CCTV 315 party exposure mobile phone software Malicious installation program

Source: Internet
Author: User
Keywords Mobile software malicious installation
Tencent Technology Zong March 15 reported in today's CCTV 315 party, mobile phone pre-installed malicious installation program was exposed. CCTV's survey showed that the company named Ding Open the Internet can be used for mobile phone implantation platform for the licensed mobile phone tailor-made software packages, you can do so that users do not want to delete. and can monitor the use of users, only this pre-installed business each year for the company can bring a huge income. Another Datang High-hung, is Datang's company, Datang artifacts can be fully automated intelligent installation software, this product is to the mobile phone business cooperation. At present they have 1404 franchise agents, installation software more than 46 million. One of the products Datang artifact, as long as the mobile phone connection can be automatically installed. At present, High-hung company is pre-installed software, there are 17 of the current popular software, mobile phone dealers each installation can get Datang to get 3 yuan. Prior to this, Tencent Technology has reported that the real world there is a more "dark" application of the promotion of the way: The Silent Channel, the application of the promotion channel has been illegal suspected. The specific way for, and mobile phone manufacturers in depth cooperation, will leave a backdoor software built in the factory phone, through the back door remote control of these applications, secretly download the installation of other programs in the background. "It can be installed directly without user confirmation, and security software cannot be traced," he said. Insiders point out. Mobile phone pre-installed software can be divided into manufacturers pre-installed and brush machine pre-installed two major categories. Among them, manufacturers pre-installed including handset manufacturers pre-installed (covering the chip-level pre-installed) and operator customization Machine pre-installed. The brush machine pre-installed covers each link of handset sale, parallel imports of mobile phones will have a parallel brush machine pre-installed, licensed mobile phone including agents pre-installed (such as audio communication), chain stores pre-installed (such as Suning, Gome (Micro-bo) (micro-Bo), di-letter), operators and other retail outlets pre-installed. Each cell phone distribution will likely produce a new pre-installed, pre-installed at the same time will be the pre-pre-installed cover out. Last November, the Ministry of Industry "on the strengthening of Mobile intelligent terminal Management Notice" Formal implementation, requires the production enterprises should not be in mobile intelligent terminals Preset five types of applications, including unauthorized use of the terminal communication function, resulting in flow consumption, loss of costs, information leakage and other adverse consequences. In the ding open interconnection by CCTV after exposure, Tencent technology to contact the company's Web site contact, unable to connect. The following is CCTV 315 party record: Moderator: Now in our lives more and more people use smartphones, mobile phone software is also a lot of software so that consumers have a lot of new consumer experience, such as now casually take out the phone to click the mouse can chat with friends, chasing blockbuster, can complete online banking and so on. I would like to remind you, when you use mobile phone with the joy of time, there is no thought of such software and procedures may be hidden inside the ghost? Engaged in mobile phone consumption for more than 10 years Mr. Zhang came in frequent encounter returns, are said mobile phone malicious deduction charges. In a user's mobile phone bill to say that a lot of custom services, the reporter sent old Zhang mobile phone to the countryThe Internet Detection Center found that the phone was quietly implanted in a malicious program. is to remotely control the user's mobile phone without the user's knowledge. Not only can install the application software, can even uninstall the mobile phone in the central software. It can secretly get personal information from the phone and send it quietly. This is a trojan, the software corresponding to the Beijing Ding Kai United Information Technology Co., Ltd., on its website can be seen, the company can be implanted in the mobile phone platform for the mobile phone tailor-made software packages, they can make users want to delete are not deleted, and they do are licensed mobile phones. In addition to allowing these apps to be erased from the phone, they can also monitor user usage. Only this pre-installed business can bring a lot of revenue to the company every year. The reporter found that through the mobile phone dealers pre-installed software more and more popular methods. Datang High-hung, is Datang's company, Datang artifacts can be fully automated intelligent installation software, this product is to the mobile phone business cooperation. At present they have 1404 franchise agents, installation software more than 46 million. Reporters saw what they said to promote the power of Datang artifacts, as long as the mobile phone connection can be automatically installed. At present, High-hung company is pre-installed software, there are 17 of the current popular software, mobile phone dealers each installation can get Datang to get 3 yuan. How is the mobile phone that has been sold to the user monitored? Reporter put High-hung artifact to Fudan University for monitoring, and artifact integrity, immediately have three applications, no picture on the desktop, every time will automatically picture, they will get mobile application linked list, monitor the use of time, and in the background to send the official website server. What can be strong: The National Internet Emergency Center, the software promoter developed by the Trojan Horse program to determine the privacy of the theft of malicious programs. National Internet Emergency Center: Consumers may have such an encounter even if they buy a licensed product. So it's a huge risk for consumers. Moderator: Just now the investigation let us see the malicious program opened a door on our phone. Not only can we steal our information, but we can also steal our personal privacy. In fact, for every consumer, the reason to choose a mobile phone, or select a software application, is out of the manufacturers and software companies Trust. But just now the survey can see that our goodness and trust have been exploited. For those who use malicious implants as a source of wealth, they are bound to pay for what they do, without the trust of consumers.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.