(the article turns to prevent oneself cheat big data: FPData)
Text in all: 2978 words
Read time: 8 minutes
Topic figure: Data chart
Recently, can says " history on case of filch of the most extensive data " be promoted to jump over police of the city zone to detect by Zhejiang carry on. Police is found out, a group of criminal uses the data of 3 billion users of illegal filch, hold accuse user Zhang date to undertake small gain, small letter, QQ, those who shake the gregarious platform such as sound add pink, brush a quantity, add group, violate compasses promotion, gain profit illegally, a year of battalion of a company closes to exceed 30 million yuan.
Data origin makes a person stare tongue-tied
Disclose according to police, this crime gang relies on what Beijing gives priority to course of study with new media sale to appear on the market company, through with the whole nation business of operation of much home of town of more than 10 provinces signs sale advertisement system to serve a contract, get user data illegally from inside pool of operation business flow, bring about Baidu, Tecent, A one after another in, the data of user of company of 96 Internet of countrywide such as today's top headlines by filch, almost home all large Internet enterprises all by " wild goose depilates too " .
The user search record on the net, give a record, record opening a room, trade the information such as the record, all be mastered by the guilty gang of filch user information; More dangerous is, this crime gang is superintended to escape find out, still occupy ministry mark memory to go up at Japanese server, many citizen individual number endangers the huge risk of national security according to be being put outside the condition to also exist. (the article turns to prevent oneself cheat big data: FPData)
△ graph commits the crime for guilty gang tool
Final, zhejiang carry on is promoted jump over police of the city zone to hit out in time, in Alibaba safe branch assistance falls, destroyed this to endanger the guilty gang of network news safety badly, prevented information of 3 billion users successfully divulge.
This year in June the last ten-day of a month, zhejiang carry on is promoted exceed net of substation of public security of the city zone alarm the group is received several cases similar report a case to the security authorities, come from individual and enterprise respectively, there is homogeneity on details of a case however, this one detail caused the high attention of police.
Report a case to the security authorities person 1: Regular meeting of my small gain classics pays close attention to two months recently unfamiliar Zhang date, QQ can be added suddenly new good friend and group, the mobile phone also is met indescribable receive all sorts of rubbish advertisement to play window, short message.
Report a case to the security authorities person 2: My gregarious Zhang number is unusual, information is annoyed frequent, suspect individual information to be divulged.
Report a case to the security authorities enterprise: The clue that A Lian provides completely, say to carry on promotes user feedback to clean out a good friend to have the case that different often adds stranger, doubt is like individual information to meet with leak.
Through investigating discovery, 8 IP address on April 17, 2018 for many times unusual visit reports a case to the security authorities Zhang date of the person, and the IP with subject address of these 8 IP paragraph, still visited the account of more than 5000 people early or late. In technical personnel assistance falls, 3 companies that discover its are with luck Zhi Huasheng heads rear are in hold accuse, these 3 companies control a person actually to be Xing Mou together, main member all is same group of person, among them, ruizhihua is gotten the better of more hanged out his shingle formally 2017 new 3 board.
△ on July 3, 2018, zhejiang carry on promotes the police that jump over a city to be in company of Zhi Huasheng of luck of Beijing Haidian area to capture guilty suspect, technical personnel undertakes the spot obtains evidence.
On July 3, police is carried out to experience case personnel capture, arrest 6 crime suspect on the spot. As the ceaseless development of investigation, a division of labor major of clear, method, gain profit quite the data black ash of abundant produces guilty gang by uproot, a kind of completely new-style data theft commits the crime the method also is opened before common people.
Filch user information billions of
Gang of a crime commits the crime, why should establish 3 companies? Original, two companies are used get operation business flow, and lucky Zhi Huasheng is in charge of undertaking data treatment, processing, through essence of life accurate sale, ill will plays a window, add pink, brush the means such as the quantity to change data now. (the article turns to prevent oneself cheat big data: FPData)
Begin from 2014, company of two experience record the means with contest mark, connect with the telecommunication that enclothes more than 10 province city of countrywide, mobile, UniCom, iron early or late, the operation business such as wide report signs sale advertisement system to serve a contract, the development that offers essence of life to allow advertisement to put in a system for operation business, safeguard, log onto attributive remotely what take operation business server then.
Handle a case policeman Chan Zhongying: Alleged Cookie, be equivalent to the entry proof of user Zhang date, do not need to input Zhang date and password again through Cookie, can enter user Zhang order, and can register the data such as record of information, search, record opening a room from what the user gets in user Zhang date. This crime gang used this one character just about, operate user account adds pink, brush a quantity, undertake the means such as the baleful promotion that play a window gains profit illegally.
△ 2017, uncover the case that uses artificial intelligence technology to get citizen individual information, guilty gang commits the crime for narrating tool.
Put the baleful program that writes independently on the server of operation business interior, when the discharge of the user passes the server of operation business, this process works automatically, clean from which, collect the crucial data such as record of an user Cookie, visit, derive all data again, deposit was in on the many servers that Ruizhihua gets the better of condition inside and outside. Show according to the data of police statistic, the citizen data of filch of this crime gang already exceeded 3 billion.
