Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)aaa
published in(发表于) 2017/2/27 8:09:26
QR mess survey: Save trapped behind, almost no technical threshold,

English

中文

QR mess survey: Save trapped behind, almost no technical threshold-QR code-IT information

Recently, the Nanjing Mr Liu scanning thanks to cycling when QR codes, the wrong transfer prompts appear, then made a report to police. Some local people also found that after the scan the QR code on motorcycle thanks to the bike, if attention is likely the money will not be turned away.

False QR scam is not alone. Guangdong cracked two-dimensional code with fraud, criminals by scanning code fraudulent profits more than 900,000 yuan.

IT information with map, pictures from the Internet

As mobile Internet portal, QR codes have been widely used in social media, mobile payment, product promotion, applications downloads regard. "Xinhua viewpoint" investigative journalism found, because the code is almost zero threshold, outlaws the virus, Trojans, charge software into two-dimensional codes, consumers sweeping brush code was stolen occurred.

"Brushed myself a" behind the fraudulent: coverage of formal codes, Trojans implantation, remote replication

Consumer scan codes being fraud, thanks to the cycling official said, regular QR bike is nailed on the vehicle body, the fare must be paid through the APP. The QR code was found on the car sticker after, covering the original two-dimensional code, users scan scams are criminals QR.

In Guangdong, Foshan chancheng District Public Security Bureau branch found dozens of stores were posted at the cashier counter with false cases of QR. Replacement of suspect businesses receiving QR code, implanting false QR Trojans and viruses, obtaining consumer phone information and passwords, which fraudulent. Committing a total of more than 320 square, more than 900,000 yuan profit.

Reporters found, except covered with false QR regular two-dimensional code commit fraud, criminals also induce users to directly scan QR code with the Trojans and viruses. For example, Zhejiang repeatedly find criminals Esau code red envelope form induced by the user, once the user after scan code, opportunistic infections, Trojans and viruses, a variety of information was stolen.

In addition, some criminals through photographs, screenshots, remote control access to user payment QR codes, bank card fraudulent users. Zhejiang Taizhou derivative Zhao is a victim. During the process of online trading, outlaws used their PayPal balance is insufficient as an excuse, suggested that Zhao women sends the payment code to scan code for payment. After receiving the payment code screenshot, criminals copy immediately, Zhao was fraudulent bank accounts.

"Payment code equivalent to a bank card password, do not easily issued to another person. "Experts, criminals as long as gets, you can copy, access to bank accounts and passwords.

"Now I dare not to sweep yards, believe it is likely to be deceived. QR code is used but now lives in the place so much, really frustrating. "Hangzhou Miss Chen said.

"Two-dimensional codes emerge as entrance to new Internet fraud cases, number of cell phone Trojans or malware donning QR coat wide dissemination in mobile terminals. Due to a lack of knowledge, no preventive vigilance of individual consumers is hard to guard against. "Zhejiang Province Police Corps officials said.

Experts say the binary code almost zero technical threshold, cheats can be easily "China pattern"

Insiders, QR is a has a specific format that can store information graphics, information to the lateral and vertical direction at the same time, can express large amounts of information in a limited space. Personal business cards, Web site, payment and receipt information are available through the QR design show.

It is understood that China's widespread use of QR code for Japan's quick response code (QR code), because no domestic intellectual property of two-dimensional codes, market taken over by QR code. QR code not patented in the country, a free and open market policy. "This also means that anyone can download the QR code over a network Builder. Just need to paste the content to be released on the QR code generator, QR code of the software is needed to generate the user. "A network security engineer incubation Zheng said in Hangzhou.

Press search on the net "QR code generator" and found more than more than 2.05 million search results, most of the two-dimensional code generator software directly online. Reporters at home an online QR code to generate selected platforms, after you enter the text, picture, email, Web sites, and instantly convert to QR.

"QR production generates no threshold. Number of viruses, Trojans, charge software download into QR code, once users scan, mobile phones will be implanted virus, Trojan horse infections, identity card, bank card number, the payment of private information such as passwords can be stolen. "Ariane said all senior brand manager Shen Jie.

