will probably be checked.
Fishing camouflage mailbox creates traps
"Grab and rush" also mentioned that last year, another kind of hacking means was born - fishing. Jiang Tai Gong fishing, willing to hook. The first thing to do is register a mailbox which is very similar to the system mailbox, then send it to the 5, 6 digit, the beautiful number to send the camouflage mail, disguise as the system mail prompt you to let you upgrade the permanent protection and so on, the security consciousness bad person believes in the truth, writes all known data to the camouflage page. This method is nothing new, such fraud on Taobao has long existed.
There is another way of fishing, that is, he stole your QQ number, and then posing as you cheat your friend's money. "I've seen some screenshots of them being cheated, and they are pretty smart. There is not much talk, but the reason is absolutely sufficient. The reason why you usually use it is that you need money to meet anything and lend you money tomorrow. Those who are willing to lend you money usually have a good relationship with you. The real owner does not know that he has already borrowed money from friends, and the cheated person is embarrassed to ask for it, so the time is long and the impact is very serious. And the cheater has been carrying away the money of your friend.
Remind private information not to put QQ inside.
Many people have encountered the theft of QQ. "Grab and rush" reminds everyone, if so, please calm down. Don't be angry and scolding everywhere, thieves can't hear you. What you need to do immediately is to see if there are any bad effects on friends, whether important information in the number has been changed or emptied. "Here is a hint especially for the beauties. Don't put the private photos in the space encrypted albums or QQ hard drives. We have seen the blackmail blackmail on the Cye.com.cn news. What I want to say is that there is nothing impossible on the Internet. Don't feel so far away from you. For convenience, ordinary users can put private photos, online banking materials, Taobao data and online games information in QQ hard drives or QQ mailboxes, which may become other people's prey. Many people have the same QQ password and Taobao password, while Taobao's contact mailbox uses QQ mailbox, even the ID card scan is placed in QQ. With these, your Alipay basically hung up. QQ has also led to many industries in Taobao, and is a private sector of accounts, especially Taobao sellers. QQ should be properly handled.
- Related reading
Obama'S Visit To China &Nbsp; Promoting China'S Private Business Opportunities
|- Fashion character | What Are The Big Coffee Makers Doing This Spring?
- Expo News | Jiangsu (Shengze) First Textile Expo Exhibition Fashion Fabric
- Recommended topics | 2014 Spring And Summer, Sunscreen Is Better From Clothing.
- Other | Jiangsu International Garment Festival Highlights Pformation Direction
- Innovation and invention | Dr. Tsing Hua'S Father'S Regiment Creates "Children'S Haze Prevention Mask".
- Association dynamics | China Industrial Textiles Association Held Its Four Four Session
- Market topics | China Cotton Situation Monthly Report: Cotton Farmers' Cotton Planting Intention Further Reduced
- Chamber of Commerce | 2014 Home Textile And Ceramic Docking Conference Held In Dehua, Fujian
- Technology Extension | TESTEX Sophisticated Testing Equipment Helps To Improve Yarn Detection Level
- Show show | Gao Dekang: Original Design Is The Soul Of Clothing.
- Four Strategies For Making Differentiation In Entrepreneurship
- Yao Junda: Buying And Selling Second-Hand Brand Bags Earn Over 100 Million A Year
- Tengzhong Buy Hummer "Stir Up Show": Failed Trading Is A Win-Win Outcome
- What Can You Say In Front Of Customers Without Knowing The Product?
- Experts Advise How To Fight The Market Of Tea Business
- 4 Star Customized Ferragamo High Heels (Figure)
- 接待外商參觀是應(yīng)注意的事項(xiàng)
- Contract Of Loans For Special Funds
- The "Three Realms" Of Equity Incentive In The Internet Era
- 2009年文秘室工作總結(jié)