Password frequently leaked Internet security input less than 1%

Source: Internet
Author: User
Keywords Passwords security hackers netizens no

The end of 2011, a constantly upgraded password leakage events, so that 2011 years of the Internet "never lonely." From December 21 to December 29, a few days, the vast majority of well-known sites have all fallen, none spared. CSDN, more play, 178 games, 17173, Tianya, when, Jing-dong, Excellence ...

This is caused by hackers, Web site leaders to change the password "campaign", so that all netizens have a self-deprecating carnival.

User information on the Internet fast delivery, good people are changing the user's password, so that some people can never get back their account, and some old netizens even erased the original memory of the Internet.

This time, the safety of the Internet Enterprise Short Board exposed. Internet companies have 3 people full-time responsible for the site security scale is a luxury, more than 5 people are luxurious preparation, 10 people's security team only 3.

At present, domestic internet companies account for only 1% of IT spending, according to a report from reputable brokerages, while security spending in Europe and the United States now accounts for the overall 8%~10% of IT spending.

In the face of large-scale user information leakage, enterprises are duty-bound. But "vulnerable" they can not resist the "hacker" attack, or even the unconscious "disarm surrender."

Accountability, accountability. At this cusp, they have almost all opted for silence, and none of them has confessed to its own security spending detail. Inside, the major internet companies began the "self-examination, from the" storm, hoping to be able to temporary in 2012 years, to obtain the ticket to safety.

Collective fall

The hacker published about 100 million user accounts and password-related information

December 21, 2011, Jinshan poison PA product manager Han Zhengxi in a network security-related QQ group downloaded a CSDN user account password file. At the same time, he put the QQ group to use the Thunderbolt special tools to download the link, converted to fast transmission of the Thunder download link, sent to a friend Circle QQ group.

In just a few minutes, Han Zhengxi's files appeared on the professional security website "Dark Clouds" (wooyun.org). Quickly, a CSDN user base, which contains 6 million of users ' information, has spread rapidly across the Internet.

Whether it's a "show off" mentality between hackers, or a story behind a business organization, many of the user databases that were put in the "safe box", in a secluded place, were exposed to the sun.

December 23, 2011, more play, Dream West Tour through the Trojan leakage. Since then, 7k7k, 178 games, everyone, mop, century Jia Yuan, and so on, the country's major well-known sites almost all fall.

December 25, 2011, Tianya exploded its 40 million user data leakage, which accounted for its total 60 million users of 60%.

The same month 26th, when, Jing Dong, Fank and other front-line electric dealers were pushed on the cusp. They have leaked user information, including real names, phone numbers, and delivery addresses.

On the same month 29th, ICBC, Bank of Communications and Minsheng Bank were exposed to customer information. Even the world's Guangdong province has 4.44 million users of information suspected of leaking.

"Every internet company's users and passwords are leaking, just size." "In the interview, an engineer who has been in the security industry for many years told reporters that big websites, big companies are not trustworthy in the matter of security."

During the password gate incident, Chinese hacker godfather Goodwell said in a media interview that the hacker published about 100 million user accounts and password-related information, is expected to "underground hacker" has mastered more Internet user account information.

In the use of "Password leak query tool", many netizens on micro-blog to reveal their own voice, more than one website's username and password leakage. For convenience, many netizens unify their username and password, or associate with each other. Some use mailboxes to correlate with each other.

A reluctant to disclose the name of the CSDN user is miserable, her CSDN account information is leaked, through a series of links, Sohu, Gmai, NetEase, Yahoo and other mailboxes are all unable to log in. These mailboxes are her login forums, SNS, Alipay, and various shopping sites in the way that "binds" her to all of the Internet life. Because of the intricate connection between mailboxes, she was unable to retrieve the mailboxes by password retrieval. So, "a door breached, the whole city is lost."

Danger, and more than that. Smart phone into life, mobile phones began to become the main carrier of the public Internet life. "The information leaked on the phone will be even more severe, revealing the location in addition to revealing the username and password." "Cloud security maker Nebula Fusion CEO Majnoon told reporters.

At present, the operating system on the PC is relatively centralized (win90%, Mac close to 10%, Linux is 0.1%). Because the operating system "dominates the world", anti-virus software will be more perfect. However, there are many kinds of mobile operating system, various app applications. Because of the imperfect security software, many hackers have been eyeing this favorable opportunity.

"At present, the security problem on the mobile phone is not a full-blown outbreak, but once the internet tariffs dropped sharply, mobile phone users can be ' anytime online ', then the mobile phone hacker industry chain will be quickly mature. Majnoon told reporters that now the smartphone's CPU unified to ARM architecture, the chip has Qualcomm, MediaTek and other manufacturers, operating systems are iOS, Android, Windows, they are in the rapid integration, which gives hackers to save "one by one" cost.

"Mobile phone deduction, the deduction of traffic are SP times to play the pattern, the smartphone will also bring more ' hacker ' playing, such as query users often go to the region, GPS tracking, mobile shopping and so on." Dawei, a marketing director at Nebula Fusion, told reporters.

"We will live in a world of transparency and privacy. "Like in the Truman World, we all live under other people's surveillance, as long as others have the idea," he said.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.