"Anyone can create a QR code, and generated QR code there is no way of tracing, do not have the relevant management bodies provide certification, this brings QR fraud detected by the police is very difficult. "Zhejiang Province Police Corps of engineers.

For backtracking clear body

Zheng hatch, currently, two-dimensional code production and circulation, and no clear subject to unified management. Although some departments began gradually realizes the enormous security risks of QR code, but there is no relevant laws and regulations and specific initiatives.

"The authorities should use a technical method to two-dimensional code for domain name resolution, through the establishment of specialized monitoring platform to detect QR codes, filtering bad information. "The school of computer science and technology, Zhejiang University of technology Professor Chen Tieming suggested," two-dimensional codes can be considered a central database, the active circulation of the QR code for registration, all QR code data stored in a central database, realize the two-dimensional code generating effective date back to circulation. ”

"At the management level, the departments concerned should publish content of QR code for the record review, accreditation of QR publishing platform, the Publisher of the QR code to register, forming a complete set of responsibilities a retrospective effect. "Chen Tieming said.

Zheng Yubo Cyberspace Security Association of Zhejiang University of technology researchers believe that QR code using an enterprise should strengthen the relevant protection. It is understood that micro-and PayPal have stepped up security in the software monitoring and protection, ensure the safety of users scan code. PayPal company recently announced that, effective February 20, PayPal payment code special code will be dedicated only for offline payment. This avoids some of the illegal use of QR payment mechanism to enforce transfer scams. Shen Jie told reporters that Alipay has own Web site detection function, determines whether scanning QR codes for malicious links. If security risks are found, the system will issue a safety tip, let the user decide whether to jump interface.

Industry experts say, users also need to improve the scan code safety awareness. "A lot of people have a bad habit of scanning, see QR code scanning, it is easy to fall into the trap of criminals. "Zheng Yubo said greater literacy for everyone understanding how QR codes and QR release mechanism, not random scan QR code of unknown origin, protect their information security.


二维码乱象调查:背后存陷阱,技术门槛几乎没有 - 二维码 - IT资讯

日前,南京市民刘先生在扫描摩拜单车二维码时,出现了本不该出现的转账提示,于是向警方报案。当地有些市民也发现,扫描摩拜单车上的二维码后,如果不注意很可能钱就被转走了。

虚假二维码骗局并非孤例。在广东破获的一起二维码诈骗案中,犯罪分子通过扫码盗刷获利90余万元。

IT资讯配图,图片源自网络

作为移动互联网的入口,二维码已被广泛应用于社交媒体、移动支付、产品促销、应用程序下载等方面。“新华视点”记者调查发现,由于制码技术几乎零门槛,不法分子将病毒木马程序、扣费软件等植入二维码,消费者扫码被盗刷现象时有发生。

“扫一扫”背后的诈骗陷阱:覆盖正规码、木马植入、远程复制

针对消费者扫码遭诈骗,摩拜单车负责人称,单车上的正规二维码都是用钉子钉在车身上的,车费必须通过APP支付。车身上发现的二维码是后贴上去的,覆盖了原二维码,用户扫描的是不法分子的诈骗二维码。

在广东,佛山公安局禅城分局发现一起数十家店铺的收银柜台均被张贴虚假二维码案件。犯罪嫌疑人更换商家收款二维码,通过植入木马病毒的虚假二维码,获取消费者的手机信息和密码,进行网络盗刷。一共作案320余起,获利90余万元。

记者调查发现,除了用虚假二维码覆盖正规二维码实施诈骗,还有不法分子直接诱导用户扫描带有木马病毒的二维码。比如,浙江就多次发现不法分子以扫码得红包的形式诱导用户,一旦用户扫码后,手机感染木马病毒,各种信息都被窃取了。

此外,有些不法分子通过拍照、截图、远程控制等方式获取用户付款二维码,盗刷用户银行卡。浙江台州微商赵女士就是一个受害人。在网络交易过程中,不法分子以自己支付宝余额不足为借口,提出让赵女士将付款码发给自己扫码付款。收到付款码截图后,不法分子随即进行复制,盗刷了赵女士的银行账户。

