QQ account theft method exposure 1: the bug of passwords is imperceptible
The trojan empire has the largest population and one of the oldest races in history. They are like a bug installed on a user's computer. They monitor every action on the user's computer and send the records of account and password information that hackers are interested in to the hacker without knowing it.
For exampleAh la QQ thievesThe system will install a keyboard bug on the user's computer to intercept the QQ account password entered by the user and send it to the server specified by the hacker.
QQ account theft method exposure 2: The most difficult beauty program to sell
The world loves us and is it delicious. In view of the changing nature of people, the trojan empire has a family of "Wonderful people. They often disguise themselves as "Beautiful photo albums", "my photos", and "beautiful pictures are mandatory" to entice users to click and some beautiful pictures will be displayed after users click, but in fact, the Trojan has been secretly running in the background. It is a popular beauty Trojan. We can see from the middle:
(1) photos, photo albums, pretty photos, and photos are the most commonly seen, just like love education films. This is also a requirement of many people.
(2) beach photos, Master's photos, and school girl photos are more effective than others. They are more inclined to those who have just graduated from Happy summer vacation and want to go to school soon.
(3) Personal Profile, purchase, materials, my clothing design, my business card, the latest consulting, and other more targeted groups are white-collar workers who have already worked.
QQ account theft method exposure 3
There are some "smart" guys in the Trojan Empire who disguise themselves as a key module in the computer's operating system. Then many software programs are spoofed to turn many normal software into code theft Trojans.
Hackers usually dress up as msimg32.dll (view important image files) and other software modules, and then release and hide them to the installation directories of QQ and other software, when these programs are used, the modules under the directory will be installed first according to the operating system rules, so these zombie software becomes a helper for hacking Trojans (fake msimg32.dll.
QQ account theft method exposure 4: difficulty in distinguishing the true and false of yirongshu
This kind of QQ account theft Trojan is really easy to pass, they dress themselves up as a QQ login interface through superb ease; some fake QQ logon buttons will be used in the QQ logon interface to conceal the real logon button, as shown in the password box, "Paste" a transparent "tape ", stick your account password.
Question! Can you tell from the following two logon interfaces that the real logon window is false? (The answer will be published after 100L)
(Answer: the one on the left is true, and the login button on the right looks like there is another layer. Are you right? )
QQ account theft method exposure 5: Taigong phishing bait
This year's most popular QQ account stealing method. This method can be spread through QQ chat information. When a user account is stolen from all her friends, QQ Group will receive the phishing message in the format of "asking friends for help + phishing URLs". If someone clicks the phishing URL to open a fake QQ space, the background is usually a thumbnail of the Beauty album, in a conspicuous place, the system prompts "You need to log in to access the QQ space" to obtain the QQ account and password of the victim and then defraud friends.
The other is to disguise itself as a variety of brick-and-brush programs, so as to give QQ users a free drill, the QQ icon lit up on the grounds that the user is tricked into entering the QQ account password, then secretly send the account and password to the hacker's server.
From http://bbs.guanjia.qq.com/forum.php? Mod = viewthread & tid = 59787.