In Yiwu, Zhejiang, the owner of a small business just went to work. The surveillance video of the previous day found that someone had turned into the room in the early morning, but the strange thing was that there was nothing in the store stolen. After carefully reviewing the video, I discovered that the mysterious man who sneaked in and ran into the computer in the store and left.
In this case, the merchant is also very confused, I do not know whether it is burglary, so there is no alarm. But not long after, the transaction record and order data of this small business appeared in the "network black market".
It turned out that the mysterious person inserted a modified U disk "Bad USB" on the computer of the small business, which contained a Trojan virus that could be closed and executed. After copying it to the computer, the mysterious person can remotely control the computer. In order to obtain the transaction record of the merchant and a large amount of real information of the user, and even affect the security of the fund. Moreover, mysterious people can also sell merchant data and personal information to online fraud organizations, causing more threats.
This is typical of the crime of network black and gray production. The so-called network black ash production refers to the act of using the network to carry out illegal criminal activities such as telecom fraud, phishing websites, Trojan horses, and hackers. A little different is that “black production†refers to cybercrime that directly touches the laws of the country. “gray production†is a controversial behavior that is on the edge of the law and often provides assistance for “black productionâ€.
Behind the above cases, it also reveals the difficulties and pain points in the current black-and-grey production governance: the behavior is hidden, users and businesses are hard to notice; the division of labor is clear, the industry chain has been formed; involving multiple parties, but it is often difficult to clarify the responsibilities of all parties; Security threats are far-reaching, but current laws are difficult to eliminate...
Network black ash production has reached nearly 100 billion scale
How much threat does the network black ash produce? I am afraid there is no absolutely accurate answer to this question.
According to the "2018 Network Black Ash Production Control Research Report" issued by the Southern Digital Data Research Institute and other institutions, the scale of China's network security industry in 2017 is more than 45 billion yuan, and the black ash production has reached nearly 100 billion yuan; The economic losses caused by spam messages, fraudulent information, and personal information disclosure are estimated at 91.5 billion yuan, and telecom fraud cases are growing at an annual rate of 20% to 30%.
The report also pointed out that there are four types of black and gray production: source black and gray production such as false account registration; platform for illegal transactions and exchanges; Trojan horse implants, phishing websites, various malware, etc.; mostly malicious registration Network black account implemented in the form of false authentication, hacking, etc.
According to the statistics of Ali Security Zero Lab, from April to December 2017, a total of hundreds of thousands of telecom frauds were detected, and the loss of the case was over 100 million yuan. The number of victims involved was tens of thousands, and the number of telecom fraud cases remained high. Constantly upgraded. In 2018, there were hundreds of active professional black and gray production platforms.
Although the amount is amazing, many people do not know how they are targeted by black and gray. According to the senior expert Kung Fu of Ali Security Zero Lab, network blacksmiths often use a router nicknamed “Big Pineapple†to disguise themselves as a free WIFI. As long as the user connects, they can steal personal information and monitor the user's browsing history; The “cat pool†equipment of more than ten phone cards is often used to register the junk account “薅毛†on the e-commerce platform; they also often use 2G SMS sniffing devices with a total cost of less than 100 yuan to get text messages from anyone around. Content, thus stealing credit cards.
Behind these devices, black ash has formed a clear industrial chain. Kung Fu introduces the telecom fraud of the fake public prosecution law as an example: after the fraud leader builds the dens and recruits the fraud members, they will purchase some personal information of the users through the black market; then the recruited first-line operators will act as telecom operators and banks, and deceive according to these personal information. Users; second and third-line operators play the public security and procuratorate, gain the trust of users, and transfer the money to the designated "secure account"; eventually, the other groups in the country will withdraw funds at the same time in several bank outlets across the country.
"After the successful fraud, the boss can get about 59% of the funds, the first-line scammer can only mention 5%, the second-line and third-line swindlers can probably raise 8%." Kungfu said that many gangs have been very detailed, which will be hit in the future. Black ash production brings no small challenge.
Personal information leakage is the source of black ash
In many online black and gray behaviors such as telecom fraud, the user's personal information is one of the sources. Kung Fu also told the China Youth Daily and China Youth Online reporter that the disclosure of personal information as a network of gray products is the source of many illegal crimes, but it is difficult for enterprises and regulatory authorities to completely manage this problem.
The White Paper on Telecommunications and Internet User Rights Protection, published by the China Institute of Information and Communications in January this year, mentions that the survey data for the first half of 2017 showed that the personal information security perception scores of telecommunications and Internet users were 6.5 points, and 2013. There is almost no improvement in the year. The most important factors affecting the security perception of personal information include personal information disclosure, excessive collection of personal information, and collection without consent. Nearly 80% of users believe that privacy leakage is serious, and more than 50% of users believe that the application software “sneak collects personal informationâ€. .
