22

2020

-

04

Top Ten Internet Threats That Internet Users Should Know Before 2014


Having survived the apocalypse of 2012, the field of cybersecurity in 2013 remains vast and dynamic. In addition to the "traditional" Trojan viruses, emerging threats such as fake base stations, GSM SMS monitoring, and router hijacking have also begun to surface. Based on the cybersecurity hotspots in China over the past year, we have compiled a list of the top ten cybersecurity threats in the country for 2013, hoping to raise awareness among more internet users about these threats, enhance vigilance, and avoid harm.

Having survived the apocalypse of 2012, the field of cybersecurity in 2013 remains vast and tumultuous. In addition to the "traditional" Trojan viruses, emerging threats such as fake base stations, GSM SMS monitoring, and router hijacking have begun to surface. Based on the cybersecurity hotspots in China over the past year, we have compiled the top ten cybersecurity threats in the country for 2013, hoping to raise awareness among more internet users about these threats, enhance vigilance, and avoid harm.


1. Fake base station scam SMS, cloning bank calls


A "fake base station" is an emerging scam tool that disguises spam messages to deceive users. Fake base station SMS can masquerade as messages from 10086, banks, or even 110 calls. They can be placed in vehicles for easy mobility and can automatically search for nearby mobile card information in crowded streets and neighborhoods, forcibly sending spam advertisements or scam messages to users. Therefore, when receiving customer service SMS, it is essential to examine them carefully and discern their authenticity.


2. Online shopping, a hotspot for internet fraud


Online shopping is currently a hotspot for internet fraud. Online shopping scams have begun to shift towards a combination of "human deception + technical means," such as luring internet users with low-priced products on legitimate websites, then sending phishing links through QQ, mobile phones, etc. During the "Double 11" shopping festival, data released by 360 Security showed that the average daily interception of phishing websites reached 70 million to 100 million times, with over 260 million phishing website attacks intercepted on the day of "Double 11."


3. Routers becoming new targets for hacker attacks


The hacking of routers has become a new phenomenon that the public began to recognize in 2013. The primary method hackers use to attack routers is to tamper with DNS settings, thereby hijacking victims' access to phishing websites and advertisements, and even monitoring computers, mobile phones, and tablets connected to the router network, such as which websites were visited, online banking and shopping account passwords, and even hijacking users to phishing and other malicious websites. In fact, as long as the default account password of the router is not used and the security software's WiFi inspection function is utilized, it can effectively prevent the router from being hacked.


4. Android Trojans rampant, mobile security needs attention

 

It is reported that in the third quarter, the number of new Android Trojans in China increased by over 500% year-on-year, with a spread reaching 190 million. More than 70% of mobile Trojans have the ability to siphon fees, and there have been mobile Trojans capable of stealing online banking and payment account information, making mobile security issues very severe. Privacy theft, fee deductions, and malicious advertisements continuously erode Android users, and even malicious software has begun to pre-install bundles and invade users' phones through bidding rankings. Android security issues require smartphone users to be highly vigilant.


5. Frequent issues of personal privacy leakage


As the internet becomes more developed and the level of information increases, the amount of information we upload also grows. In the past, no one would have thought that their hotel stay records would be posted online, but in 2013, this indeed happened. Additionally, over 70 million QQ group users' personal information was leaked, along with a large number of hotel stay records, all of which serve as a wake-up call for internet users. Relevant regulations, self-protection awareness, and corporate ethics are all indispensable. While enjoying the convenience brought by the internet, we must also be cautious of the risks of personal information leakage.


6. Exploiting vulnerabilities to hack government departments


We often see in movies hackers infiltrating the White House or the Pentagon, stealing ultra-secret information. However, such organized, targeted, covert, destructive, and long-lasting attacks have also begun to disturb China. Recently, a vulnerability in a domestic office software was exploited, targeting government departments in our country, which is a typical APT attack that must be taken seriously.


7. Nearly 80% of domestic websites have vulnerabilities, small and medium enterprises face challenges


Security vendors disclosed at the first China Internet Security Conference that nearly 80% of domestic websites have security vulnerabilities, with at least one million websites having backdoors, some of which have been alive for as long as five years. It is easy to set up a website, but difficult to maintain it. For small and medium enterprises, this is like carrying a time bomb, and using free website security services is the most effective way to solve the problem.


8. Ransomware Trojans invade China


In 2013, ransomware Trojans invaded China. These Trojans can encrypt various files such as boot passwords and documents on computers, and to unlock them, users must pay "ransom" to the hackers for the password. After being intercepted by security vendors, the typical "shakedown" methods of ransomware Trojans are continuously evolving, with the ransom not only being cash but also the highly popular Bitcoin being used as ransom by criminals.


9. GSM (2G) SMS may be monitored


Before 2013, hardly anyone knew about this. In fact, domestic operators did not encrypt data communication for certain areas of the GSM standard, allowing hackers to monitor the communication content of all GSM mobile phones within the coverage of their base stations. Once the content of SMS messages is obtained by hackers, all important accounts linked to the mobile number, such as online payment, email, and chat accounts, will face the risk of being stolen.


10. The star of 2013 - Cookies


The 315 event made the public aware of Cookies, which may have also triggered hackers' nerves. The "Cookie thief" Trojan began to appear online, stealing Cookie information and using it to attack QQ account passwords, as well as users' social relationships and assets. The extraction and resale of Cookies have also become an important means of the Trojan black industry chain for "washing accounts." Regularly cleaning related information through security tools has become a necessity for internet users to enhance their self-protection awareness.