My every move is under the surveillance of the other party, and my privacy has been filmed! The victim girl is both humiliated and angry! In addition, more than one girl was victimized. ...
Girls' computers are implanted with voyeuristic software.
/kloc-Xiao Ting, a 0/9-year-old Dalian girl, is studying at a university in other places. During the National Day this year, Xiao Ting returned to Dalian to reunite with his family. When studying in other places, Xiao Ting's laptop computer broke down and could not be turned on normally. When returning home for the New Year, Xiao Ting sent the computer to an after-sales service station on Anshan Road for maintenance. A few days later, the computer was repaired and Xiao Ting took it away. There is nothing unusual when using it. ?
On February 6th, 65438, Xiao Ting, who was far away from home, suddenly received a phone call from the Dalian police. The police told Xiao Ting that her computer was equipped with candid camera software, which can remotely control the computer camera! At first, Xiao Ting thought she had met a liar. After verification, she found that what the police said was true!
Girls are photographed changing clothes.
After receiving the call from the police, Xiao Ting returned to Dalian and made a record to the public security organ. The police showed Xiao Ting the video of the "hacker", and she was so surprised that her spine went cold: her every move in the girls' dormitory was filmed, and it was all "live"! For an instant, she felt humiliated and angry. "I didn't expect a pair of eyes to peek behind my back." In addition, the scene of girls changing clothes in the same bed was filmed. ...
As far as Xiao Ting knows, it is the maintenance engineer of the after-sales service station who implants the peeping software. At present, this person has been controlled by the police. It is reported that there is more than one girl victim in this case, and the police are still investigating and collecting evidence. Among them, after receiving a phone call from the police, some girls thought that the other party was a liar and did not cooperate with the police investigation.
65438+February 10, the reporter contacted the after-sales service station involved, and the person in charge did not respond to this matter. However, an insider said that the matter was the personal behavior of the maintenance engineer involved.
There are three main ways to implant voyeurism software.
The girl asked the senior to help repair the computer, but she didn't expect to be implanted with voyeuristic software, which led to the privacy exposure of the girl. When hotel guests take a bath, they accidentally find that the bathing picture is "alive". It turned out that hackers invaded the guest room computer ... In recent years, with the rise of the concept of intelligent life, similar illegal cases are common.
network diagram
Last year, 360 Attack and Defense Laboratory released the first security report of smart cameras in China, which showed that 80% of the cameras had design defects, and family privacy life might be broadcast live on the Internet. At that time, the CCTV 3. 15 party also exposed the hidden danger of hackers remotely controlling smart cameras.
So, how is the voyeuristic software embedded in the computer? In this regard, the reporter interviewed Jerry Lee, a network security engineer. Jerry Lee said there are three main ways. One is to bind programs in web pages. For example, some pornographic websites need to download players to watch movies, which are bound with illegal software. After the player is downloaded, the computer is also remotely controlled. The second is to send some links to the target, and the other party will inadvertently download the software after clicking the links in the computer; Another method is to install software directly on other people's computers.
Jerry Lee said that people should pay special attention to the fact that almost all remote control Trojans popular on the Internet have the function of sending instructions to start cameras and record videos, and most of these Trojans disguise themselves as some popular network resources, such as pictures, video seeds and game plug-ins, to trick people into downloading and running. In addition, some criminals will send files to specific targets and implant Trojans by fraudulent means.
How do I know that the computer is monitored remotely?
Jerry Lee said that the general monitoring software must start from the system to monitor the computer in real time. If it is network remote monitoring, it will also initiate network connection. This software can generally be found through these two points.
1. Open the task manager to find all the started processes, and judge whether it is a system process or a process with software installed. By installing third-party task management, you can view the name, corresponding files and functions of the process. If a suspicious process is found, it can be deleted or uninstalled through the corresponding program.
2. If it is network monitoring, it will also access the network. You can find out which suspicious programs are accessing the network and prohibit suspicious programs from accessing the network.
Jerry Lee said that for ordinary users, it is really difficult to find monitoring software, and it is recommended to go to a professional institution for killing.
It seems that we must be careful when repairing computers in the future to prevent bad guys from playing tricks!