当前位置:网站首页>QQ appears large-scale number theft, why is this? Is there no solution?
QQ appears large-scale number theft, why is this? Is there no solution?
2022-06-28 16:17:00 【51CTO】

In recent days, QQ It was discovered that the account was stolen on a large scale , Automatically to friends 、 Group sends indecent messages , This has caused a lot of trouble to many people , In particular, send such information to family members or customers , It was quite embarrassing ! The good news is that it's not just you who are embarrassed , There are others to embarrass with you ( Ah ha ha ha ha ha )
Get down to business , First of all, why is the account stolen ?
In a situation like this , It is definitely not the mobile terminal login operation , You must log in through the computer software qq Carry out batch automatic operation , There are several ways to log in on the computer :
1、 Account password login ;
2、 Sweep the login code ;
So the possibility is mainly reflected in these two aspects :
Possibility one : Account and password disclosure
In everyday QQ In the use , It is possible that we have logged in on public devices QQ, For example, Internet bar computers , Public equipment is often the regular channel for password disclosure , although QQ It has a two factor authentication security mechanism , But to improve the user experience , Reduced the security level , For example, logging in to an unfamiliar device will require secondary authentication , But log in again on the logged in machine , No secondary verification at this time , If the account and password have been obtained , You can log in directly on this computer to do something that bothers you .
Summary is in Public device login , Cause account and password disclosure , Bypass the second verification mechanism ! But in this way, individual users are likely to be stolen , This kind of large-scale theft is not like .
Possibility two : Scan illegal binary microcode
Code scanning login is everywhere , especially QQ It's huge , Most of them can use QQ Sweep the login code , Criminals illegally forge pages and two microcodes , Let the user scan the code to log in , So as to obtain the login authorization of the user , Criminals get authorization and store it by unknown means , Sell it to downstream gangs at a high price , Centralized login and batch automation software , To friends 、 Group release message , This possibility is the greatest .
summary : Forge two microcode , Let the user scan the code to obtain login authorization ;
There is no way to deal with it ?
There must be a way :
In the first case , At the expense of the user experience , Every time you log in Force users to use two factor authentication , This can effectively enhance login security ;
For the second case , First, the user doesn't want to scan all the codes , Be sure to watch , What's more, we need QQ It controls the login logic of scanning code more strictly , Analyze each interaction in detail , Strictly control the validity period of authorization certificate and verify it , Do not give lawless elements an opportunity .
Zhongke henglun is an enterprise level two factor certification manufacturer , Pay great attention to the safe login of enterprise users , Two factor authentication and reinforcement is imperative , Don't wait until it's too late to mend .
边栏推荐
- CODING DevOps 助力中化信息打造新一代研效平台,驱动“线上中化”新未来
- Focus on the 35 year old Kan: fear is because you don't have the ability to match your age
- Kiss in the metauniverse! CMU launched VR head display plug-in, reproducing the vivid touch of lips
- 使用Karmada实现Helm应用的跨集群部署
- IPDK — Overview
- [high concurrency foundation] MySQL index optimization
- 讲师征集令 | Apache DolphinScheduler Meetup分享嘉宾,期待你的议题和声音!
- PostgreSQL enables grouping statistics by year, month, day, week, hour, minute and second
- 零钱兑换(动态规划)
- 如何查询数据库中一个表中的所有数据呢?
猜你喜欢

wallys/DR7915-wifi6-MT7915-MT7975-2T2R-support-OpenWRT-802.11AX-supporting-MiniPCIe-Module

【Spock】处理 Non-ASCII characters in an identifier

Openharmony - detailed source code of Kernel Object Events

Azure Kinect微软摄像头Unity开发小结

逆向调试入门-PE结构详解02/07

Geoffrey Hinton: my 50 years of in-depth study and Research on mental skills

抖音实战~我关注的博主列表、关注、取关

5 minutes to make a bouncing ball game

物联网云融合安全指南

Focus on the 35 year old Kan: fear is because you don't have the ability to match your age
随机推荐
PostgreSQL enables grouping statistics by year, month, day, week, hour, minute and second
What are the most powerful small and medium-sized companies in Beijing?
Ffmpeg forbidden output banner log (30)
MySQL auto - Connect Query recommended favorites
开源技术交流丨一站式全自动化运维管家ChengYing入门介绍
超自动化与网络安全的未来
MySQL self connection query "suggestions collection"
Azure Kinect Microsoft camera unity development summary
全球陆续拥抱Web3.0,多国已明确开始抢占先机
部门新来了个字节25K出来的,让我见识到了什么是天花板
使用Karmada实现Helm应用的跨集群部署
今天睡眠质量记录80分
Knowing these commands allows you to master shell's own tools
Visual Studio 2010 configuring and using qt5.6.3
openGauss内核:SQL解析过程分析
面试官: 线程池是如何做到线程复用的?有了解过吗,说说看
Introduction to reverse commissioning PE structure details 02/07
物联网云融合安全指南
Convolutional neural networks for machine learning -- an introduction to CNN
NFT pledge LP liquidity mining system development details