online announce network television
China Address: (use IE browser to outlook) http://news.cntv.cn/society/20110417/101624.shtml
Moderator
With the evolution and popularization of online payment gradually become a prevalent usage of payment, its fast and handy online payment traits to preoccupy more users, while on the network to disburse bigger and bigger piece of cookie in the meantime, hackers and viruses are also eyeing a piece of bread online payment, users use the network to pay when the slightest blunder could fall into the pitfall hackers, well-designed virus, their belongings may undergo losses, Beijing, Zhang instructors to use online payment online shopping when it fell into the trap the virus, in the end is how it happened, look by today's correspondent investigation.
Not long antecedent, Beijing Zhang log a shopping site, in a shop in the mandate a few chips of dressing. However, after the remittance through online disbursement platform, ordering clothes, but late but.
Zhang:
I see I just click the payment after the goods, then the peddler has been said to have not received the money, so I have not received the goods, when I once afresh look at their page, when that transaction and found that behind One is simply that they have had a payment can not find the information, then I calculate that was their unsuitable operation, I was operating again, but the peddler said he still did not receive the money.
in two payments, the teachers still do not receive clothes, sheets, this time she accomplished fooled, but this time her bank card has less than 500 dollars.
Zhang:
is my payment should be two to 3 hundred dollars, he's been saying that did not receive, so that I would check my account, I have five 6 hundred dollars fewer, and more than doubled.
Zhang found a computer virus monitoring agencies, network security engineer told her that her computer is definitely in a super-popular online banking Trojan,
Lacoste Shoes, when the transaction automatically alteration the payment list, guiding to her money deceived.
Network Security Engineer:
if this virus is chiefly, that is, its characteristics, is to adjust the third-party payment platform, this page, and then it changes the last result is that the third-party payment platform, the payment side, the normal, for instance, Under normal circumstances, a payer should pay the company a decisive account, the virus runs into efficacy, it is to be modified directly into the hacker the payer's own account.
online banking because they were tampering with the payment platform super horse,
Womens Lacoste Arin Trainers, Zhang teacher without the knowledge of the money instantly into the two hackers account. Network security engineer revealed that the online banking super-Trojan infected computer in the country up to 30,000 units.
then this is how online banking Trojan nag into the super-computer users on it? Network security engineer for the correspondent simulated demonstration. Reporters landed a shopping site, detect a network security engineers to model shop, during the consultation process items, network security engineers sent to reporters a piece of merchandise like figure. However, fair prepared to open this picture in the correspondent, the network security engineer told reporters, in fact, this is disguised as a picture of the online banking super Trojan virus samples.
Network Security Engineer:
itself appears to be one mediocre one picture, but the file itself is a real virus, if you receive after that open this document, you are assumed to look at this picture,
Lacoste Zepher MR2 Trainers, but you actually has been poisoned.
correspondent then opened the picture, in a closed trading environment, conducted a simulated online payment. Reporters saw the third-party payment platform has been tampered with as the virus really point to a specific account, which means that, if passed, is really to make payments, the money will be remitted to the pockets of hackers.
network security engineer, this is a typical path of fishing with the use of fraudulent means Trojan virus, is the most important use of the network as a course to cheat other people's money. First trick users click on disguised as a picture, then use online banking payment account super horse tampering, fraud online shopping capital. And compared with before fraud, online banking has more super-secret Trojans and more human reserve alley of.
Network Security Engineer:
it does not steal the user's account password, in other words the user after the virus infection itself is no influence on the computer, that is, it led to a very high secret, ordinary users can not detect the computer has been poisoned
network security engineers also told reporters, super internet banking Trojan is also a feature often guard. The virus is not money, it will automatically let work of the use of automatic admission of great transactions that easily noticeable, but not specifically stare of some measure of the transaction.
Network Security Engineer:
hackers will choose a more subtle way, this option is to use a user's mental, psychological, what is it that, for instance, I lost 5 dollars, I could not attention, but I lost 1000 greenbacks , I'll look how I lost, why should I lose, I will go even reported, so the hackers themselves, then the risk of his own on the higher this number, hackers will always control the I ambition to steal this time the transaction amount, more than ten dollars, hundreds of dollars the amount is not high, hackers often choose to steal, so that he himself is quite safe, relatively so relatively safe.
