"Trojan" flood over two years seller loss can not be estimated, "Grand theft" variant degree of harm doubled

Source: Internet
Author: User
Keywords Alipay

Online shopping has gradually become a new fashion, but it also brings a lot of confusion. A few days ago, QQ computer Butler in the "Online shopping security Month" activities received a lot of netizens feedback, said in the online shopping encounter a lot of difficult problems. The most easy to lose the police is a payment for the Trojan plug-in, there are many consumers accidentally on the Trojan horse.

Taobao sellers "Cheat flow chart"

"Trojan" flood over two years sellers loss is not estimated

The online shopping security month on the Internet fraud information combed, from the summary of the feedback results, "pay treasure thief" operation is very tight, in the choice of the amount of crime, hackers usually tend to small amount of transactions, such as 50 yuan to 100 yuan trading. BEIJING-East, Taobao and other mainstream electrical business feedback staff pointed out that, due to the loss of small, many users even if found problems, do not want to spend time to delve into.

Because the specific data can not be counted, "pay treasure theft" of the flood range can not be closely delineated. According to QQ computer Butler Security Center Introduction: Similar to the payment of Treasure Trojan, plug-in variant has been more and more, the first outbreak in 2010 after the appearance of "blowout" state, the amount of fraud is also increasing. 2011, "Alipay Trojan" has become the most popular high-risk trojan.

"Grand Theft" variant, the degree of damage doubled

"Alipay" has been replaced with time, the current version is the hacker can freely intercept the online transaction information and control of infected persons, can at any time to the selected target to send forged payment page information. Latent time and fraud times are uncertain, the degree of damage doubled.

It is understood that as early as 2010, "Pay treasure thieves" has derived more than 200 varieties, so far more than 400 varieties of variants. The variety of "Alipay" is endless, killing more than one, because the virus will use the download tools, browsers and shopping software digital signature to circumvent anti-virus software, thereby stealing the interests of users. Therefore, the protection of the user's property security, cut off the source of the interests of hackers, in order to prevent the industrial chain of "pay treasure thieves" continue to do evil, the most urgent problem to solve the key problems.

QQ Computer Butler Security Center pointed out that "pay treasure thief" has been two years, and the early "stolen money ran" different, now the "pay treasure thieves" once the operation, hackers can intercept the infected person's online trading information and its implementation of free control. Characterized by latent time and the number of scams, from the "last time" into the "at any time", the harm has doubled the upgrade.

Safety nets need "cloud platform" plus body

For the increasingly popular online shopping scam, including the Beijing-east and other nine major electric dealers also have deep experience, the joint QQ computer Butler held "online shopping security Month" activities, intended to popularize Internet users of security knowledge, but also to remind netizens in receiving similar "Alipay is supervised, buyers can not pay" and other Third-party payment platform information, Don't be credulous. Should first turn off the trading window, and then login to wait for QQ computer Butler Security Certification pop-up window appears, after the confirmation of payment, basic can avoid 75% of the common active "pay treasure thieves" variant, if necessary, directly contact the relevant electrical business website customer service.

In fact, early in the "net shopping security Month" activity before the start, QQ Computer Butler has fully built the cloud platform's technical backing for Taobao shopping browsing behavior to provide full defense, every hour can handle 2000~3000 new virus, coupled with the traditional based on signature solutions, will take the opportunity of the online security month activities, Once again, the existing network transaction environment to rectify.

In the face of various variants of Trojans, plug-ins intrusion, experts said: "To rely on technical force to ensure network security, the choice of reliable security software for the network life escort, and maintain a good network of life habits is also an effective way to combat virus attacks."

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.