社工库

Search documents
300元“人肉开盒”陌生人,7000个机器人在线贩卖,四部门出手整治暗网
3 6 Ke· 2025-03-28 12:39
"百度副总裁谢广军女儿开盒事件"触动大众对个人信息保护的神经,一名13岁未成年人在网上多次"人肉开盒"一位孕妇,不仅恶意公开她的隐私信息,甚 至进而引导和实施骚扰、造谣、辱骂等行为。 "潘多拉魔盒"被打开后,有人离开社交平台,有人被短信轰炸,有人被迫搬家……自从被"开盒"以后,很多人平静的生活都被迫脱离正轨,小可(化名) 就是其中之一。 300元可买到他人隐私信息 3月20日,百度召开"开盒"事件安全沟通会,表示"开盒"信息来自海外社工库,百度任何职级员工及高管均无权限触碰用户数据。 "我在网上帮被'开盒'的孕妇发声,结果被两个网友恶意'开盒',其中一位就是后来被曝出的百度副总裁谢广军的女儿。"小可对《IT时报》记者表示,近 10位受害者都被这两位网友"开盒",大家正在各自报警,后续准备联合起诉维权。 从小可掌握的信息来看,另一位开盒者是吉林一所学校的学生。 "我是先报警还是直接起诉?如果当地警方不受理怎么办?是要起诉未成年人本人还是监护人?"高额的维权成本,让小可身心俱疲。 一个13岁未成年人怎能轻易"开盒"陌生网友?低龄化、饭圈化、素人化,叠加互联网大厂高管,让这场"开盒"事件闹得沸沸扬扬,一个隐藏已久的 ...
中国开盒产业链
创业邦· 2025-03-25 08:35
Core Viewpoint - The article discusses the emergence and implications of the "opening box" industry, which allows individuals to easily access personal information about others, leading to significant privacy concerns and potential abuse [3][4][81]. Group 1: Incident Overview - The article begins with the incident involving a Baidu executive's daughter, clarifying that the data accessed was not from Baidu but from foreign software [3][4]. - It highlights the ease with which personal information can be accessed through the "opening box" service, likening it to an upgraded version of "human flesh search" [5][6]. Group 2: Evolution of Information Access - The transition from an anonymous internet era to one where personal information is easily exposed is discussed, emphasizing the role of social media in this shift [9][10][13]. - The article explains how "human flesh search" initially served as a form of public oversight but has evolved into a tool for online violence due to its accessibility [14][15]. Group 3: The "Opening Box" Industry Chain - The "opening box" industry has developed a complete supply chain, with data leaks primarily originating from social engineering and insider threats [17][18]. - Social engineering is defined as exploiting human weaknesses to gain access to sensitive information, making it difficult to ensure data security [19][20]. Group 4: Data Leakage Mechanisms - The article describes how hackers can easily breach databases and sell the information, with two main methods: spontaneous and customized data extraction [22][25]. - The concept of "credential stuffing" is introduced, where hackers exploit reused passwords across different platforms to gain unauthorized access [29][30]. Group 5: Role of Insiders - Insiders, such as employees with access to sensitive data, pose a significant risk, as they may sell information for personal gain [33][34]. - The article illustrates how the vast and unregulated data systems in China contribute to the ease of data leaks [34][35]. Group 6: Social Engineering Databases - The "social engineering database" serves as a middle layer in the "opening box" industry, where data is aggregated and sold to various entities, including fraudsters [42][45]. - The article notes that these databases allow for the creation of comprehensive profiles on individuals, leading to severe privacy violations [54][55]. Group 7: Market for Personal Information - The primary customers for social engineering databases are often involved in fraudulent activities, as they can purchase large volumes of personal data [60][61]. - The article explains how the ease of accessing personal information has led to a rise in scams and targeted harassment [62][63]. Group 8: Legal and Regulatory Challenges - Existing laws regarding online privacy and data protection are discussed, highlighting the challenges in enforcement and the need for more robust regulations [83][84]. - The article emphasizes that while there are laws against data misuse, the execution and effectiveness of these laws remain questionable [87][88]. Group 9: Future Implications - The article concludes by stressing the urgent need for national attention to the "opening box" industry, likening it to the fight against fraud [98][99]. - It calls for a comprehensive approach to protect individual privacy and dignity in the digital age, as the current trajectory poses significant risks to society [96][97].