Who is responsible for the rampant online black industry?

Who is responsible for the rampant online black industry?

[[188973]]

A set of data: According to the 38th "Statistical Report on the Development of Internet in China" released by China Internet Network Information Center (CNNIC), as of June 2016, the number of Chinese Internet users reached 710 million. With the rapid development of the Internet, more and more Internet users are accessing the Internet and enjoying Internet services such as social networking, e-commerce, games, and entertainment. However, they do not know that while the Internet brings convenience to people's lives, the governance of hidden dangers and blind spots is gradually exposed. Criminals use the convenience of the Internet to create a series of network chaos such as malicious registration, false certification, fraud, counterfeiting, etc., which seriously affects the user's online experience, brings great harm to Internet users, and also brings great challenges to major Internet companies.

On August 30, China News Service reported: "I just opened a training website through a search engine, without registering or logging in, but my phone soon received a sales call from the website's customer service staff. What's going on? Who leaked my privacy?" In the report, China News Service pointed out that a series of privacy thefts on the Internet that use unrestricted interfaces or loopholes of telecom operators to steal Internet users' mobile phone numbers for profit are rampant, and even a black industry chain with clear division of labor has been formed. In this process, the search engines that we frequently use in daily life play an important "role", and many people take it for granted that the search engines should be responsible. Is this really the case? Is the user's privacy really sold out by the search engine?

The Internet's black industry is rampant, and search engines are caught in the crossfire

In this era of information explosion, search engines have become the main tool for netizens to retrieve information, especially the retrieval of required information has become a "gold digging" point in the eyes of many hackers. Therefore, some criminals collect users' privacy for sale and fraud by implanting malicious codes in websites legally included in search engines. Especially after the popularization of mobile Internet, many netizens use mobile phones to access the Internet. Once they visit malicious websites, not only will their phone numbers be leaked, but even the address book and text messages on the device may be extracted. This is why some online frauds are becoming more and more "precise". In this process, although netizens visit malicious websites through search engines, it is not the search engine that causes the leakage of users' privacy, but the protection of the target website is breached, becoming the target of malicious hackers.

In addition to hacking websites, some criminals have also set their sights on search engine promotion. Recently, there were media reports that Baidu's corporate promotion clients have been stolen, and even a black industry chain has been formed. In this industry chain, there are teams that steal corporate accounts, teams that pretend to be online, and online trading teams. Criminals often choose to start with the promotion accounts of small and medium-sized enterprises on the Internet, and induce them by sending links in the form of emails. Once the link is clicked, the corporate account is immediately stolen. After completing the theft, criminals can put on the cloak of these small and medium-sized enterprise accounts and carry out covert illegal activities, such as Internet gambling. The overall method of committing crimes is fast and covert. Search engines are the main channel for netizens to obtain information. Some criminals also try to damage the interests of netizens by publishing false information and using search engines to spread it.

According to the 2016 China Internet User Rights Protection Survey Report released by the Internet Society of China, from the second half of 2015 to the first half of this year, Chinese netizens suffered economic losses of up to 91.5 billion yuan due to spam, fraudulent information, and personal information leaks. The black and gray Internet industries have formed a huge industrial chain, and the black industry chain of the Internet has the characteristics of clear division of labor and strict organization. According to preliminary estimates, there are more than 1.5 million people engaged in the "black industry of the Internet" in China, and the market size has reached hundreds of billions of yuan. Search engines are actually the biggest victims of rampant cybercrime, and they have been fighting against cybercrime for a long time. In 2014, Baidu's security laboratory X-lab successfully supported the Guangzhou Panyu District Public Security Bureau in its criminal crackdown on privacy-stealing code providers, and arrested 13 criminal suspects. In 2016, Baidu's security crackdown on cybercrime projects has led to the closure of some leak interfaces (Beijing) in the upstream industry chain, and has successfully eliminated 33,000 illegal sites. At the same time, it can detect "risky websites" and mark them to remind users with its leading technology recognition capabilities. After review, those with problems are taken offline, which has a great deterrent effect on cybercrime elements. It can be seen that search engines, as victims, are also promoting the investigation and crackdown on the increasingly rampant cybercrime chain.

The cybercrime industry is showing a new trend of groupization and industrialization

"There is no killing without buying and selling." In fact, the root cause of the rampant cyber black industry is also because of the existence of buying and selling. The so-called cyber black industry refers to an industrial chain that uses hacker means to invade host or server sites and exchange stolen information for illegal gains, which is also the "black industrial chain." With the development of the Internet and the expansion of the number of netizens, the benefits brought by the cyber black industry are also becoming increasingly huge, driving illegal hackers from simply showing off their skills to grabbing profits, and causing the scale of the cyber black industry to grow exponentially. Due to the low cost, high technology and high return characteristics of the cyber black industry, it has gradually transformed from a semi-public pure attack mode to a tool for making money and a means of commercial competition. Various major network security incidents in 2014 showed that the cyber black industry has developed in the direction of groupization and industrialization to maximize its profits.

