999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

CLICK CLICK BOOM

2016-01-10 12:21:02
漢語世界(The World of Chinese) 2016年5期
關鍵詞:信息

Chinas status as malware haven has a risky message for all

那些令人不勝其煩的垃圾信息究竟從何而來?

面對惡意軟件,我們又該如何應對?

Its usually a young woman, moving through the subway from person to person. Politely, she asks if commuters would like to sign up to her WeChat account. In this case, she explains its a small fashion boutique which will provide updates on the latest products, chosen herself, as part of her small business aspirations, with the updates sent to their smartphone via her WeChat feed. Most passengers wave her away. While at first glance her entreaty seems harmless enough and the personal nature of the advertising makes it seem friendlier than signing up to a mass-email newsletter, these Beijing commuters are generally wary of unsolicited approaches.

A few may have read headlines that shed light on how the personal touch can sometimes make these accounts shadier than their “official account” counterparts. When the boutique operator gets a new WeChat contact, that persons account information becomes visible and is worth money to advertisers who pay in bulk for WeChat accounts they can spam with offers.

The boutique operator is likely just turning a buck with her clothes, but if she sells those WeChat IDs to third parties, she will, perhaps unwittingly, become yet another face of Chinas electronic spam problem, and all those who signed up to her account could be in for some very risky friend requests.

Spam meets Malware

Most people who buy SIM cards in China have been unfortunate victims of spam—often their contact number was sold to spammers by the SIM card manufacturer or an intermediary long before the SIM card was purchased, thus they are doomed to receive unwanted advertising right from the beginning.

But malware has taken advantage of spams natural, virus-like qualities.

The Conficker Worm is the worlds most common form of malware, according to internet security giant Check Point, but a new creepy-crawly from China recently buzzed into the top ten rankings.

Going by the name Hummingbad, Check Points report indicates it has made its way onto around 85 million devices worldwide, affecting 10 million users (with 1.6 million users in China, 1.3 million in India, and over 286,000 in the US). Once on a device, it can create fake clicks on Google Play applications to install even more malware. However, as with the most common viruses, the goal is not to cripple the host; Hummingbad wants to spread spam, be it real or just a click mirage. Aside from delivering spam, it also defrauds ad networks (the large companies that pay-per-click to place adverts in apps made by small app developers). Essentially, Hummingbad tricks these ad network companies into thinking someone has clicked on an advert and thus should pay out the fraction of a cent that is owed. Generate enough fake clicks, and it adds up. Hummingbad is believed to generate around 300,000 USD per month.

Which, of course, raises the question: who is taking that cash?

Check Point lays the blame squarely at the feet of Yingmob, which it says is partly a legitimate advertising firm based in Beijing and partly made up of (possibly semi-autonomous) malware developers based in Chongqing, operating under the umbrella of the “Development Team for Overseas Platform”.

Hummingbad reportedly wasnt Yingmobs first attempt. Other internet security research companies have pointed the finger at Yingmob for creating Yispecter, one of the first pieces of malware able to target non-jail-broken iOS phones in a sophisticated fashion. A jail-broken phone is one with a system that has been seriously altered by its user so the company can no longer guarantee the settings work.

Yispecters modus operandi is a little different; it uses four mechanisms to infect phones, the most popular being via Kuaibos QVOD player, which it exploits to install malware. On a side note, the CEO of Kuaibo, Wang Xin, became an unlikely hero to horny Chinese netizens in January 2016 after being put on trial for spreading pornography due to his media player being all but synonymous with porn. He quixotically challenged the charges in court by boldly stating that Kuaibo was no guiltier than any search engine that has a lot of porn, i.e. all of them.

It didnt work.

China fights back

Now the number two spam-producing nation (behind the US), according to international spam-busting group Spamhaus, China has been significantly stepping up its ground game in dealing with spam in recent years. Whether or not it can combat the tide being unleashed by technological advances is an open question, but Chinese anti-spam bodies do have significant wins to their name.

China has an Anti Spam Alliance which is run by the Internet Society of China (ISC). The ISC approach to dealing with spam is to target internet service providers (ISPs) that knowingly host spam. This, of course, can get a bit tricky, as it comes down to defining what is and isnt spam.

Before defining spam, they have to spot it. Li Jia, a representative from the ISC, told TWOC?that much of this comes from reports from web users, but also international exchanges and “honey pots” where a web crawler has found an email address listed somewhere online and starts spamming it.

