黑灰产

Search documents
80万条公民个人信息泄露,源于快递公司“内鬼”
第一财经· 2025-08-22 12:12
本文字数:1213,阅读时长大约2分钟 2025.08. 22 知道创宇首席安全官周景平对第一财经记者表示,该案件的犯罪手法技术含量比较低,核心在于犯罪 分子掌握了公司内部平台的账号密码,从而实现信息破解,属于"内鬼"作案。 而这类"内鬼"导致的泄 密案件非常常见,且大部分没有太多技术含量,主要问题出在内部管理混乱、权限划分管控不到位。 成都无糖信息技术有限公司创始人兼CEO张瑞冬也对记者表示,国内很多企业采用业务分包模式, 一项业务层层转包给中小企业,后者可能因规模较小、技术积累不深、内部管理混乱等问题,导致信 息泄露的发生。而公司侧又因无法重投入建设全产业链,导致业务流程必然有第三方的参与,进而给 信息泄露留存漏洞, 该案件披露的产业联动犯罪形式,在周景平看来,在行业内非常普遍,依靠各互联网平台为据点,一 个很小的数据源点(数据初始产生或关键流转节点)就可能迅速形成完整犯罪链条。虽然这类黑灰产 技术含量不高,但带来的危害很大。且涉案人员分散、证据链难获取等问题,给破案带来一定难度。 只有从国家层面推出完善的法律法规,提高犯罪成本,各大企业重视数据保护,才有可能逐步实现破 解。 微信编辑 | 苏小 作者 | ...
《王者荣耀》第35次登上财报:腾讯「摇钱树」惧怕黑产滥用?
Xin Lang Ke Ji· 2025-08-14 01:33
昨晚,腾讯控股公布Q2财报。当季,腾讯收入1845亿元人民币,同比增长15%。仅从游戏业务来看,季度收入达到592亿元,折合每天约赚6.5亿 元。 值得注意的是,《王者荣耀》第35次登上腾讯财报。另据第三方数据显示,今年上半年,《王者荣耀》每月收入近12亿元。 马化腾也提及了这颗"摇钱树"的优异表现。他表示:《王者荣耀》和《和平精英》等长青游戏向平台化进化并加大了AI的应用……使我们的游戏业 务在用户及收入侧均表现出色。 另一方面,《王者荣耀》近期引发的社会争议备受关注。就在财报发布前一天, "中国游戏算法诉讼第一案"开庭,青岛律师孙千和起诉要求公开王 者荣耀匹配机制,庭审达5个小时未宣判。 当事人孙千和向《BUG》栏目提到, "腾讯担心《王者荣耀》匹配算法公开会造成黑产滥用。 "她表示,应当找到一种方法保护玩家应有的知情权, 而对于这一点,双方仍然存在较大分歧。 "黑灰产"与"商业秘密"的分歧 谈及此次庭审,孙千和表示, "(腾讯)他们主要还是基于自己的证据,认为之前已经完成了算法公开的义务。另一个就是他们很反对公开技术细 节,因为他们认为这会侵犯他们合法的技术秘密,权益,可能造成不好的黑产和后果。 " 对 ...
征信已经成了最大的笑话
Xin Lang Cai Jing· 2025-07-27 05:27
Group 1 - The dark side of credit economy is highlighted, indicating that easy money often involves significant risks and illegal activities [2] - The implementation of real-name registration for mobile users began in 2010, tightening control over personal information [3] - The rise of a unified personal credit database started with the establishment of the credit center in 2006, evolving to include comprehensive records of personal and corporate information [7][8] Group 2 - The number of individuals classified as "dishonest" has reached 29.9 million over the past decade, with Zhejiang, Jiangsu, and Guangdong being the top three provinces [10][11] - A new trend has emerged where individuals with good credit records can secure loans of 1 to 3 million within a few months, often involving intermediaries who exploit vulnerable individuals [13] - The financial exploitation of "professional debtors" is increasing, with over 60% of them being young adults aged 25-35, indicating a systemic issue within the credit system [14]
江苏防范非法金融活动全省行走进镇江
Zhen Jiang Ri Bao· 2025-06-20 23:39
Group 1 - The event on June 16 aimed to raise awareness about illegal financial activities, highlighting the potential risks associated with "cloud breeding economy" and "small white household loan scams" [1] - From January to May, the total loan balance in the city increased by 9% year-on-year, with over 2,800 businesses receiving support through re-loans and rediscounts [1] - In 2024, the number of new illegal fundraising cases and participants in the city significantly decreased compared to the previous year, indicating substantial progress in handling existing cases [1] Group 2 - June is designated as "Illegal Financial Activity Prevention Month," with the theme "Protect Your Wallet and Your Happy Home," aiming to deepen public understanding of the need to combat illegal financial activities [2] - The city plans to expand the reach of its anti-fraud initiatives and diversify the methods of legal education to ensure the message is effectively communicated to the public [2]
造假黑灰产账号超过1000万个,社交平台正经历一场虚假信息攻防战
2 1 Shi Ji Jing Ji Bao Dao· 2025-06-19 11:30
Core Viewpoint - The rise of fake accounts and content on social media platforms, particularly through AI-generated personas, is becoming a significant issue, leading to a large-scale expansion of black and gray market activities [1][2]. Group 1: Nature of Fake Accounts - AI-generated personas, like the fictional Natasha, are being used to create believable yet false identities that attract followers and generate revenue for their operators [1]. - The methods for creating these accounts have become standardized and organized, typically involving three steps: account creation, trust-building, and monetization [1][2]. Group 2: Account Creation Techniques - Common techniques for account creation include: 1. Engaging users through misleading interactions, such as challenges that do not reciprocate [2]. 2. Capitalizing on trending topics or controversies to draw attention [2]. 3. Mass-producing similar accounts with low-cost content [2]. 4. Repurposing existing videos and content to attract views [2]. 