999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Gonephishing

2019-04-19 01:38:10BYHattyLiu
漢語世界(The World of Chinese) 2019年2期
關(guān)鍵詞:心理用戶信息

BY Hatty Liu

Armed with stolen data and social psychology, a new breed of sophisticated swindlers is targeting unwary WeChat users

信息泄露和“熟人心理”給了社交媒體詐騙

可乘之機,用戶只能更加謹慎

When 50-year-old Jiang Huimin received a message from a unknown number in November, she sensed there was something off about it. Reading “I broke the screen on my phone, borrowing a friends to tell you,” it was signed with the name of Jiangs 18-year-old daughter.

“Let mom buy you a new phone, son,” she deliberately replied. When the sender didnt react to the mistaken gender—before they even got around to requesting money for an “expensive computer course”—she knew: “That was a swindler.”

According to the Tencent United Security Laboratory, run by the company behind some of Chinas biggest social networking platforms, an average 50,000 cases of financial fraud takes place over the phone and internet in China each day. Phone and text message scams, such as the one that targeted Jiang, appeared almost as soon as personal mobile devices became widespread, with the earliest spate reported in Fujian province between 2002 and 2004.

Citing police, Tencents researchers say most of this fraud now takes place over online platform. With personal information less secure than ever, tactics have evolved. In the past, a scammer might have purchased a dossier of mobile numbers to spam with phishing links, hoping for a bite from one in ten thousand; now, criminals have access to a trove of data, including names, location, photos, purchases, likes and dislikes, and friendship circles—information stored online by dozens of organizations, or voluntarily broadcast on social media.

All this can go toward creating a believable online identity, with which even the savviest online user can be manipulated with enough time and effort—and even this is rarely necessary. “Im always careful, but there was still a gut reaction just to seeing my daughters real name in the message,” Jiang tells TWOC. A previous scammer pretending to be her boss, despite using her personal name, had slipped up—Jiang owns her own business—putting her on the alert, but 25-year-old Liu Siyao was not as lucky.

In December, she received a private message on microblogging site Weibo, purporting to be from an ex-classmate, “Dai,” whom she knew was studying abroad and due back for the holidays. “Dai” wrote that she had trouble with her plane ticket, and asked Liu to call a number for her in China. When Liu complied, reaching what appeared to be the airline, she was told that her friend needed a new ticket. Liu couldnt afford to help, but later a relative of the real Dai told her that others in their network had gotten the same message. “Before that, I never suspected anything,” she tells TWOC. “That surprised me, because I never thought of myself as someone who was easy to fool.”

But then, the impersonation was expertly done. Besides knowing Dais location, the scammers had made a clone of her Weibo account with an identical profile picture, an account name with just one period added, and had even looked up and “followed” Dai and Lius mutual friends. They also didnt ask for money; that is, not right away.

Social engineering, the manipulation of people to divulge confidential information, gained global notoriety in 2014 with the publication of Kevin MitnicksThe Art of Deception. Written by an ex-hacker turned cybersecurity expert, the book called humans “the weakest link” in the security of an organization, and portrayed social engineering as a long con, with the payoff coming many steps after gaining the victims trust. These conclusions then sparked panic after the 2016 US elections, when it was alleged that Democratic Party members may have been tricked into handing over information that swayed the results.

Conning via social engineering is longer and more labor-intensive than phishing via mass emails or text message, or the classic swindle that asks for help with an emergency. The payoff, though, may be worth the effort. In November, Chinese fraudsters made off with 18.6 million USD from the Indian subsidiary of Italian conglomerate Tecnimont SpA, wired over voluntarily by Mumbai managers convinced they were following orders from Milan.

The case, one of the biggest cyber frauds in Indian history, drew comparisons to 2001 blockbusterOceans Elevenin the meticulous way the fraudsters studied their mark. The final pay-off, too, relied on psychological rather than technological hijinks. Investigators believe that once the fraudsters gained access to the companys emails—possible through something as easy as sending an employee a phishing link, directing them to reset their password—they simply studied the Milan executives communication style, and faithfully copied it over weeks of faked emails, legal documents, and even conference calls.

