CCTV.com News: According to the WeChat official account of the Ministry of National Security, in daily life, we may use our mobile phone to click on a link in the text message, identify a QR code in the message box of the social platform, or download a mobile application software recommended by others. But, do you know? A strange link, a suspicious QR code, and an unknown application are most likely to carry a "Trojan" designed by overseas spy intelligence agencies, and the moment we clicked it, we implanted our mobile phone.
Spy Trojans have become a tool for stealing secrets
Mobile spy Trojan software is different from general malware. It has the characteristics of accurate targets, powerful functions, extremely hidden, and long-term hiddenness. It is implanted through proximity and remote methods. Once the relevant permissions of the mobile phone are obtained, the user will be monitored and various information of the target mobile phone will be secretly collected. It is an omnipresent monitor, able to remotely control mobile phone camera recordings, and grasp every word of the target at any time; it is also a follower who can accurately obtain the target's location information and monitor the target's movement trajectory in real time; it is also a secret secret thief, unknowingly stealing personal information and file information from the mobile phone, and easily gaining insight into the target's work and life situation.
Several ways for "spy" to sneak into your phone
——Elementary method: trick you into clicking on unfamiliar links. Some Trojan programs are associated with jump links posted on the website, or disguised in QR code pictures. Once you click to scan, your phone will be "hit".
——Advanced method: disguised as application software. Some Trojan programs are disguised as mobile applications, using gimmicks such as "cracking" and "climbing the wall" to induce everyone to download. Downloading and installing such applications also opens the door for "spy".
——Advanced method: exploit software and hardware vulnerabilities. Take advantage of technical vulnerabilities in mobile phone hardware devices, operating systems and application software to obtain control of the mobile phone without the target’s perception, thereby achieving silent monitoring of the target.
National Security Agency reminds
Defending "spy" who sneaks into the mobile phone during daily use is not only related to personal information and privacy security, but also to national security. The general public, especially the core confidential staff, must effectively improve their security awareness, consciously regulate Internet access behavior, and protect information security.
——The curiosity-seeking psychology needs to be eliminated. Do not use smart electronic devices of unknown origin, do not click on unfamiliar links in text messages or emails, do not scan unfamiliar QR codes, do not install unfamiliar application software, do not connect to public Wi-Fi at will, do not browse illegal websites, and promptly close unnecessary sharing and cloud service functions, and develop good habits of downloading application software in the official application market.
——Safety awareness needs to be improved. Do not use mobile phones to store, process, transmit, and talk about state secrets, do not store sensitive information such as work units, positions, phone numbers, etc. of core confidential personnel on mobile phones, do not enable and use mobile phone location service functions in confidential official activities, and do not bring mobile phones to key confidential parts, confidential meetings and activity venues.
——Protective measures need to be strengthened. Timely update the mobile phone operating system and application version, fix known security vulnerabilities, install reliable security software, regularly check and kill viruses, beware of sensitive application software and permission requests beyond the scope, and promptly detect and handle abnormal behaviors of the mobile phone.



