Smartphones not only enrich people's lives, but also greatly facilitate people's lives.
From social entertainment, to mobile payment, to shopping consumption, mobile phones and related businesses penetrate all aspects of people's needs, more and more like an important organ that grows in people, indispensable.
However, the development of science and technology itself is a double-edged sword, on the other side of providing convenience, all kinds of information leakage problems, and the excessive application of big data, users are like naked on the Internet, allowing all kinds of accurate online fraud to penetrate wildly.
Previously, many netizens also ridiculed the increasingly crazy online fraud: "This is forcing me to change back to the functional machine?"
However, is it really safe to call, text, and see the time? Today's hot search answers this question.
The hot search topic is: "More than 14 million elderly machines are automatically spent by Trojan horse control".
According to reports, recently, the Sichuan police announced a huge cyber case. This case is a "huge network case in which tens of millions of mobile phones were controlled by Trojan horse programs and privately deducted fees for profit of 100 million yuan" in early 2023
According to the information released by the case, Mr. Zhang from Panzhihua City, Sichuan Province, bought an elderly machine with simple functions and no cumbersome operation for the elderly at home to receive his children's calls.
But when paying in the process of use, it was found that the cost increased bizarrely every month, and after asking the old man and not calling too much, he went to the business hall to inquire and found that the old man's mobile phone opened a variety of small value-added charging services.
What's even more strange is that the mobile phone does not have any records of opening, such as opening text messages, etc., and they begin to suspect whether it is a virus, so they report the crime.
Preliminary investigations found that such things are not unique, and through data tracking, it was found that more than 14 million mobile phones across the country were controlled by Trojan servers.
What is the concept of 14 million old age machines? Xiaochai did not find the specific annual shipment data, but according to the data released by some mobile phone brands focusing on the elderly market, it is probably about one million units per year, including low-end smart phones.
Basically, it also means that most people's mobile phones in the elderly machine market may be controlled to some extent.
From another point of view, control 14 million units, and one day without knowing it, deduct a dollar, and enter 14 million ...
So this kind of mobile phone is basically rarely connected, how is the Trojan implanted? According to police information, criminal gangs have implanted Trojan horse programs into mobile phone motherboards in the process of cooperating with a number of mobile phone motherboard manufacturers.
Shaohu controls the mobile phone to transmit data back through the previously implanted Trojan horse program, obtains the user's mobile phone number, SMS content and other information, and transmits it back to their background database.
And use the Trojan horse program to send SMS to mobile phone users confirming the activation of value-added subscription services, and at the same time control the automatic reply of mobile phone terminals to activate. After a series of operations are completed, delete the SMS records sent and received this time.
It is understood that the criminal gang illegally made hundreds of millions of dollars through this method.
For money, it is really pervasive. After the incident rushed to the hot search, netizens said: "This is a rhythm that even the elderly do not let go..."
"These unfilial descendants will not let go of the old people who have lost their lives. Punish! Severe punishment!"
Some netizens also said: "Young people have also been injured, the cottage machine used when there was no smart machine before, and the entertainment inside is casually ordered for two dollars!"
"What kind of poison is this, the old machine is not let go, I think the old machine virus can't bully it."
Some netizens asked: "The abnormal charge operator does not know? From which channel is the deduction deducted, and does the operator have a share? Why didn't anyone say this?"
"It's scary
We must impose heavy sentences and sentences, so that they are in jail and have nothing, so that no one will follow suit, the elderly in today's era of electronic product explosion is not easy, and there are scammers so cleverly robbed, what is the reason!"
"Using the old machine feels very evasive, I didn't find anyone working on it, scammers are really pervasive, can you check these well?"
However, Xiaochai's question is that these criminals implant Trojans in the motherboard production process, so what kind of cooperation do they have with the motherboard manufacturer?
In addition, 14 million mobile phones, relying on the implantation of passwords to make hundreds of millions of yuan, this is pure profit!
And how much can you make by selling these 14 million mobile phones? If you remove the cost of hardware, channels, etc., is it possible that the final profit is not as high as the implanted Trojan?
If this possibility exists, then should we re-examine the old machine market, is it possible that there is another industrial model?
And how do these mobile phone products that have been implanted with Trojans from the motherboard link been reviewed by the brand side and other reviews into the market?
To put it another way, compared with such simple mobile phones, smart phones are more likely to be implanted with similar Trojans, but why has there not been a similar large-scale Trojan implantation in the smartphone market with a wider user base?
For example, some netizens said: "For the elderly, most of the mobile phones bought at the counter or go to the counter to apply for mobile phone numbers, how can scammers implant Trojan horse programs one by one on tens of millions of mobile phones?"
The above series of questions may need answers, tracing back to the root cause to solve the problem.
For users, buying mobile phones for the elderly at home and choosing regular brands and formal channels as much as possible is king.
However, then again, even the old machine can be controlled, so how can others prevent it? At least this time, it can be regarded as breaking Xiao Chai's psychological defense.
Shiba Gouwski ©️
Author|Xiaochai No. 1
Editor|Tan Song