Appear on the market the company is data of transition of accumulate wealth by unfair means black produce
The quantity of vermicelli made from bean starch of date of small gain big V that lucky Zhi Huasheng masters is in 2 million - 6 million differ, release or the quote of a small gain is in transmit 2000-4000 yuan differ, date of small letter big V pushs the price that sends content to be in 7000-20000 yuan / differ. Be being gotten the better of as a result of Ruizhihua is to appear on the market company, all offerring increase the pink, cost that brushs quantity, baleful promotion, pass additional close an account of company of two experience record, walk along Zhang. Its are subordinate from media date " amusement elder sister came " " Beijing information " etc, added up to in January 2018 only add pink 218 thousand, the price is 0.5 yuan / pink, settle accounts amount is 109 thousand yuan.
Zhang Mou of some website controller: Cooperate with them, can make the number of vermicelli made from bean starch of date of hand over the accounts of a few companies, good friend number cruel add really. Came in April 2017 in September, I pay more than 360 thousand yuan to experience record company, the QQ accumulative total that goes up for the hand adds more than 140 thousand person; Additional, 8 shake phonic Zhang date to also spend Qian Jiafen 10 thousand to ten differ.
And this one mode also allows Internet sale really full earthen bowl of basin of earn of lucky Zhi Huasheng is full. When doing software to develop a service 2015, its battalion closes only 1.87 million yuan, net profit 20 thousand yuan; After transition makes Internet sale 2016, the company realizes battalion to receive 30.28 million yuan, net profit 10.53 million yuan.
Operation business lacks a tie to supervise, fountainhead fall
Xing Mou's company is in after with the whole nation the operation business of many provinces city signs agreement of sale advertisement cooperation, operation business all did not have necessary tie to specific project, supervise, just let them take advantage, the enterprise of large Internet of user data home of filch does not have one escape by sheer luck. (the article turns to prevent oneself cheat big data: FPData)
Internet safety expert expresses, undertake from the level of operation business discharge is hijacked and clean, was equivalent to be being lost from the data on fountainhead, the safety that is located in downstream Internet company defends capability is again strong, also cannot be on guard, once Internet enterprise discovers the behavior that endangers data security should provide technical assistance in time to police.
Setting link
What case backside mirrors is the tall hair that encroachs case of citizen individual information in recent years. Last year March, the Ministry of Public Security begins blow punish hacker attack is destroyed and the network encroachs citizen individual information to commit a crime special operation, only 4 months time detects relevant case more than cases 1800, arrest guilty suspect more than 4800, hunt down information of individual of of all kinds citizen more than 500.
Zhao Zhanling of researcher of engage by special arrangement of center of intellectual property of university of Chinese politics and law points out, guilty suspect gets citizen information illegally to undertake essence of life follows the action of sale, form civil tort to the user not only, still be suspected of forming violate crime of citizen individual information. At present this case still is being investigated further in.
How should the user protect individual information?
Face increasingly serious individual information to divulge with safe menace, strengthen relevant law on one hand construction is crucial, on the other hand, average user is not helpless.
1, be on guard " information virus "
Do not join free Wi-Fi is mixed easily without add close defended Wi-Fi network, prevent a mobile phone to be mixed by attack by embedded trojan; Do not open new short message, colour to believe the link that sends at will, prevent couplet to enter " trap " website; The 2 dimension with unidentified antecedents of not optional scanning are piled up, the person that arrests a few have ulterior motives makes baleful program and trojan virus 2 dimension pile up transmission, minatory your privacy and belongings safety.
2, open of discretion of fixed position function
The GPS of the mobile phone locates the function may reveal our positional information. Accumulate certain amount when positional information, conclude very easily through the analysis rule of property of the workplace that gives an user, job, home address, life. So, answer to close GPS park position as far as possible when using necessary software.
3, severe control systematic limits of authority
Big data times, a few mobile application software are excessive the condition that demands consumer attributive close to " mad " , the user should read relevant article carefully when accredit, the attributive that avoids to will visit individual privacy as far as possible and the attributive that visit a network grant doubtful order at the same time. In the meantime, examine the relevant accredit case in software regularly, if have,violate compasses accredit, be in in time software " privacy " in waiting for option, be searched and delete accredit.
4, do not offer useless old mobile telephone easily
Useless old mobile phone and memory block data of article of the address book that normally memory has an user, graph, even if is deleted, apply software extremely easily also to restore, browbeat thereby the privacy of the user, belongings and data security. Ought to undertake physical destroy by melting or burning, expose the risk of privacy with avoid. (the article turns to prevent oneself cheat big data: FPData)
5, abide by confidential regulation strictly
Accomplish do not leave close message of experience of memory, processing in mobile phone or Internet environment, do not store in the mobile phone the sensitive information such as the working unit of core personnel, post. Can use simplified a book or use code name to avoid important and sensitive information to be exposed completely.
Origin | Xinjiang net alarm go on a tour of inspection executes the law