According to the report, with the further popularization of mobile payment, cell phone users for the cell phone Internet banking, third-party payment, e-commerce, group purchasing, financial management of the five cell phone shopping and payment APP downloads in the rapid growth of the class. Among them, there are 364 cell phone payment and shopping software***, and their downloads account for 30.38% of all software downloads.
Tencent Mobile Security Lab statistics, in the five categories of cell phone payment and shopping software, *** there are 320 software implanted malicious virus code. Among them, the number of software models infected with viruses in the e-commerce APP category accounted for 39.69%, ranking first. The second is the financial APP and third-party payment APP, the proportion of virus-infected software models accounted for 27.19%, 13.44%, ranking second and third respectively. Group-buying, banking and aviation APPs accounted for 11.25%, 7.19% and 1.25% respectively.
Threat 2: More than 60% of cell phone payment viruses will be networked
Tencent Mobile Security Lab conducted a detailed analysis of the 82805 cell phone payment viruses intercepted, and was the first in China to release the 13 characteristics of cell phone payment viruses, the biggest feature of which is that it manifests itself as silent networking, deletion of text messages, sending of text messages, reading of text messages, and booting up from the start. Among them, the proportion of silent networking is as high as 61.09%, ranking first, silent deletion of SMS, silent sending SMS, boot self-start, read SMS virus behavior accounted for 37.3% and 36.51%, 30.1%, 19.74%. They ranked second and third, fourth and fifth respectively.
Tencent cell phone butler security experts said, "silent networking" will lead to cell phone users tariff consumption, at the same time, the virus will also be through the networking function of the user's cell phone on the privacy of the information, including cell phone Internet banking, payment-related account passwords and other content uploaded to a designated location, resulting in user privacy leaks and property risks.
Threat #3: QR code becomes a key channel for payment viruses to spread
Understanding the spreading channels of mobile payment viruses is crucial for users to prevent viruses. The report shows that in addition to the cell phone payment virus through the secondary packaging to the cell phone online shopping, payment and other five categories of applications, scattered in some electronic markets, cell phone forums to spread, two-dimensional code has become a key channel for the spread of cell phone payment viruses, this kind of case has also happened many times.
The CCTV 315 evening party reported that the user in the online shopping, swept the seller sent the two-dimensional code, and then the phone was installed on the "Internet banking God steal" virus, "Internet banking God steal" can steal the user ID number and cell phone authentication code, and ultimately the money in Alipay and Balance. Alipay, the balance of the money transferred, and all of this is happening in the unknowing and unknowing. The same case happened again and again, March 6 CCTV news broadcast reported that Wuhan, Hubei, an online shopping user in the cell phone scanning QR code, its balance treasure in the 40,000 yuan was quickly transferred away.
According to Tencent cell phone butler security experts, some fraudsters through the Taobao seller identity, to deceive the user to scan the QR code to get discounts, after the user scanned the QR code will be the cell phone payment virus installed into the user's cell phone, and then the virus through the monitoring of the user's cell phone text messages, to obtain the cell phone to pay for the text message authentication code, and then steal the user's funds.
In the face of the above three major cell phone payment security threats, Tencent cell phone butler security experts reminded users not to worry too much, as long as the user from the regular electronic market or the official site of the application to download the App, do not see two-dimensional code on the scanning will be able to avoid most of the cell phone payment security risks. At the same time, Tencent cell phone butler also provides closed-loop security protection for the majority of users before, during and after the payment, before the payment to provide payment for online shopping App security scanning and security scanning services, payment to provide cell phone online shopping payment security environment monitoring and phishing web site interception, after the payment of property losses, can be initiated by Tencent anti-information fraud alliance, contact the police to solve the case; in addition, WeChat Pay also joint PICC In addition, WeChat Pay has also joined hands with PICC to provide full indemnity protection.