It's terrifying to think about it! Two apps and one minute can make your phone "naked" in front of strangers? ! Police remind →

It's terrifying to think about it! Two apps and one minute can make your phone "naked" in front of strangers? ! Police remind →

Sitting far away typing

Your phone can hear everything you say

No need to unlock

I can see your face remotely.

Pick up your phone and chat with others

All chat content can be viewed in real time

A scene straight out of a movie

It's really happening around you

If you think about it carefully, isn’t it “terrifying when you think about it”?

In modern people's mobile phones

Stores everything about a person

Personal communication information, photos, consumption data

Mobile phone information security

Personal privacy and property security

Closely connected

But someone was watching

This information on the phone

Exploiting system vulnerabilities to create

Dedicated tools

To steal other people's information for illegal profit

recently

The reporter found on the social platform

Someone is selling it publicly

Tools that can spy on other people's privacy

In the chat group, the group owner released a variety of monitoring tools, claiming that it only takes one minute for them to monitor the phone screen of the person you want to monitor, record audio and video, and even eavesdrop on the sounds around the other person's phone in real time.

The seller said that if it is an Android phone, all functions can be realized for only 2,000 yuan, and the simplest operation only requires knowing the other party's mobile phone number; even if it is an Apple phone, you can receive the other party's WeChat messages synchronously, and it will not show the login on other devices.

The seller then showed the reporter a demonstration video, which showed that the tool would first send a remote push notification to the other party, prompting the other party that there was a software update required. Once the user clicked on it, an automatic authorization message would pop up on the phone, and then the phone would completely become a surveillance camera for the other party.

To verify

After the reporter paid the fee

The other party sent two mobile phone installation files

After testing, it was found that after the controlled mobile phone opened the file, the software could automatically set the required permissions in less than 1 minute. Then click to hide and the program would disappear from the desktop. When checking the tasks running in the background, it would be difficult for ordinary users to notice anything unusual.

After installing the second installation package on the controlling mobile phone, the controlled mobile phone can be monitored in all directions, and it is difficult for the owner of the controlled mobile phone to find anything unusual.

According to network security experts, this program exploits a vulnerability in the Android system. Even if WeChat, TikTok and other software use encrypted communications during transmission, malicious programs can still be used locally to read other APP data, activate cameras and microphones, and perform other operations. In addition, some mobile phone models lack obvious prompts when relevant permissions are called, making them more easily exploited by these unscrupulous businesses to engage in illegal activities.

Legal experts pointed out that merchants who sell such products online are suspected of providing programs and tools for invading and illegally controlling computer systems. If the buyer involves some financial information in the system and then uses this financial information for profit, it may involve financial crimes. According to relevant laws and regulations, selling related programs to damage the interests of others, and purchasing such programs to monitor the behavior of others may constitute crimes. If the collected videos, recordings, etc. are also used to commit other crimes, they will also face multiple punishments.

How to avoid

These situations occur?

Experts say that timely upgrading the mobile phone system to the latest version through official channels can significantly reduce the possibility of system vulnerabilities being exploited by attackers. At the same time, mobile phone application software installed and updated through regular official application markets are also relatively more secure and trustworthy.

Police Tips:

Citizens' personal privacy is protected by law and cannot be violated. Illegally obtaining other people's information and violating personal privacy are both illegal acts, and those who constitute a crime must bear criminal liability.

Platforms and relevant departments should also strengthen supervision to safeguard the bottom line of information security for the people on the Internet.

Source: Shanghai News Radio, News Workshop

<<:  In order to get sunlight at night, they installed a large mirror on the satellite...|Environmental Trumpet

>>:  @All freshmen, how is your sun protection?

Recommend

Effects of pine pollen

Pine pollen is not very common to many people. It...

I start drooling when I pass by a bakery. Is that tempting aroma fake?

Whenever I pass by a bakery, I always smell a fra...

The efficacy and function of Zoujiao

Traditional Chinese medicine is the quintessence ...

The efficacy and function of ramie root

Traditional Chinese medicine has a history of tho...

What are the effects of Dendrobium and Cordyceps flower soup?

For a long time, Dendrobium, like Ganoderma lucid...

If AI is used "wrongly", people will really become stupid! I'm not kidding you

One day in AI is like one year in the human world...

How do octopuses and fish carry out "cross-border hunting cooperation"?

In nature, we often see animals of the same speci...

Saffron side effects and contraindications

Saffron is a traditional Chinese medicinal materi...

As the temperature drops, please be careful of fire!

Cold winter Hand warmer, this "winter magic ...

Ginkgo biloba medicinal effects and functions

Ginkgo trees are trees with high economic value. ...

The efficacy and function of Soushanhuang

There are many types of Chinese medicine. When we...

The efficacy and function of Gaoshanwang

As a traditional Chinese medicinal material, Gao ...