Jiede mobile phone stolen traffic: application of hidden Trojan virus wifi and 3G switching

Source: Internet
Author: User
Keywords Trojan virus steal run traffic
Recently, security research and vulnerability reporting Platform Cloud website issued a security warning, pointing out that the mobile phone software has been tampered with Luantan advertising background stolen traffic is increasingly serious. Then the media launched through micro-blog, "Did you find mobile phone stolen traffic?" Poll, the result is that more than 30% of voters have reported "once-mobile phone traffic" phenomenon. As for the reasons for the flow of theft, some have a certain basis for mobile phone knowledge of the respondents said that the flow monitoring software will be tested, found that many of the software to steal traffic is downloaded in the third party software market, they were hackers "two times packaged" write malicious code. In fact, this is only the "tip of the iceberg" of traffic theft, which is a malicious part. In addition, there are some "inadvertently inserted Liu" traffic theft. Expert tips, want to completely eliminate traffic theft, unless the data function is turned off. Otherwise, give up your smartphone. Traffic theft is difficult to eliminate what is "mobile phone stolen traffic"? There is no precise definition, according to the usual situation, mostly refers to consumers do not know, the mobile phone because of mobile internet generated unknown traffic. In today's information society, smartphones are almost the necessities of people's lives, according to Cnnic recently released the 32nd China Internet Development Statistics report shows that in the first half of 2013, mobile phone became the first source of new netizens, accounting for 70% of the new netizens. Affected by its impact, as the Internet's first major application ——— Instant Messaging (micro-letter products) in the mobile phone side also has a decent performance, its internet users up to 397 million, the use rate of 85.7%. As instant messaging applications evolve from a single chat tool to an integrated platform, their market potential is also stimulated. Unlike SMS, instant messaging software sends information through traffic. In other words, there is no cell phone signal, as long as there is WiFi network, can also send information. Nowadays, more and more people begin to use micro-letters instead of text messages. As a result, mobile internet access has become an essential living accessories. If in the age of the function machine, the Internet of mobile phone will surf the net. Because it is a single task to run, the basic will not appear the problem of running traffic. The age of the intelligent machine is not, there are mobile application engineers to the south are reporters that want to eliminate the flow of stolen traffic, unless the Internet function is turned off. However, the smartphone will not be useful, it is better to throw away, is not realistic. "However, even the flow of traffic, there are ' intentional ' and ' unintentional ' two kinds. "The engineer said that most of the traffic is unintentional, the telecom operators will not and application developers on the flow of profits to be divided into, so even the intention to steal traffic, the purpose is to pop more ads or to achieve internal purchase fee items," rejection. Traffic theft eight crimes according to the introduction, many reasons may lead to "traffic theft", but the most common there are eight kinds. The first of these is the "malicious code" issue mentioned in the introduction of this article, which often appears in the iphone after the jailbreak and all Android phone, the table is "two packaging" application, embedded in the Trojan horse software, will lead to traffic theft. If there are some shanzhai or parallel mobile phones, you canCan be sold when the software has been installed, and embedded in the bottom of the system, it is difficult to uninstall the normal way to remove. But this is only a small part of the reason, more traffic is stolen due to some "unintentional behavior." The most important include application automatic detection download update, application software message push and software background running. At present, Android, Apple OS, Microsoft WP operating platform and other mainstream intelligent operating system, as well as the vast majority of applications support the online update function, the mobile phone will regularly check whether the need for updates. If not updated in the WiFi environment, the consumption of traffic will be difficult to measure. In addition, message push is also "traffic killer". Applications such as weather applications, micro-letters, and emails are constantly pushing messages to the user, and the push itself requires traffic to support it. As for the background operation problem, the probability of appearing is small, but "lethality" is very big. No matter what kind of smartphone platform, most programs will automatically disconnect after entering the background. But there is also a network of procedural loopholes, most typically in the Apple iOS6.0 System with podcast (podcasts) to download audio files. In the background download, the same file with the system download traffic will be more than 3 times times iOS5. But then Apple fixed the leak on iOS6.0.1. In addition to these, mobile video application of the offline cache in the network switching (WiFi switching 3G) process can not immediately identify changes in the network, a movie hundreds of trillion, the move is swallowed hundreds of megabytes of traffic is not impossible. When it comes to WiFi, for power saving and online maintenance, some smartphones automatically switch WiFi to a 3G network when the screen is dormant or when the WiFi signal is unstable, to maintain the Internet, and if users are downloading video or music, traffic may run. In addition, some users may open their own WiFi hotspot sharing, the mobile phone as a wireless router, but at the same time to protect the work did not do well, appear to be rubbing the network situation, the consequences of unimaginable. Finally, there is a situation limited to Apple users, some people in the App store when downloading applications, sometimes did not notice the application of the size of the hint, the download will not be ignored, resulting in the user "artificial" traffic stolen. Interview: South all reporter Fangnan [industry observes] flow steals how to break? Understand the flow of the cause of the theft, users can start from their own, pay attention to avoid the above eight kinds of situations. For example, on automatic update issues, try to adjust Automatic Updates to manual updates. Some need to push the application, the push time interval set to lengthen. In addition, the background of the operation of the application generated traffic, users difficult to properly solve from their own. However, in general, the application Development Chamber proactively resolves these issues to maintain its brand image. As for the other than Trojans, viruses, other than traffic theft, most of the wifi/3g switch. Although, many applications now have wifi/3g switch prompts to remind users of the network status has changed. However, the application itself will always have a failure probability, in case of no prompt to switch the network directly, traffic is easy to run away. This requires users to stay in the middle of a video, music application, or download software to make sure they are in a WiFi environment when watching online video or downloading apps. Finally back to the beginning of the article mentioned "malicious traffic theft" problem, that is, mobile applications are packaged with trojans or viruses. In this case, the most direct means of prevention is through the formal purchase of authentic licensed mobile phones, do not install risky software, if the purchase of parallel mobile phones, it is best to buy the machine after the official system, to avoid the original system was implanted with malicious software. In addition, can also be installed 360, Jinshan, Tencent and other developers launched mobile protection software. However, like PC-side protection software, these programs need to be fully trusted while protecting your phone. Because these software installation needs "Deep" your mobile phone, in order to "solve problems" for you. From the perspective of privacy protection, the process itself, the number is also risky. [Data]2013 in the first half of the year, mobile phone became the first source of new netizens, accounting for 70% of new netizens. Affected by its impact, as the Internet's first major application ——— Instant Messaging (micro-letter products) in the mobile phone side also has a decent performance, its internet users up to 397 million, the use rate of 85.7%. All of these have made a "great contribution" to the sharp rise in mobile traffic.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.