当前位置:网站首页>QQ appears large-scale number theft, why is this? Is there no solution?
QQ appears large-scale number theft, why is this? Is there no solution?
2022-06-28 16:17:00 【51CTO】

In recent days, QQ It was discovered that the account was stolen on a large scale , Automatically to friends 、 Group sends indecent messages , This has caused a lot of trouble to many people , In particular, send such information to family members or customers , It was quite embarrassing ! The good news is that it's not just you who are embarrassed , There are others to embarrass with you ( Ah ha ha ha ha ha )
Get down to business , First of all, why is the account stolen ?
In a situation like this , It is definitely not the mobile terminal login operation , You must log in through the computer software qq Carry out batch automatic operation , There are several ways to log in on the computer :
1、 Account password login ;
2、 Sweep the login code ;
So the possibility is mainly reflected in these two aspects :
Possibility one : Account and password disclosure
In everyday QQ In the use , It is possible that we have logged in on public devices QQ, For example, Internet bar computers , Public equipment is often the regular channel for password disclosure , although QQ It has a two factor authentication security mechanism , But to improve the user experience , Reduced the security level , For example, logging in to an unfamiliar device will require secondary authentication , But log in again on the logged in machine , No secondary verification at this time , If the account and password have been obtained , You can log in directly on this computer to do something that bothers you .
Summary is in Public device login , Cause account and password disclosure , Bypass the second verification mechanism ! But in this way, individual users are likely to be stolen , This kind of large-scale theft is not like .
Possibility two : Scan illegal binary microcode
Code scanning login is everywhere , especially QQ It's huge , Most of them can use QQ Sweep the login code , Criminals illegally forge pages and two microcodes , Let the user scan the code to log in , So as to obtain the login authorization of the user , Criminals get authorization and store it by unknown means , Sell it to downstream gangs at a high price , Centralized login and batch automation software , To friends 、 Group release message , This possibility is the greatest .
summary : Forge two microcode , Let the user scan the code to obtain login authorization ;
There is no way to deal with it ?
There must be a way :
In the first case , At the expense of the user experience , Every time you log in Force users to use two factor authentication , This can effectively enhance login security ;
For the second case , First, the user doesn't want to scan all the codes , Be sure to watch , What's more, we need QQ It controls the login logic of scanning code more strictly , Analyze each interaction in detail , Strictly control the validity period of authorization certificate and verify it , Do not give lawless elements an opportunity .
Zhongke henglun is an enterprise level two factor certification manufacturer , Pay great attention to the safe login of enterprise users , Two factor authentication and reinforcement is imperative , Don't wait until it's too late to mend .
边栏推荐
- What is the difference between treasury bonds and time deposits
- 10 years of testing experience, worthless in the face of the physiological age of 35
- The first place on the list - brake by wire "new cycle", the market competitiveness of local suppliers is TOP10
- 逆向调试入门-PE结构详解02/07
- Change exchange (dynamic planning)
- wallys/DR7915-wifi6-MT7915-MT7975-2T2R-support-OpenWRT-802.11AX-supporting-MiniPCIe-Module
- Internet of things cloud convergence Security Guide
- Soliciting articles and contributions - building a blog environment with a lightweight application server
- 【Spock】处理 Non-ASCII characters in an identifier
- 数字藏品热潮之下,你必须知道的那些事儿
猜你喜欢

平台即代码的未来是Kubernetes扩展

wallys/DR7915-wifi6-MT7915-MT7975-2T2R-support-OpenWRT-802.11AX-supporting-MiniPCIe-Module

5分钟的时间制作一个反弹球游戏

Etcd visualization tool: an introduction to kstone (I)

物联网云融合安全指南

Geoffrey Hinton: my 50 years of in-depth study and Research on mental skills

Visual Studio 2019软件安装包和安装教程

开源技术交流丨一站式全自动化运维管家ChengYing入门介绍

【MySQL】官网文档学习之查询语句sql注意事项

Focus on the 35 year old Kan: fear is because you don't have the ability to match your age
随机推荐
【Hot100】4. 寻找两个正序数组的中位数
首次失败后,爱美客第二次冲刺港交所上市,财务负责人变动频繁
The Web3.0 era is coming. See how Tianyi cloud storage resources invigorate the system to enable new infrastructure (Part 1)
ID card copy tutorial (use t5577 card to copy 4100 card)
Visual Studio 2010 configuring and using qt5.6.3
5 minutes to make a bouncing ball game
Azure Kinect Microsoft camera unity development summary
扎克伯格致投资者:不要对元宇宙有任何期待
开源技术交流丨一站式全自动化运维管家ChengYing入门介绍
STM32CubeMX使用方法及功能介绍
【推荐系统】多任务学习之ESMM模型(更新ing)
What is the difference between treasury bonds and time deposits
MySQL auto - Connect Query recommended favorites
你好,现在网上炒股开户买股票安全吗?
REDIS00_ Explain redis Conf configuration file
早晨有些犹豫
Android和eclipse和MySQL上传图片并获取
Big God explains open source buff gain strategy live lecture
3. Caller 服务调用 - dapr
一次简单的反射型XSS操作及思路