The engineering of ordinary Chinese rarely involves such high stakes, though it can be just as thorough—and not very difficult. “I always assume all my information has already been leaked,” Jiang says, noting that anyone could have found out her daughters name, status as a student, and their relationship from one of the many online test-prep course registrations for theyd filled out in the past.

As stated in an article accompanying a 2015 report of the Internet Society of China (ISC), an NGO with ties to the state Ministry of Information Industry, “The prerequisite to swindle is the loss of personal information.” According to the report, researchers found that 78.2 percent of internet users personal information, including name, ID number, address, and workplace, may be already compromised; 63.4 percent have also had records of their calls and online purchases leaked.

Major leaks have been reported from Chinas biggest dining and travel apps, Dianping and Ctrip, as well as web portals Sohu and Sogou. The official website of China Rail, 12306, is also suspected of suffering several breaches, some of which are denied by the authorities. According to the ISC, other at-risk organizations include portals such as NetEase and Tencent, which host over a billion email addresses combined in China; the health and social security systems of 30 provinces; and every Chinese courier company, which have stored millions of names, phone numbers, and addresses (and, as of November 2018, national ID numbers) on mobile user apps and paper receipts.

Since 2009, the sale of such personal information has been criminalized, but the law is hard to enforce. Thefts are usually only discovered if the information is used in additional wrongdoings, such as phishing or fraud, which have prosecution rates lower than 1 percent, as reported by one Guangzhou intermediate court in 2011: The cross-border nature of data crimes makes investigation harder, and targets seldom come forward. A 2016 survey by the Henan government found that only 50 percent of victims filed reports.

The law can also do nothing for personal details that internet users voluntarily “l(fā)eak” via social media. “[The swindlers] were probably able to pretend to be my classmate because she would include her location in her Weibo posts,” Liu believes, and added that a few weeks later, she was contacted by yet another scammer, posing a friend who was then traveling in Taiwan. “My friend had mentioned she was going there in a Weibo update.”

Chinas biggest social media platform, WeChat, is becoming the next hotspot for cybercrime. As of this January, the company has purged 6,000 user accounts and 2,000 group chats suspected of phishing or fraud. Many were simply cyber updates to old tricks, hacking or cloning an account to request “money for surgery” or “travel emergency” from the users network. Others, though, were using features of WeChat itself to create what Tim Hwang, a California-based cognitive security expert, calls “a trade-off between scope and depth.”

Hwang, whose work mostly deals with the manipulation of online interaction by bots, believes that the same principles can be applied to the infiltration of malicious human actors into social networks. By targeting a particular person, “you can run a lot less accounts, but one thats extremely believable—you dont actually need anything very sophisticated to fool humans.”

Ashamed at being duped, victims often refuse to discuss the situation. Several contacted by TWOC felt that the experience (and lack of support from Tencent and the authorities) was too traumatic to relive, meaning I had to look into my own experience to understand how exactly cons are worked. Its not difficult—given that my WeChat account is publicly discoverable, I get many requests from strangers. The most recent identified was a man named “Steven,” a woman named “Zitong,” and another with the handle “The Moonlight is Romantic.”

“Moonlight,” who had a rather busty profile photo taken on a beach, included the message “Hatty, my number has changed, please add my new number.” This pretend familiarity prompted a reaction—how could I have forgotten this person?—and a note from WeChats system seemed to add to her credibility, suggesting I was in Moonlights phone address book already. This, police have warned, is one of the oldest tricks in the book: Moonlight could have simply bought my number and saved it toherphone.

Steven was the only one with a WeChat Moments feed. He posts once a day, always two photos per update—tea with friends, attending a string quartet, visiting a park—but none with any faces visible. Albums of generic photos and video are sold on Taobao for as little as 8.8 RMB each for semi-legitimate purposes; according to one seller, their target customers are “social media influencers who want to drive up views.” (If Steven does turn out to be a forgotten friend with odd posting habits, I apologize.)

Recently, another contact I dont remember sent me a QR code that promised to reveal which of my followers was a bot. Those whove opened it report that its essentially a phishing link: The code redirects to the account of a “bot-checker” who, once added, will ask for approval to log-in to your account on a WeChat desktop app to “run tests.” Since a persons WeChat account is often linked these days to their QQ Messenger, taxi-hailing, food-ordering, financial planning and a host of other service accounts, once login information is compromised, the problems add up.