5. Utilizing AI to generate various media content [2]. Group 3: Monetization and Market Impact - The monetization of these fake accounts often leads to the promotion of gray market products, including counterfeit goods and dubious health products [2]. - The black and gray market ecosystem is evolving, becoming more sophisticated and organized, with a clear division of labor among participants [3][4]. Group 4: Platform Response and Governance - Platforms like Xiaohongshu are implementing strict measures to combat fake content, including the removal of millions of fake posts and accounts [1][4]. - The governance strategy focuses on three main areas: false content, fake personas, and AI-generated content [4][5]. - Xiaohongshu is enhancing its AI detection capabilities and has established a comprehensive governance mechanism to identify and manage fake accounts [5][6]. Group 5: User Engagement and Reporting - To encourage genuine user engagement, Xiaohongshu has developed a "sincerity score" system to evaluate user authenticity and reward genuine content creators [6]. - The platform plans to improve its reporting mechanisms to make it easier for users to report fake content [6].
斩断盗养贩账号黑产需织密“法治+技防”安全网
Bei Jing Qing Nian Bao· 2025-05-15 08:01
Core Insights - WeChat has become a target for illegal activities, including account theft and the sale of stolen accounts, leading to significant financial gains for criminal groups [1][2] - A recent case in Xiangtan revealed a gang that stole over 6,000 WeChat accounts, with the leader profiting over 1.2 million yuan [1] - The case highlights the need for enhanced regulatory measures and technological defenses against such crimes [3] Group 1: Criminal Activities and Techniques - The criminal group utilized technology to exploit platform vulnerabilities, including the use of IoT cards that bypassed real-name registration requirements [1][2] - They employed a "card phone" plugin to trigger account protection features, making it difficult for original account owners to detect anomalies [2] - Stolen accounts were logged into thousands of second-hand phones, where simulated human behaviors were used to maintain account activity and evade detection [2] Group 2: Regulatory and Technological Recommendations - There is an urgent need to upgrade platform risk control mechanisms, including the introduction of anomaly detection models for login activities [2] - Social media platforms should implement stricter content review processes to combat fraudulent advertisements targeting minors [2][3] - Legal frameworks must be strengthened to clarify the criminal responsibility for account selling and enhance industry oversight [3] Group 3: Collaborative Efforts and Future Directions - A comprehensive approach involving legal, technological, and collaborative strategies is essential to combat the organized nature of these crimes [3] - Establishing a data-sharing mechanism between law enforcement and internet companies can help track and prevent criminal activities [3] - International cooperation is necessary to address cross-border cybercrime, particularly in regions with high rates of online fraud [3]
2025年1月网络安全行业月报-20250319
An Heng Xin Xi· 2025-02-20 01:06
Investment Rating - The report does not explicitly provide an investment rating for the industry Core Insights - The report highlights the active APT organizations such as Lazarus, APT28, Andariel, Donot, OceanLotus, and Sticky Werewolf, with Lazarus being the most frequently recorded [7] - A total of 196,120 organizations/individuals' websites were found to have dark chain implants, with new dark chain data of 21,407 sites detected this month [13][20] - The report indicates that the majority of ransomware attacks targeted government, information technology, services, electronics, and financial sectors [10][20] - Vulnerability data shows that the most common types of vulnerabilities include cross-site scripting (XSS), cross-site request forgery (CSRF), and unauthorized access [16][21] - The black and gray industry data indicates that service provision accounts for 82% of new black market websites, while pornographic content accounts for 9% [22] Summary by Sections APT Threat Intelligence - The report provides a comprehensive overview of APT threat intelligence, analyzing advanced threat attacks and cybercriminal activities throughout 2024 [6] - Active APT organizations and their targeted sectors are discussed, emphasizing the need for vigilance and enhanced cybersecurity measures [6][7] Ransomware Threat Intelligence - Ransomware incidents are reported across various sectors, with a focus on the impact on government and technology industries [10][20] Dark Chain Intelligence - The report details the prevalence of dark chain implants across numerous websites, highlighting the significant increase in newly detected cases [13][20] Vulnerability Intelligence - A thorough analysis of vulnerability data from 2024 is presented, identifying key trends and potential risk points in network security [15][16] Black and Gray Industry Intelligence - The report monitors various forms of cybercrime, with a significant focus on phishing, fraud, and gambling activities [18][22]