It namely understood namely online banking assets, while too using download tools, browser software, digital signature and shopping to bypass anti-virus software, has spawned extra than 200 variants.
Network Security Engineer:
type of virus in the beginning stage, then merely for a few particularly large focus of this third-party payment platform, such theft, and to the present case, this type of online banking super-Trojan, is basically pilfer entire third-party payment platform currently this money.
network security engineer, common picture of the suffix is generally JPG or BMP format, although this virus is disguised as a picture file's icon, but its extension is EXE executable file enhancement of this, the mean user would then be able to identify and prevent risks.
[support person]
another speed, the type of multi-variant, paired with the superior concealment, this super internet banking Trojan is indeed hard to find, but also has to embody a lot of users, including Zhang causing property break. Experts told the reporter, and this super internet banking Trojan virus is also alike to the more than this one, and update the virus variants faster and faster, scale up deceptive strength. So, what changes network viruses in the end, purchasers and how to prevent it?
jot. At the same time, the dark for e-commerce industry are quickly expanding, by spreading Trojan horses, backdoors, and fishing sites, dark amuse groups quietly eroding the foundation of e-commerce. Virus surveillance in some servant institutions, for online shopping, online payment viruses and malicious Web site reports show a clear upward trend.
anti-virus agencies Customer Service Manager Li Chunkui:
like these ######## phishing sites, there is still some of these hacking sites, and some, including some of the triumphing number of ######## information, this type of site, the present is an ascent trend, that some of the orthodox Trojans, the proportion may decline. Some of these ######## phishing sites and the like to acquire user information may have been an upward trend.
phishing sites, which is a bulk of Internet users in recent years, is no stranger to a word, the network has become synonymous with fraud. Despite efforts to prevent, but phishing sites still use assorted means to entice users cheated. In the network security experts with the assist of the reporter saw several fishing sites, but simply could not differentiate which is true website, which is the phishing site.
Network Security Engineer:
for we immediately look the two sites, I left open is a ######## phishing sites, while the right is a formal open a bank website, we see via this, we see the contents page, you can not identify what is true, which is disloyal, because either a truly a ########, its content is accurate the same, but we can see the domain name aboard a shrewd difference. But even this puny difference, as many this is not often on this online banking users, he could not see.
fjust aboutme users who visit online banking, these phishing sites have done great harm, it can log in online banking users, while on the stolen account number and password. Correspondent banks in order to show the dangers of phishing sites, network security engineer and obtain a sample of intercepted phishing sites, and in the background to simulate operation. Reporters then landed on another computer on this fishing site, fill in the password at 123, fill in the dynamic password at a 5 figure. Almost in the meantime reporter to complete this step, network security engineers to obtain this information.
Network Security Engineer:
user name is correspondent of the Chinese, the password is 123, the dynamic password entry is 5, right? Phishing sites where you just enter the message, have all been the background of this is the phishing sites in real time are logged.
It is understood that the renowned phishing sites are ######## shopping sites, ######## websites and consumer QQ, ######## bank websites, ######## micro-Bo, E-mail winning, ######## ticket sites, ######## lottery prediction, the Securities and ######## medicinal and health Web site website. The ######## Taobao, ######## QQ, Sina ######## and false and Commercial Bank, a fishing site in several common types, accounting for the number of ######## Web site more than 70%. The use of people's well-known brands, websites and organizations confidence disguised phishing sites, the number additional dramatically in recent years. 2010,
China's anti-phishing alliance Secretary-General Qi Lin:
really Trojan virus ah ah so many annuals and there are many security companies do they have a agreeable hindrance tool available to our users for phishing sites it used but, in truth, you can also itself Think of it as a customary website with regular site it is the same fashion so how normal it from so many sites there really elect up this piece that is so complicated to identify itself on the more complicated to prevent So awareness is not tall users of the circumstance then it gradually becomes build up of a menace to the larger problem
2010, the dangers of phishing sites over the premier Trojan virus, as Internet security, marketing, the establishment of phishing sites, communication, obtaining money, online banking or online accounts, private information. If blocked, the conduct of the template update, re-transmission.
network security personnel told correspondents, notwithstanding some phishing sites with real site is virtually no inconsistency, merely still able to nail the counterfeit face. For the most damaging bank fishing sites, experts say, do online banking normally let users install some microprocessor security plug-ins, and one of the online banking consumer ID and password to do the authenticity of the retard, merely no this imitation site agenda.