An epidemic of scams reported in late 2018 took advantage of the ubiquity of delivery services, as scammers contacted WeChat victims by claiming to be “couriers” offering compensation for lost packages; a QR code directs users to a mock login page for payment platform Alipay, requesting a PIN. Because WeChats browser doesnt display URLs, phishing sites are harder to detect (and can be hidden further in other WeChat features like QR codes, “red envelope” cash transfers, group-buying invitations, and mini apps).

猜你喜歡
心理用戶信息
看見具體的自己
光明少年(2024年5期)2024-05-31 10:25:59
心理“感冒”怎樣早早設(shè)防?
當代陜西(2022年4期)2022-04-19 12:08:54
心理感受
娃娃畫報(2019年11期)2019-12-20 08:39:45
訂閱信息
中華手工(2017年2期)2017-06-06 23:00:31
關(guān)注用戶
商用汽車(2016年11期)2016-12-19 01:20:16
關(guān)注用戶
商用汽車(2016年6期)2016-06-29 09:18:54
關(guān)注用戶
商用汽車(2016年4期)2016-05-09 01:23:12
如何獲取一億海外用戶
展會信息
中外會展(2014年4期)2014-11-27 07:46:46
健康信息
祝您健康(1987年3期)1987-12-30 09:52:32
主站蜘蛛池模板: 香蕉99国内自产自拍视频| 啪啪啪亚洲无码| 丝袜亚洲综合| 日韩毛片免费视频| 黄色污网站在线观看| 一本大道在线一本久道| 亚洲色图在线观看| 国产欧美日韩另类精彩视频| 国产精彩视频在线观看| 尤物成AV人片在线观看| 精品在线免费播放| 在线欧美日韩国产| 青青草原国产一区二区| 免费激情网址| 日本人妻丰满熟妇区| 亚洲精品无码专区在线观看| 亚洲不卡网| 97国产一区二区精品久久呦| 日韩精品久久无码中文字幕色欲| 欧美特级AAAAAA视频免费观看| 激情网址在线观看| 91美女视频在线| 亚洲国产精品久久久久秋霞影院| 中字无码精油按摩中出视频| 国产尤物jk自慰制服喷水| 九九视频免费在线观看| 欧美人与动牲交a欧美精品| 先锋资源久久| 国产女人综合久久精品视| 亚洲午夜天堂| 伊人精品视频免费在线| 波多野结衣一区二区三区AV| 无码人中文字幕| 午夜视频日本| 亚洲欧美另类专区| 美臀人妻中出中文字幕在线| 97无码免费人妻超级碰碰碰| 亚洲第一成人在线| 成AV人片一区二区三区久久| 丁香五月激情图片| 国产女人喷水视频| 四虎永久免费在线| 91九色国产porny| 一本大道东京热无码av | 中文字幕亚洲电影| 香蕉伊思人视频| 22sihu国产精品视频影视资讯| 无码区日韩专区免费系列| 国产成人h在线观看网站站| 91欧美亚洲国产五月天| 色妞www精品视频一级下载| 无码丝袜人妻| 四虎在线观看视频高清无码| 在线看免费无码av天堂的| 国产中文一区二区苍井空| 国产精品天干天干在线观看| 精品国产电影久久九九| 国产免费精彩视频| 中文字幕有乳无码| 高h视频在线| 亚洲欧洲国产成人综合不卡| 亚洲欧美成aⅴ人在线观看| 天天做天天爱夜夜爽毛片毛片| 亚洲第一区欧美国产综合| 亚洲永久色| 最新日韩AV网址在线观看| 91偷拍一区| 欧美不卡二区| 亚洲全网成人资源在线观看| 国产极品粉嫩小泬免费看| 18禁不卡免费网站| 国产成人综合日韩精品无码首页| 婷婷色丁香综合激情| 青青草综合网| 国产高清无码第一十页在线观看| 亚洲精品在线91| 美女潮喷出白浆在线观看视频| 久久国产亚洲欧美日韩精品| 国产亚洲欧美日韩在线一区二区三区| 国产欧美亚洲精品第3页在线| 免费视频在线2021入口| 亚洲无码一区在线观看|