Current location - Health Preservation Learning Network - Slimming men and women - Ddos currency ddos and blockchain
Ddos currency ddos and blockchain
202 1 protect network security events?

Data leakage incident?

It is suspected that more than 200 million pieces of domestic personal information are sold in foreign dark network forums.

6543810.5, a foreign security research team, Cyble, found that several posts were selling personal data related to China citizens, which may come from social media such as Weibo and QQ. The total number of records related to China citizens in several posts discovered this time exceeds 200 million.

The first personal information protection case in China, where the Civil Code was applied, was pronounced.

65438 10/8, Hangzhou internet court publicly heard and pronounced the first case of personal information protection applying the civil code in China. Defendant Sun publicly illegally bought and sold more than 40,000 pieces of personal information on the Internet without the permission of others, and there was a long-term risk that the information of relevant personnel was infringed. He was sentenced to compensate the illegal income of 34,000 yuan and publicly apologized.

Suspected data leakage in a domestic bank16.79 million.

On October 8th, 65438/kloc-0, someone posted on a foreign forum to sell16.79 million pieces of data of a domestic bank, and released some data samples, including name, gender, card number, ID number, mobile phone number, city, contact address, work unit, postal code, work phone number, home phone number, card type, issuing bank, etc.

Online lending companies were fined 3.2 million for infringing personal information.

15 10/5, China Judgment Document Network published a judgment, and Beijing Company and Xian Moumou sold their personal information including their names, ID numbers and mobile phone numbers to several downstream companies without the consent of the victims, committing the crime of infringing citizens' personal information, and were fined 3.2 million yuan. Buying a house involves many well-known companies such as Ping An Pratt & Whitney, Paipai Loan, You and I Loan.

30 people in Danyang, Zhenjiang sold 600 million pieces of personal information and made a profit of more than 8 million yuan.

654381On October 24th, Zhenjiang Danyang police cracked a case of infringing citizens' personal information, which was supervised by the Ministry of Public Security, involving more than 10 provinces and cities, and arrested 30 suspects. The gang used overseas chat tools and blockchain virtual currency to receive and pay, * * * sold more than 600 million pieces of personal information and earned more than 8 million yuan in illegal income.

After CCTV exposed App to eavesdrop on private message voice, the recording continued.

On June 365438+1October 3 1 day, CCTV program experts made a 2-second voice by simulating the "App eavesdropping test program". When the hand was released, the recording continued, producing a sound of 120 seconds, which proved that eavesdropping was possible when the test program was placed in the foreground. In addition, after comparative experiments, it is found that the recording can still last for a period of time when the test program returns to the background or the screen of the mobile phone is locked.

Xiaoyao.com in Xishanju was attacked and its data was leaked.

On March 2, Xishanju Game announced that Xishanju products were repeatedly attacked by criminals' DDos and invaded by servers, resulting in the leakage of some user accounts and encrypted plaintext passwords. The official suggested that the short password with low security level should be modified as soon as possible.

The first case of obtaining personal information by using WeChat powder scanning software in China was pronounced.

On March 3rd, Nantong Tongzhou Public Security Bureau pronounced a verdict on the first case of illegally obtaining WeChat user information by using WeChat "Clean Powder" software in China. In order to "slim down" the WeChat address book, the victim user scanned the QR code of "Clear Powder", but his personal information was leaked. Eight defendants illegally made more than 2 million yuan by reading and selling WeChat group chat QR codes.

3 15 exposes chaos such as face information abuse and resume disclosure.

On March/KOOC-0/5, CCTV 3/KOOC-0/5 exposed three cases involving personal information security: merchants installed cameras to record customers' facial information, and many stores * * * enjoyed and comprehensively quoted prices; The resumes of platforms such as Zhaopin recruitment and hunting can be downloaded at will, and a large number of resumes flow into the black market; Many mobile phone cleaning apps developed for the elderly constantly obtain mobile phone information in the background and push content with deceptive routines.

CITIC Bank was fined 4.5 million yuan for leaking customer information.

On March 19, the ticket issued by the Consumer Protection Bureau of the China Banking Regulatory Commission showed that CITIC Bank was fined 4.5 million yuan. It is reported that the ticket is suspected that in May 2020, the talk show artist pool reported the punishment result of CITIC Bank's illegal provision of its bank flow information.

Cyber attack?

Many industries are infected with the virus.

65438+1October 13, many domestic security vendors detected a large-scale outbreak of the worm in China, involving government, medical care, education, operators and other industries, and most of the infected hosts were financial management-related application systems. The infected host shows that all non-system partition files have been deleted, causing irreparable losses to users.

Sms phishing attacks against rural credit cooperatives and city commercial banks

Since the Spring Festival, a series of security incidents have occurred in many cities across the country, in which customers are tricked into clicking on the links of phishing websites and stealing funds on the grounds that mobile banking is invalid or expired. Sky Friends found that after February 9, a large number of phishing websites were registered and put into use. The domain name of phishing websites is the customer service telephone number+letters of financial institutions such as rural credit cooperatives and city commercial banks, or the domain name similar to that of financial institutions, and most of them are registered and hosted by overseas domain name registrars.

DDoS attacks surged during the Spring Festival.

