This article is transferred from [CCTV News];
After receiving a phone call, the mobile phone suddenly went black and did not listen to the call, so I could only watch it operate by itself, and I couldn't even call the police...... This is the experience of Ms. Zhou, who lives in Jiaxing, Zhejiang Province, not long ago.
So, who is the caller? What did he do to Ms. Zhou's phone?
I was told that I had opened a live room membership
Membership fees will be deducted each month
A few days ago, Ms. Zhou suddenly received a strange call starting with 0050, and the caller claimed to be a staff member of a short video platform. The other party told Ms. Zhou that she had opened a membership business in a webcast room, and from that night, she would be deducted 800 yuan from the membership fee every month.
Ms. Zhou was not sure whether she had opened the so-called membership business, but then the other party said Ms. Zhou's name and the last four digits of her ID number, which completely dispelled the doubts in her heart.
Later, the other party said that the membership fee of 800 yuan could be canceled, as long as Ms. Zhou downloaded an App called "UnionPay Meeting" on her mobile phone and completed the operation according to the prompts. Ms. Zhou soon received a string of numbers similar to IP addresses, but it could not be downloaded directly from the mobile app market, and needed to be downloaded in the browser of the mobile phone.
After Ms. Zhou downloaded the app, another customer service called her to tell her that the closure of the member account had not been completed and she needed further cooperation. Ms. Zhou recalled that the other party was clear about the content on her mobile phone, and successively asked her to open other shopping and taxi apps, and canceled some options.
Shortly after the so-called customer service called, Ms. Zhou's mobile phone went black. "There was only one text on my phone, and I needed face recognition, and I hung up my phone when I felt something was wrong. They called me a second time and I hung up again. ”
After hanging up the other party's phone, Ms. Zhou tried to operate the mobile phone, but the mobile phone did not listen to the call at all. "At first, I couldn't turn off the phone, but then I opened the phone and found that WeChat could be used, and the screen was black in a few seconds, and nothing could be opened."
Although the software has the word "UnionPay".
However, it is not related to China UnionPay
During Ms. Zhou's call with the scammer, the Haiyan police in Zhejiang Province also received a fraud warning message at the same time, but they called Ms. Zhou's phone number several times but could not be contacted, and later found her through Ms. Zhou's family.
The police checked Ms. Zhou's mobile phone for the first time and found that the phone was still in a black screen and could not perform any operation. The police immediately contacted the anti-fraud center and carried out a protective stop payment on the bank card in Ms. Zhou's name.
The police found that although Ms. Zhou's mobile phone had been in a black screen, the text message prompt sound had not been interrupted - this may be the criminal using Ms. Zhou's mobile phone to transfer money, and the prompt sound when receiving the verification code. They immediately removed Ms. Zhou's SIM card and left the phone disconnected from the internet and unable to screen share.
Next, the police forcibly restarted Ms. Zhou's mobile phone, and at this time, the mobile phone that had been out of control returned to normal. They saw a screen-sharing app on their phone that had opened up all privacy permissions.
Because the police protected Ms. Zhou's bank card information, greater losses were avoided.
The police said that the software downloaded by Ms. Zhou was a Trojan software. Although the name has the word "UnionPay", it has nothing to do with China UnionPay. After downloading and installing the software, it can remotely control the victim's mobile phone, and then operate the transfer to infringe on the victim's property.
△On the 25th, "China UnionPay" issued a solemn statement: "UnionPay Meeting App" is not a product of China UnionPay.
What are Trojan viruses and how to identify them?
So, what are the types of Trojan viruses, and how can we identify them? According to experts, Trojan viruses are classified according to the way of invasion, and there are generally three types:
Exploit vulnerabilities in the mobile phone's operating system to carry out remote attacks.
The Trojan is an application in its own right. As long as it is installed on the phone, it is embedded in the phone and can be operated.
Bundling Trojan and virus programs into a normal application. This type of concealment is high, and it can be used normally by clicking on the mobile app, but it quietly launches the Trojan control program in the background.
According to network security experts, according to the functional classification, Trojan viruses are mainly divided into information theft and remote control. Depending on their specific criminal purpose, criminal gangs will choose to implant Trojan viruses with corresponding functions. According to network security experts, Ms. Zhou downloaded a remote-controlled Trojan virus, and the Trojan virus gained the highest control of her mobile phone.
Update the mobile phone system in a timely manner
It can improve the safety factor
So, why did the Trojan virus gain the highest control of Ms. Zhou's mobile phone? Cybersecurity experts believe that Ms. Zhou's mobile phone system version may be old, or the mobile phone lacks some effective security protection measures.
Cybersecurity experts used two phones to conduct a comparative experiment: one had the latest operating system updated, while the other had a system version stuck a year ago. Both phones download and install the app with the Trojan virus at the same time.
The results show that the phone that updates the operating system will alert the user to the risk and need to enter the phone's lock screen password to install it. Even after installation, there will still be a prompt that an inappropriate app has been detected, and users are advised to uninstall it immediately.
On the other hand, the mobile phone with no updated system version successfully downloaded and installed the application with the Trojan virus, and there was no risk warning in the process.
Once the phone is infected with a Trojan virus
How can I get rid of it completely?
According to network security experts, there are three types of ways to deal with Trojan viruses:
The detection function of the system comes with it. This feature can detect primary Trojan viruses and remove them by uninstalling them directly.
With the help of professional security software. Professional security software can not only identify Trojan viruses, but also find hidden files left by the program in the operating system.
There is also a type of Trojan virus that can be packaged to evade the detection and killing of security software, and can only be completely removed by restoring the phone's factory settings.
Police tips that you must develop good habits of using mobile phones and surfing the Internet, and pay attention to the following points:
Whether it's a text message, an email, or an unknown link in instant messaging software, don't click on it easily;
Do not download unofficial applications, if necessary, please go to the official application market to download and use;
Do not disclose personal mobile phone number, bank account number, mobile phone verification code and other information, the verification code is the mobile password;
Try not to connect to free public Wi-Fi to avoid theft of personal information and device data.
Source of this article: CCTV News WeChat public account comprehensive "Rule of Law Online"