当前位置:网站首页>QQ appears large-scale number theft, why is this? Is there no solution?
QQ appears large-scale number theft, why is this? Is there no solution?
2022-06-28 16:17:00 【51CTO】

In recent days, QQ It was discovered that the account was stolen on a large scale , Automatically to friends 、 Group sends indecent messages , This has caused a lot of trouble to many people , In particular, send such information to family members or customers , It was quite embarrassing ! The good news is that it's not just you who are embarrassed , There are others to embarrass with you ( Ah ha ha ha ha ha )
Get down to business , First of all, why is the account stolen ?
In a situation like this , It is definitely not the mobile terminal login operation , You must log in through the computer software qq Carry out batch automatic operation , There are several ways to log in on the computer :
1、 Account password login ;
2、 Sweep the login code ;
So the possibility is mainly reflected in these two aspects :
Possibility one : Account and password disclosure
In everyday QQ In the use , It is possible that we have logged in on public devices QQ, For example, Internet bar computers , Public equipment is often the regular channel for password disclosure , although QQ It has a two factor authentication security mechanism , But to improve the user experience , Reduced the security level , For example, logging in to an unfamiliar device will require secondary authentication , But log in again on the logged in machine , No secondary verification at this time , If the account and password have been obtained , You can log in directly on this computer to do something that bothers you .
Summary is in Public device login , Cause account and password disclosure , Bypass the second verification mechanism ! But in this way, individual users are likely to be stolen , This kind of large-scale theft is not like .
Possibility two : Scan illegal binary microcode
Code scanning login is everywhere , especially QQ It's huge , Most of them can use QQ Sweep the login code , Criminals illegally forge pages and two microcodes , Let the user scan the code to log in , So as to obtain the login authorization of the user , Criminals get authorization and store it by unknown means , Sell it to downstream gangs at a high price , Centralized login and batch automation software , To friends 、 Group release message , This possibility is the greatest .
summary : Forge two microcode , Let the user scan the code to obtain login authorization ;
There is no way to deal with it ?
There must be a way :
In the first case , At the expense of the user experience , Every time you log in Force users to use two factor authentication , This can effectively enhance login security ;
For the second case , First, the user doesn't want to scan all the codes , Be sure to watch , What's more, we need QQ It controls the login logic of scanning code more strictly , Analyze each interaction in detail , Strictly control the validity period of authorization certificate and verify it , Do not give lawless elements an opportunity .
Zhongke henglun is an enterprise level two factor certification manufacturer , Pay great attention to the safe login of enterprise users , Two factor authentication and reinforcement is imperative , Don't wait until it's too late to mend .
边栏推荐
- Interviewer: how does the thread pool reuse threads? Do you know? Tell me about it
- Steps to be taken for successful migration to the cloud
- Slim GAIN(SGAIN)介绍及代码实现——基于生成对抗网络的缺失数据填补
- 使用Karmada实现Helm应用的跨集群部署
- Visual studio 2019 software installation package and installation tutorial
- What is the difference between treasury bonds and time deposits
- FFmpeg之禁止输出banner log(三十)
- RedmiBook Pro 14增强版 打不开台达软件DRAStudio_v1.00.07.52
- CODING DevOps 助力中化信息打造新一代研效平台,驱动“线上中化”新未来
- 有哪些好用的供应商管理系统
猜你喜欢

Why MySQL table connection is faster than subquery

Azure Kinect Microsoft camera unity development summary

征文投稿丨使用轻量应用服务器搭建博客环境

10年测试经验,在35岁的生理年龄面前,一文不值

Opengauss kernel: analysis of SQL parsing process

简单介绍一下tensorflow与pytorch的相互转换(主要是tensorflow转pytorch)

Lecturer solicitation order | Apache dolphin scheduler meetup sharing guests, looking forward to your topic and voice!

Knowing these commands allows you to master shell's own tools

平台即代码的未来是Kubernetes扩展
![[Spock] process non ASCII characters in an identifier](/img/ab/d2cd6802d1e2af009da077ae82bdf8.png)
[Spock] process non ASCII characters in an identifier
随机推荐
知道这几个命令让你掌握Shell自带工具
超自动化与网络安全的未来
Openharmony - detailed source code of Kernel Object Events
Introduction to deep learning in machine learning
#夏日挑战赛#OHOS构建自定义服务实战
【Hot100】3. 无重复字符的最长子串
元宇宙中能接吻了!CMU推出VR头显外挂,复刻唇部逼真触觉
简单介绍一下tensorflow与pytorch的相互转换(主要是tensorflow转pytorch)
Change exchange (dynamic planning)
Lenet5 training model of convolutional neural network for machine learning
Technical secrets of ByteDance data platform: implementation and optimization of complex query based on Clickhouse
A 24-year-old bald programmer teaches you how to continuously integrate and deliver microservice delivery. You can't learn how to cut me off
Briefly introduce the conversion between tensorflow and pytorch (mainly tensorflow to pytorch)
【高并发基础】MySQL 不同事务隔离级别下的并发隐患及解决方案
Code implementation of gain (4) -- gap dataset missing data filling based on GaN (sequence) [improved version]
【MySQL】官网文档学习之查询语句sql注意事项
Etcd可视化工具:Kstone简介(一)
GAIN的代码实现(4)——基于GAN的Spam数据集缺失数据填补(序)【改进版】
Slim gain (sgain) introduction and code implementation -- missing data filling based on generated countermeasure network
Navicat 15 for MySQL