Deciding whether or not something qualifies as spam depends just as much on delivery method as content. Unsolicited bulk emails or targeting emails from anonymous senders are common ways to classify spam, though content that is deemed pornographic or “counter-revolutionary” can also get it blacklisted.

Li pointed out that the situation is getting better. “With the enforcement of the real-name cell phone registration system, the mechanisms to manage text message spam are improving. Despite problems with false base-station text messages and spam messages on iPhones, the overall anti-spamming situation looks a lot better than a couple of years ago,” he said.

“It is not efficient to just deal with email accounts of spammers, as it is so easy to spam from new accounts. Therefore, for email spam we usually blacklist the IP addresses of spammers,” he said. “China doesnt have any official registration for IP addresses of mail servers, and thus lacks the regulation and management of undisciplined companies as potential spammers.”

Of course, with different systems for identifying spam, some very curious discrepancies will emerge.

Spamhaus, based in Germany, maintains a public list of ISPs that are repeat offenders, with many on their top ten being Chinese web addresses—the website of internet giant Tencent (responsible for making ubiquitous messenger app WeChat) clocks in at number five on the Spamhaus list, with DrPeng, a computer hardware retailer, coming in at number one. In fact, eight of their top ten spam-enabling IP addresses all either have a .cn or .hk address, or are recognizable Chinese companies. Spamhauss list, however, evaluates their spam abuse departments and their effectiveness, judging them on how well they responded to spam complaints, calling them “de-facto” spam havens, noting that the problem is that they take a “blind eye” to the spam they host, most likely due to the significant profits on offer. Thus, they are being judged on a lack of enforcement rather than creating the spam themselves.

When Spamhaus examines the ISPs that allow the proliferation and coordination of malicious “botnet controllers” which can hijack computers, things look a bit different—a Vietnamese company tops the list, followed by an Indian one. The only obviously Chinese site clocks in at number three. In terms of identified spam operators—the identified people or companies directly responsible for spam—China has just six of the 111 entries, though this is likely in part due to increased difficulties spotting them. These entries include counterfeiters, as well as a Jiangsu-based spammer known as Chen Yu, who prior to 2014, was infamous for malevolent photo-retouching services that used dropboxes and discarded webmail addresses, and apparently managed to hijack several thousand IP addresses around the world. Spamhaus believes he later switched to a “snowshoe” method which is much like a hydra in that instead of one head it has many, in the form of multiple IP addresses to spread spam using a more diverse delivery network (and is thus harder to track).

Progress in combating spammers of such persistence is no doubt going to be difficult—after all, the problem is not just dedicated spammers like Chen Yu, but also difficulties in enforcement from some of the biggest companies in the country. Given the sheer clout that these companies have—in China, WeChat reaches into peoples lives in ways that even Facebook has not yet been able to replicate in the West—it seems unlikely that they are going to be penalized anytime soon for something as lowly as spam.

Li points out that given the difficulties combating spam proliferation, much of the fight against spam is going to come down to internet users themselves instituting security measures and commonsense measures, such as avoiding writing email addresses on publicly accessible websites where bots can crawl them (or at least adding spaces).

Following the money

So who profits from spam? Short answer: loads of people. After all, its basically just low-cost advertising.

With so many products desperate to get attention, spam is ubiquitous and seems here to stay. When Damon McCoy, a computer science professor at New York University, set out to investigate a spam trail, he found it led to some of Chinas largest banks.

His approach was to track 300 purchases of fake luxury products that had been advertised via spam. McCoy targeted fake goods specifically, because they are one of the few products internationally which can trigger a response from credit card companies, unlike complaints over spam.

Around 97 percent of the transactions were handled by the Bank of China, Agricultural Bank of China and the Bank of Communications.

Given the extreme concentration of banking in China within a few large state-owned behemoths, it is perhaps unsurprising that the vast majority of these purchases went through them—after all, they handle millions of transactions. But a report in the Technology Review?highlighted one way in which this was of notable significance. Initially, many of his purchases had gone through the Korea Exchange Bank. Complaints from Visa resulted in that bank ceasing their operations with perpetrators.

Despite the fact the Chinese banks have been mentioned in lawsuits launched by luxury brands and counterfeiting watchdogs, the banks did not cease conducting operations for these outfits. They did close down the accounts for counterfeiters, but failed to promptly shut down new accounts opened by the same people.