“付款码相当于银行卡加密码,不要轻易发给他人。”专家介绍,不法分子只要获取了,就可以进行复制,获取银行账户和密码。

“现在我都不敢随便扫码了,一不小心就可能被骗。可是现在生活中要用到二维码的地方又这么多,真是让人纠结。”杭州市民陈小姐说。

“以二维码作为入口的新型互联网诈骗案件层出不穷,一些不法分子将手机木马或恶意软件披上二维码的外衣在移动终端广泛传播。由于缺乏相关知识,没有防范警惕性,消费者个人很难防范。”浙江省网警总队有关负责人说。

专家称制码技术门槛几乎为零,骗子可轻易制“毒码”

业内人士介绍,二维码就是一张能存储信息的拥有特定格式的图形,能够在横向和纵向两个方位同时表达信息,能在有限的面积内表达大量信息。个人名片、网址、付款和收款信息等都可以通过二维码图案展现出来。

据了解,目前中国广泛使用的二维码为源于日本的快速响应码(QR码),由于当时国内没有自主知识产权的二维码,市场几乎被QR码占据。QR码没有在国内申请专利,采取了免费开放的市场策略。“这也意味着谁都可以通过网络下载二维码生成器。只需要将发布的内容粘贴到二维码生成器上,软件随即生成用户所需的二维码。”杭州某网络安全公司工程师郑孵说。

记者在网上搜索“二维码生成器”,发现了205万多个搜索结果,大部分的二维码生成软件可以直接在线使用。记者在首页选定了某一在线二维码生成平台,输入文字、图片、邮箱、网址后,瞬间就转换成了二维码。

“二维码的制作生成没有任何门槛。一些不法分子将病毒木马程序、扣费软件等的下载地址编入二维码,用户一旦扫描,手机就会被植入的病毒木马感染,身份证、银行卡号、支付密码等私人信息就会被盗取。”阿里安全部资深品牌经理沈杰说。

“任何人都可以制作二维码,而且生成的二维码没有办法溯源,也没有相关的管理机构提供认证,这给警方侦破二维码诈骗案带来了很大困难。”浙江省网警总队工程师介绍。

建立回溯机制明确监管主体

郑孵介绍,目前,二维码的生产和流通并没有明确的主体进行统一的管理。虽然一些部门开始逐渐意识到二维码存在的巨大安全隐患,但还没有相关法律法规和具体举措。

“主管部门应该使用技术手段对二维码进行域名解析,通过设立专门的监管平台对二维码进行检测,过滤不良信息。”浙江工业大学计算机科学与技术学院陈铁明教授建议,“可以考虑建立二维码中心数据库,对市面上流通的二维码进行备案登记,将所有二维码数据统一存放在一个中心数据库,实现对二维码生成流通环节的有效追溯。”

“在管理层面上,有关部门应该对二维码的发布内容进行备案审查,对二维码的发布平台进行资质鉴定,对二维码的发布者进行实名登记,形成一整套完善的责任追溯机制。”陈铁明说。

浙江工业大学网络空间安全协会研究人员郑毓波认为,二维码使用企业应该加强相关的防护。据了解,目前微信和支付宝已经在软件里加强了安全监控保护,确保用户扫码安全。支付宝公司近日宣布,从2月20日起,支付宝付款码将专码专用,只用于线下付款。这就避免了一些不法分子利用二维码付款的机制实施转账诈骗。沈杰告诉记者,支付宝已经自带网址检测功能,用于判定扫描的二维码是否存在恶意链接。如果发现安全隐患,系统会发出安全提示,让用户判定是否需要进入跳转界面。

业内专家表示,用户也需要提高扫码安全意识。“不少人有不良的扫描习惯,看见二维码就扫,很容易落入不法分子的陷阱。”郑毓波说,应该加大知识普及,让大家了解二维码编码原理和二维码发布机制,不随意扫描来历不明的二维码,保护自己的信息安全。





If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759