An unfamiliar link, a suspicious QR code, and an unknown app are very likely to carry a “Trojan horse” designed by foreign espionage and intelligence agencies, which were implanted in our mobile phones the moment they were clicked.
Spy Trojans become a weapon for stealing secrets
Mobile spy Trojan software is different from general malware, with precise target, powerful functions, extremely hidden, long-term latent characteristics, through proximity and remote and other ways to implant, once the relevant permissions of the mobile phone are obtained, the user will be monitored, secretly collect all kinds of information of the target mobile phone.
It is an ever-present listener, able to remotely control the mobile phone camera recording, and grasp the target’s every word at any time;
It is also a shadow-like tracker, which can accurately obtain the location information of the target and monitor the target’s movement trajectory in real time;
It is also a stealthy thief, unknowingly stealing personal information and documents from the mobile phone, and easily gaining insight into the work and life of the target.
There are several ways for “spying” to sneak into a phone
- Beginner method: trick you into clicking on an unfamiliar link.
Some Trojan programs are linked to redirect links posted on websites, or disguised in QR code images, and once clicked and scanned, the phone will be “tricked”.
- Advanced method: disguise as application software.
Some Trojan horse programs are disguised as mobile phone applications, using gimmicks such as “cracking” and “circumventing the wall” to induce people to download, and downloading and installing such applications also opens the door for “spies”.
- Advanced approach: Exploit software and hardware vulnerabilities.
Use the technical vulnerabilities of the mobile phone hardware device, operating system and application software to obtain control of the mobile phone without the target being perceived, and then realize the silent monitoring of the target.
Reminder from the state security organs
In the process of daily use of mobile phones, preventing “spies” who sneak into mobile phones is not only related to personal information and privacy security, but also related to national security. The broad masses of the people, especially the staff in core secret-related posts, should earnestly raise their awareness of security, conscientiously regulate their online behavior, and do a good job of information security protection.
- The hunting mentality needs to be eliminated.
Do not use smart electronic devices from unknown sources, do not click on unfamiliar links in text messages and emails, do not scan QR codes from unknown sources, do not install unfamiliar application software, do not connect to public Wi-Fi at will, do not browse illegal websites, turn off unnecessary sharing and cloud service functions in a timely manner, and develop a good habit of downloading application software in the official application market.
- Security awareness needs to be raised.
Do not use mobile phones to store, process, transmit, or discuss state secrets, do not store sensitive information such as the work units, positions, and phone numbers of core secret-related personnel on mobile phones, do not turn on and use mobile phone location service functions in official activities involving secrets, and do not bring mobile phones into key parts of secrets, secret-related meetings, and activity venues.
- Protective measures need to be strengthened.
Update the mobile phone operating system and application version in a timely manner, fix known security vulnerabilities, install reliable security software, regularly check and kill viruses, be vigilant against sensitive and out-of-scope permission requests for application software, and timely detect and deal with abnormal mobile phone behaviors.