In July 2015, the People's Procuratorate of Panyu District, Guangzhou City, tried a case in which criminals used embedded codes to illegally steal personal information of netizens. In the case, the suspect Zhang found that the embedded code could be used to illegally obtain information such as mobile phone numbers and search key fields for visiting WAP websites. So he started a business called Mobile Monitoring Treasure and linked up with several friends to make profits. In total, millions of mobile phone numbers, mobile phone locations, search keywords, access times and other large amounts of personal information of netizens were stolen. After the trial, Zhang and others were convicted of illegally obtaining citizens' personal information and were detained and fined in accordance with the law. In the process of solving this case, Baidu Security's technical detection and data identification and analysis played an important role. In addition to fully affirming Baidu Security's crackdown strategy and achievements in the fight against online black industries, experts also pointed out that "the crackdown on individual cases is still not strong enough for the rampant black industry chain. Internet companies with technical strength also need to be 'industrialized' to work with public security departments to crack down on it."

To cope with threats, security protection urgently needs to be ecological

Unlike foreign security vendors who focus on focus and collaboration, domestic security vendors are too focused on horizontal development and prefer large-scale integrated security solutions, which often make it easier for illegal hackers to exploit loopholes, making the already passive security defense even more passive. In addition, in terms of sharing threat intelligence, especially when it comes to confidential information, domestic vendors are reluctant to share with others. In addition, there are strict export restrictions on cutting-edge security technologies abroad, and such defense measures are more likely to be penetrated by hackers. In order to better address the increasingly rampant network threats, only by creating a security ecosystem with data-driven security as the core and forming an intelligent, three-dimensional defense system can we conduct real-time inspection and defense against network black industries. At this point, Baidu Security provides a sample significance for the industry.

First of all, Baidu Security is gradually cooperating with a large number of security vendors. For example, it has started to cooperate with Huawei and Telecom Cloud, and has begun to provide users with anti-D services that can help users resist large-scale malicious attacks.

Secondly, Baidu Security is also promoting cooperation with upstream and downstream manufacturers. This cooperation mainly exports Baidu Security's security capabilities so that users no longer have to worry about security issues when using the products of Baidu Security's partners. At present, Baidu Security has reached strategic cooperation with domestic mainstream cloud platforms such as Telecom Cloud, Huawei Cloud, LeTV Cloud, QingCloud, and mainstream security manufacturers such as AWS. In addition, Baidu Security also provides security protection for Xiaomi and Huawei. After the official release of iOS 10, Baidu Mobile Guard will also release a new version adapted to iOS10. iPhone users can update to the latest system to experience Baidu Mobile Guard's precise anti-harassment interception function. Malicious calls can also be marked and big data collected in the Baidu Security Cloud database to prevent others from being deceived and say goodbye to all kinds of harassing calls.

Finally, Baidu Security is packaging its own security capabilities to form industry-specific security solutions, which are exported to industries such as finance, e-commerce, and gaming. Baidu Security has even established cooperation with more than 200 public security departments across the country, using technical means such as base station detection and positioning to effectively help public security organs combat cybercrime, jointly cracking hundreds of telecom frauds, and building a network defense line for users.

As the saying goes, two fists cannot beat four hands. Facing the ever-increasing number of equipment bases and increasingly rigorous security adjustments, it is not something that can be achieved by a single security vendor or the security industry through its own efforts. Security vendors should, like Baidu Security, join forces with the Ministry of Industry and Information Technology, the Ministry of Public Security, terminal vendors, operators and other fields in an open manner, and through a jointly established partnership system, standardize industry standards, strengthen crime prevention, directly connect to user needs, etc., to further improve the construction of a holographic security ecosystem and build a more reliable defense system for the network security ecosystem.

<<:  In 2017, the cybersecurity industry says no to black production!

>>:  Consumer finance practitioners tell the story: Black industry fraud is becoming more high-tech

Recommend

Alipay and WeChat are included in UnionPay clearing

As the deadline for the payment industry to "...

Huawei Mate X is a new species. You think foldable phones are simple!

In the mobile phone industry in 2019, foldable sc...

Strong partner ecosystem helps Denodo grow in Greater China

Beijing, March 10, 2021 - Denodo, a leader in dat...

From rough to soft decoration: 5G R17 standard officially frozen

After many twists and turns, the 3GPP R17 standar...

WebTransport launches its application practice

Business Challenges of Web Broadcasting Whether i...

5G and AI Use Cases - How 5G Helps Implement Artificial Intelligence

Michael Baxter says 5G will unlock the potential ...

Teach you how to distinguish between single-mode and multi-mode optical fibers

Single mode fiber Single-mode fiber has a thinner...

Why do we need UDP protocol?

Every programmer should know TCP and UDP protocol...

Shocking! 4G short videos exploded, 5G will eliminate pictures and texts!

The 2G era is an era of text messages flying ever...

How does DNS affect your surfing speed?

This article introduces DNS-related knowledge in ...