McCoy said that despite the fact the counterfeiters/spammers in China seemed able to open new accounts and continue operating, there was evidence to indicate that their sales were still being negatively impacted by this approach.

Of course, its not just the banking side of things that is centralized. Chinas internet giants have spread their influence into all sectors of the online market, including various ad agencies, ad providers, and advertising consultancies and analytics. Even smaller companies often spread their business across all these sectors, and there are few firewalls between them—for companies seeking advertising, this creates hidden conflicts of interest that they may not be aware of: is the company advising you shepherding you toward their own products? Is the company measuring your advertising success also the company doing the advertising for you?

Throw in the opacity that surrounds much of the Chinese internet, and it can be very difficult to know who exactly is providing what services and what financial interests they may have.

At its worst, dangerous “health” providers found ways to utilize search giant Baidus advertising services to provide a veneer of legitimacy which allegedly resulted in the death of a cancer patient because he opted for dodgy treatment—the incident sparked a public outcry which made Baidu reassess its advertising policies.

Only time will tell whether approaches like McCoys or those used by ISC will work, but there are reasons to be optimistic—multiple internet security companies have indicated that as a percentage of total websites, dangerous websites that result in malware intrusions are decreasing each year. In the meantime, best just be careful about where you write your email address.

猜你喜歡
信息
訂閱信息
中華手工(2017年2期)2017-06-06 23:00:31
展會信息
中外會展(2014年4期)2014-11-27 07:46:46
信息超市
展會信息
展會信息
展會信息
展會信息
展會信息
信息
健康信息
祝您健康(1987年3期)1987-12-30 09:52:32
主站蜘蛛池模板: 啪啪免费视频一区二区| 亚洲精品第五页| 伊人久久综在合线亚洲91| 国产一级小视频| 国产成人毛片| 国产一二视频| 国产成人久视频免费| 欧美综合区自拍亚洲综合天堂| 国产波多野结衣中文在线播放| 特级aaaaaaaaa毛片免费视频| 91免费国产高清观看| 欧美第九页| 午夜色综合| 露脸国产精品自产在线播| 亚洲美女操| 国产麻豆永久视频| 制服丝袜国产精品| 久久夜色撩人精品国产| 亚洲AV无码一区二区三区牲色| 欧洲在线免费视频| 国产一区二区三区精品欧美日韩| 亚洲男人的天堂在线| 亚洲永久色| 亚洲人成网站18禁动漫无码| 亚洲欧美日韩色图| 97国产成人无码精品久久久| 一本大道香蕉高清久久| 亚洲婷婷在线视频| 国产精品美女免费视频大全| 亚洲一区波多野结衣二区三区| 伊人激情综合网| 欧美亚洲激情| 亚洲一区无码在线| 精品中文字幕一区在线| 国产精品视频免费网站| 国产精品女主播| 国产尹人香蕉综合在线电影| 欧美一区二区三区不卡免费| 一级福利视频| 亚洲乱码视频| 亚洲IV视频免费在线光看| 欧美成人手机在线视频| 99久久这里只精品麻豆| 无码区日韩专区免费系列 | 亚洲一区二区三区中文字幕5566| 都市激情亚洲综合久久| 毛片免费视频| 亚洲欧美成aⅴ人在线观看| 色噜噜狠狠狠综合曰曰曰| 亚洲天堂网2014| 国产一级精品毛片基地| 六月婷婷综合| 亚洲AⅤ无码日韩AV无码网站| 国产精品乱偷免费视频| 国产欧美日韩18| 久夜色精品国产噜噜| 91精品国产91欠久久久久| 国产97公开成人免费视频| 波多野结衣一区二区三视频| 四虎在线观看视频高清无码| 青青草原国产精品啪啪视频| 国产一区二区色淫影院| 色综合天天综合中文网| 国产91精品调教在线播放| 成人无码一区二区三区视频在线观看| 全午夜免费一级毛片| 国产精品成人一区二区不卡| 国产精欧美一区二区三区| 国产女人18水真多毛片18精品| 欧美人与动牲交a欧美精品| 亚洲精品va| 欧美 亚洲 日韩 国产| 97国产在线观看| 国产在线精彩视频二区| 中文字幕在线看| 亚洲综合第一页| 色哟哟色院91精品网站| 日本欧美视频在线观看| 欧美成人国产| 色噜噜综合网| 国产成人高精品免费视频| 中文字幕色站|