Workflow
央视新闻:起底“隐形内鬼”!警惕这些芯片安装“后门”招数
Hua Er Jie Jian Wen·2025-08-22 01:37

Group 1 - The article discusses three main types of "backdoors" in technology: malicious pre-installed backdoors, post-hack backdoors, and covertly implanted backdoors [1] - Malicious pre-installed backdoors allow manufacturers to remotely control devices, such as activating cameras without user awareness [1] - Post-hack backdoors occur when manufacturers set remote access interfaces that are poorly managed or hacked by third parties, leading to data theft [1] - Covertly implanted backdoors involve malicious actors tampering with open-source code, software updates, or supply chain components, which can activate backdoors during device use [1] Group 2 - In 2024, a major high-tech company in China's smart energy and digital information sector suffered a cyberattack, resulting in the theft of a large amount of confidential business information [1] - In early 2025, a domestic smart TV brand faced data leakage risks due to the use of tampered third-party components, affecting millions of devices [1]