Ning Hua, deputy director of the Information Security Department of the Terai Terminal Laboratory of the China Institute of Information and Communications, once said that there is a new challenge in the protection of personal information: in the past, users felt that their private information was leaked and utilized for a week or even a month, but now It may take only a few hours to perceive that the privacy information is reflected in the advertisements and shopping websites. In the past, many private information was provided by users, but now many users do not provide the information, but also collected by the merchants or platforms. Used.
In response to the new challenges of personal information protection, public security and other regulatory authorities are also working hard. As of December 20, 2017, the national public security organs accumulatively detected 4911 cases of infringement of citizens' personal information, arrested 15,463 criminal suspects, and destroyed 164 companies involved. However, the network black ash production has been making extensive use of personal information to carry out illegal crimes such as telecom fraud.
According to Kung Fu, under the attack of all parties, the “four-piece set†(identity card, bank card, mobile phone card, bank U shield) used by many black and gray workers was gradually sealed up, resulting in “four setsâ€. The price has risen from more than 100 yuan to 1,500 yuan, but even so, black gray production can still obtain a large number of users' private information through many channels of "dark net".
There are always people who better than you. Kung Fu believes that in view of the still embarrassing black ash production behavior, enterprises and platforms that need to master technology should be coordinated with the public security and other regulatory authorities. For example, through the big data capabilities provided by enterprises, public security and telecom operators can build a unified number identification platform, and push the fraud number to each user's mobile phone to avoid being cheated.
Yuan Chunyang, deputy director of the Network and Data Security Management Department of the Network Security Administration of the Ministry of Industry and Information Technology, also said that data security and personal information protection issues involve multiple links of the mobile Internet. It is necessary to strengthen industrial cooperation and strengthen collaborative security. Responsibility, relevant industry organizations and security vendors must give play to the advantages of organization and technology, improve and perfect the industry self-discipline and network security collaboration mechanism, build a network security defense line, and jointly improve the security of network security.
Collaborative governance cannot blur responsibility
Collaborative governance is a key word often mentioned by many people when discussing cybersecurity issues in recent years. Along with it, how should cyber security involved parties bear the corresponding responsibilities?
"In the past, everyone said that black and gray production management should be united to do things. This sentence is very correct, but the union is also easy to become no one is responsible." Zhang Yudong, senior director of Ali Security Department, believes that the management of black ash can not be coordinated Governing and confusing the responsibilities of all parties should start with the root causes of the problem, analyze the responsibilities of all parties, and urge each other to solve problems.
Zhang Yudong analyzed that the network black ash production needs to first understand the basic situation of user privacy through the mobile phone number; secondly, it is closer to the user through social network, telephone, SMS, etc., to defraud the trust, and finally directly contact the user, thereby defrauding the trust to implement the fraud. .
According to this process, Zhang Yudong believes that telecom operators and social networking platforms should also assume greater responsibility in the management of black and gray. For example, he said that many telecom fraud and phishing scams are tricked into tricking users into connecting with free WIFI, or intercepting and sniffing text messages. "If the operator does not solve this problem, there will always be a link that can be falsified, and this problem cannot be cured."
In addition, he is also concerned about a more subtle but larger amount of data breaches involving the privacy of users. He called for platform-level companies that take advantage of the network infrastructure to take the lead in demonstrating and acting first to protect user data and personal information from disclosure. “It’s the first step in the snow before the house sweeps the door and puts it in advance.â€
However, as a network security practitioner, he also understands the current challenge of pushing enterprises to invest a lot of money to protect user data and personal information. Therefore, he hopes that the system level can further demand the responsibility and investment of enterprises in this respect.
Zhou Hongyi, Chairman and CEO of 360 Company, also told the China Youth Daily and China Youth Online News that personal information protection is a key issue in the law of the Cyber ​​Security Law, but more details are needed in the specific implementation. Especially for Internet companies that have a large amount of user data, he suggested that the system level can make more detailed regulations on how such enterprises handle, resell, and exchange user data, and should also make provisions for collecting and storing user data to ensure privacy. Data can not be stored in plain text, but encrypted storage to avoid being easily used.
Attorney Wang Weiwei, a partner of Guanlan Zhongmao (Shanghai) Law Firm, believes that the frequent occurrence of corporate data and personal information disclosure in recent years shows that many companies still cannot meet the requirements of laws and regulations at the technical and management levels, and disclose data. There is still a chance to evade responsibility, and there is no obligation to perform as a personal information controller or network operator. On the other hand, it also shows that the supervision and punishment of the responsible party for personal information disclosure incidents are not in place, and the company’s luck is indulged. .
"Network security and personal information protection require the joint efforts of enterprises and governments to construct, perfect rules, and implement them. This is definitely the first consideration." Wang Weiwei called for both regulators and specific enterprises to take real action. .
Safety Disposable Clothing,Medical Isolation Clothing,Icu Isolation Clothing,Hygienic Isolation Clothing
GUANGZHOU HTD INTERNATIONAL , https://www.maskhtd.com