Home >

The Virus Sees The Balance Treasure Scanning The Two-Dimensional Code Fund Is Stolen.

2014/2/21 14:46:00 50

VirusBalance TreasureTwo-Dimensional Code

< p > credulous "buyer" group purchase, scanning the two-dimensional code, installing the software specified by the buyer, resulting in 6900 yuan in the balance treasure disappeared, opening the compressed package sent by the "businessman", clicking on it did not find any problems, but a few days later, "Yu Ebao" customer service called to confirm that a thousand yuan of funds had been removed.

Recently, the police issued an early warning that the balance of treasure has become a serious disaster for Trojan horses, and the public must pay attention to prevent viruses when using them, so as not to steal funds.

< /p >


Xiao Chen, who lives in Taishun, has opened an online shop at the end of her job, operating < a href= "//www.sjfzxm.com/news/index_c.asp" > dress < /a >, but the business has been dismal.

A few days ago, a "buyer" sent information that the shop was beautiful and wanted to buy a group.

Immediately, the buyer sent a < a href= "//www.sjfzxm.com/news/index_c.asp" > two dimensional code < /a >, that is, there is a group buying style picture that he wants to do in the two-dimensional code.

Seeing big business, Xiao Chen did not think much about it. He scanned the two-dimensional code with his mobile phone and opened the linked webpage.

All the pages are in English, and then a software installation prompt is released.

According to the hint, Xiao Chen installed the software, but did not see the picture after the installation.

Finally, business was not done.

That night, Xiao Chen balance Bao Li's 6900 yuan was pferred to Alipay, and then was pferred away.

< /p >


"P" is not the same. When Mr. Tan came to see a href= "//www.sjfzxm.com/news/index_c.asp" > balance treasure < /a > a few days ago, he found that the 5000 yuan deposit in the balance treasure turned to zero.

He couldn't help thinking. He immediately checked the situation and found that money was pferred on the day he bought the digital equipment online.

After remembering, he remembered that when he asked a shop at that time, he had received a compressed package from the seller, about 400KB. He opened it and looked at it out of curiosity.

Because he had nothing to open, he didn't care.

< /p >


< p > "illegal criminals implanted Trojan horses and other viruses on the two-dimensional code, causing others to be poisoned by mobile phones or computers, thus stealing some account numbers."

According to the police, there are three major cases related to the balance treasure. One is that the criminals are disguised as pictures, URLs, and two-dimensional codes by the opportunity of online shopping and downloading. The Internet users need to upgrade their computers and install plug-ins.

< /p >


After "P", once the citizens use the "balance treasure", Trojan horse will automatically pfer funds to the public through tampering with pages or tampering with the amount.

The other is that many people are afraid that they will not remember or log in. They will set the computer to automatic login. When they sell and pfer the old computers they use, they will not think of cleaning up personal privacy in the computer in time, which will lead to the theft of the balance treasure account.

Third, many people are accustomed to binding Taobao accounts, quick payment bank cards and other mobile phones. Once the cell phone is lost, criminals will acquire the mobile phone verification code by relocating the mobile phone card in different places, and then change the Alipay code to commit theft.

< /p >


< p > police remind the public that the balance treasure has become a new target for criminals to invade.

Do not click on links, compresses and so on sent by strangers. If you receive files with.Apk suffix, do not click download.

Once the Trojan horse is found, it is necessary to change the account password immediately and call the relevant customer service to confirm the safety.

The mobile phone can remove the Trojan horse by restoring the factory settings after backing up the important files.

In addition, when people use WeChat, Wangwang and other chat software, they also need to enhance safety awareness. It is better not to receive links or pictures sent by the other party before they fully identify each other.

< /p >

  • Related reading

Red Beans Group Taxus Landing "New Three Board" Turnover Ranked First

Case direct attack
|
2014/2/20 15:31:00
40

Taobao Exposes Major Vulnerabilities To Hackers

Case direct attack
|
2014/2/19 18:02:00
53

The US Falsely Accusing China Of "Counterfeit Goods First" Is Intended To Protect Trade.

Case direct attack
|
2014/2/17 17:33:00
16

Suzhou Seized More Than 500 Pieces Of High Imitation Hermes Prada Clothing

Case direct attack
|
2014/2/10 10:59:00
345

POS Pre Authorization Vulnerability Detonating Cash

Case direct attack
|
2014/1/24 20:53:00
49
Read the next article

Analysis Of "Socks Industry Capital" Business Through Socks Always Earn Money

High end products must have large brands and high quality. Gu Bosheng's business philosophy is to make the best and most comfortable socks. In order to produce socks that are as high as possible, he carefully calculates the content of all kinds of materials and continuously improves the production process. Next, let's take a look at the details of the world's clothing and shoe net.