Network Security Engineer:
like the ######## phishing sites, then ######## banking websites, then the user logs in, this website is not true for the user to enter information for a check, it just means that we can enter any an account password, just enter anyone of the information, it will be to the afterward step, you see my one and password as well, including the password, there is this account that the median is actually the normal online banking are entirely This is random, irregular input information, in this case we Aspect after landing, it can still go to the afterward step.
China's Internet sector
related statistics show that in 2010, along the damage occasioned by viruses and Trojans, in fact, than the same time in 2009, the ebb, the digit of specimens of viruses intercepted, and almost half the number of martyrs decreased; However, for online banking User theft and deceit cases are increasing, and the resulting economic loss of a unattached victim's huge, so that the sharp boost in the overall amount of economic loss.
in e-commerce and online payment online shopping places, a diversity of viruses, Trojans and phishing sites tremendous threat. Then these trojan viruses and phishing sites is to the users how to silently sneaking around it? Network security personnel told reporters that a considerable portion of Trojan viruses and malicious programs, ########ography sites, and through the advertisement of fashionable download sites to dupe users press. The part of the Trojan is downloaded to computer users take the initiative of.
Network Security Engineer:
through our backdrop statistics, then, is approximately 80 percent of computer users that choose to be braving the risk of poisoning, but also to proceed to click,
Womens Lacoste Trainers, continue to look at? ? ? ? ? This site.
with network monitoring and interception technology capabilities,
Lacoste Tennis Trainers, in fact, a number of Trojan viruses and malicious programs can be speedily disposed of. The variety of fishing sites in order to lure Internet users to take a variety of transportation, it is difficult to prevent. In 2010, a desktop virus was rampant, it can create a lot of icons on the desktop is difficult to clear, and it creates an icon in addition to evoke a number of Internet users click ads, website, traffic fares earned for the hackers, but also may is a phishing lure.
Network Security Engineer:
a total of five on the desktop icon, this is a virus sample, its icon to the actor disguised as Mo Yang, following me to double click to run it. Pop up a dialog carton, and then will produce a name for Taobao's an icon when the user clicks on this icon when you connect to the hacker specified site.
addition to a number of Internet users click on the desktop virus forcibly, more phishing sites to adopt a site communication channel. The another types of phishing sites of transmission there are differences. ######## bank e-mail phishing in general, and cell call txt message communication. ######## winning information level is taken to another site a centralized means of communication, usually using some of the irregular spread of small sites, the use of pop user to click on to enter the phishing site. The ######## phishing sites shopping Internet users often use the cause to chat exchanges, address, or mail viruses disguised as pictures of goods, lure Internet users to access.
China's anti-phishing alliance Secretary-General Qi Lin:
We recently
March data, the website that actually securities ah its large fishing to reduce the phenomenon then also do a lot with our recent securities manufacture (traditions) can use some third-party letter site authentication,
Lacoste Carnaby Trainers, these identities to the suspension (for) users to determine a relationship
With the increasing popularity of e-commerce, virtual trading is increasingly creature recognized, but the hackers are making e-commerce space is fraught with fraud and risk. Internet transaction security become common problems.
Moderator
a picture, an e-mail, computer viruses are possible to become the channel, so we must be watchful when the Internet, attempt not to log in to your not versed with the site, as distant as possible do not open familiar with e-mails, beware of viruses, resulting in loss of attribute. The more major answer is the pertinent regulatory authorities should also increase exertions to combat viruses and hackers, to improve the effectiveness of HIV prevention and targeted only really play a regulatory character, can fundamentally protect the safety of users of the Internet in order to for the popularity of e-commerce and online payment security and development to create a good context, to the e-commerce and online payment and better piece of pie.