On February 22nd, CITIC Construction Investment Lab released a report on DDoS attacks during the Spring Festival. According to the report, during the Spring Festival, Chianxin satellite-orbit DDoS observation system observed 659 12 amplified DDoS attacks, involving IPs with IP57096 being attacked. Compared with the week before the Spring Festival, the number of DDoS attacks increased by about 25%, and the number of attacked IP increased by 37%.

App infringes on user rights?

Aiming at the problem that App infringes on users' privacy and safety, the Ministry of Industry and Information Technology has established a national App technology testing platform to conduct technical testing on popular apps on the shelves in China. If the App does not meet the requirements, it will require rectification first. Apps that have not passed the rectification or have not been rectified as required will be directly removed.

19 10/9, the Ministry of Industry and Information Technology removed 12 apps, including Xuebao and Red Man Live. , involving illegal collection of user information, excessive demand for user rights, deception and misleading users to download. (On June 5438+February 2, 2020, the Ministry of Industry and Information Technology notified 63 illegal apps, and 12 failed to complete the rectification as required)

65438+1On October 22nd, the Ministry of Industry and Information Technology notified the first batch of 157 apps that infringed users' rights and interests in 20021year, including Mango TV, Yonghui Life and Zanthoxylum bungeanum. , which involves illegally collecting personal information, forcing users to request permission frequently and excessively, and forcing users to use targeted push. On February 3, the Ministry of Industry and Information Technology removed 37 unreformed apps, including Yilong Hotel, Dongfeng Tourism, and an auto repair.

On February 5, the Ministry of Industry and Information Technology reported that 202 1 the second batch of 26 apps had irregularities, including QQ input method, UC browser and ink weather. , involving illegal collection of personal information, excessive request for permission, cheating and misleading users to download. On February 10, 10 apps that were not rectified were taken off the shelves, including Xiao Zhi classmate, music bar and kk keyboard.

12 In March, the Ministry of Industry and Information Technology notified the third batch of apps 136 in 20021year, which infringed on users' rights and interests, including Cheetah Cleanup Master, Yuepao Circle and Tianya Community. , involving frequent self-activation and associated activation, illegal collection and use of personal information and other issues.

On March 16, the Ministry of Industry and Information Technology severely investigated and dealt with the violation of "APP illegally collecting personal information of the elderly" at the party on March15, and asked the main application stores to give four apps, namely, memory optimization master, smart cleaning master, super cleaning master and mobile phone housekeeper pro.

Ink shield brand introduction?

A few days ago, Master An, a member of the domestic White Hat Group of Twenty and the core founder of the Hawk Alliance, made a major upgrade to Mo Zhedun's DDoS high defense strategy and introduced multi-dimensional DDoS detection and protection measures to meet the security needs of online games and industries for today's complex Internet environment. A series of new algorithms have been developed to solve the problems faced by online games and blockchain industries.

Master An, chief traffic expert of Mozidun, said: "Online games are a large-scale industry worth billions of dollars, but they are often attacked by targeted and high-traffic DDoS. Any service interruption may cause users to switch to competitors and damage the brand reputation. Every second of downtime will bring a lot of revenue losses to enterprises. Threats such as DDoS attacks cannot be ignored. Online game companies need to strengthen their awareness of network security and provide players with a good and stable online experience. "

Because the attack cost of the game industry is low, it is the protection cost of 1/N, and the attack and defense ends are extremely unbalanced. As the attacker's style of play becomes more and more complex and there are more and more attack points, the basic static protection strategy can't achieve good results, which aggravates this imbalance.

Secondly, the game industry has a short life cycle. A game takes half a year from birth to death. If it can't resist a big attack, it is likely to give up halfway. Hackers also aimed at this point and decided that as long as they launched an attack, the game company would definitely give a "protection fee".

Thirdly, the game industry requires high continuity, requiring 7*24 online, so if it is attacked by DDoS, the game business will easily cause a large number of players to lose. I have seen the number of players drop from tens of thousands to hundreds after the game company was attacked for 2-3 days, and even faced the consequences of the whole game going offline.

After deploying the Magic Shield DDoS protection solution, game companies and platforms can obtain enhanced multi-dimensional DDoS protection solutions to defend against complex attacks. This includes upgraded behavior-based UDP (User Datagram Protocol) attack protection measures. Online games usually rely on UDP to send and receive data. This protocol does not need the time-consuming and frequent "handshake" like other protocols such as TCP. However, many other attack defense solutions focus on rate-based large-capacity protection, especially in public clouds, lacking protection against UDP attacks.

In addition, DDoS attacks against the application layer or non-heavy traffic attacks that do not directly affect the public cloud network are usually not detected. These rate-based protections also lead to high false positives, which may make them inaccessible to ordinary users. Mo Zhedun's self-developed fingerprint protection engine for CC attacks can intelligently identify attacks, including non-heavy traffic attacks, pulse attacks and unknown zero-day attacks, according to multiple portrait access characteristics such as URL, frequency and behavior of visitors, with higher accuracy, while ensuring the lowest manslaughter rate and the best user experience.

"Solitary Sword", chief security consultant of Mozi Security, said: "DDoS attacks have become the most important and effective means to combat the game and blockchain industries. The company's self-built DDoS defense technology is not low, the cost is high, the construction period is uncontrollable, and the attack is difficult to trace. In the face of various difficulties, we can cooperate with security vendors with strong security protection capabilities to fill shortcomings in a short time and improve countermeasures to ensure the stable operation of the server. "