What Is Virilization?

Viral grouping means that with the increasingly severe information security today, virus makers even illegally make profits through grouping. "2010-2011 China Internet Security Research Report" released by Jinshan Network, the results are surprising. The report shows that according to the long-term tracking of virus transmission channels and automatic monitoring of virus download links by Jinshan Network Cloud Security System, the computer virus industry's revenue has exceeded 10 billion yuan, and dozens of virus groups have obtained huge illegal gains. The top 10 domestic virus groups control 80% of virus download channels on the Internet.

Virus grouping

This entry lacks an overview map . Supplementing related content makes the entry more complete and can be upgraded quickly. Come on!
Viral grouping refers to the increasingly severe information security today.
Jinshan cyber security expert Li Tiejun introduced that the so-called virus group refers to the "black" organizations that open up software downloads, online videos and other transmission channels for various viruses. The production of virus trojans has already become a large industry. The operation of the virus trojan industry chain is just like normal commercial companies. It's just that these virus operating organizations have always been hidden in dark corners. Some virus groups earn hundreds of millions of dollars each year, and it is difficult for ordinary small and medium-sized enterprises to take it seriously.
By analyzing the behavior of the virus industry, we can clearly outline the general appearance of the industry, which is a meticulous organizational structure that has been realized from production to circulation and finally realized.
Like ordinary products, viruses are made by the original authors, and products produced by virus authors are naturally purchased by buyers, or directly purchased and underwritten by those who control the spread of the virus.
The decisive influence on the scale of virus transmission is the traffic providers, who control a lot of website resources. Has a steady flow of visits, with daily PV (total page views) ranging from thousands to millions. These traffic providers include: some pirated software or popular shareware downloads; provide popular movies, entertainment video downloads (among which there are illegal porn videos); pirated books, novel resource downloads; popular game plug-in downloads (often downloading large downloads) External links were suddenly replaced with virus downloads). Among them, there are also some ad networks, which control a large number of websites with a small number of visits. Small websites receive indirect revenue sharing from ad networks, and ad networks will occasionally launch virus downloads.
The main destructive behaviors of the virus include: brushing traffic for certain commercial websites such as small and medium-sized website navigation stations, bad websites, and pirated video download stations; promoting some commercial software, which often bundles various plug-ins, will tamper with the browser, and pop up ads Promote phishing and fraudulent websites to deceive poisoned people; promote other viruses, such as hacking Trojans that attack popular online games.
The ultimate purpose and means of virus transmission have also quietly changed in recent years. In the past, virus spreaders mostly used Trojan horses for online game robbery, but there were many links to realize them using Trojan horse robbery, which was not easy to operate. In addition, today's Internet situation is undergoing tremendous changes, and online shopping has become the most popular demand. Surveys show that about one-third of Internet users often browse online shopping sites. Therefore, the practitioners of the virus industry chain also saw "business opportunities" from them: they found that there can be multiple ways to make profits by using virus transmission: they can participate in the sharing of traffic for commercial websites; scam Internet users to phishing websites to directly cheat money; Commercial software and earn promotional fees; can also continue to distribute Trojan horses.
According to Jinshan's statistics, the total number of new virus samples in 2009 was close to 20 million. In 2010, the total number of virus samples fell by 13% to about 17.98 million. This is also the first time that the total number of virus samples has declined in many years. Analysis by security experts, the main reason is that in 2010, the security software successfully controlled the webpage hacking, which drastically reduced the spread of virus trojans.
At the same time, the virus group also began to seek a new "Internet" transformation. It seems that phishing with low technical content has hurt more and more Internet users. There are many reasons for this: firstly, the production of phishing websites is simple, the investment is less effective, and the manufacturing cost is low; the identification of phishing websites by security software is not timely and accurate; and the security awareness of netizens is weak. And once users are deceived, there is still the problem of difficult electronic forensics, which has also caused the harm of phishing to soar. Li Tiejun said that in 2010, it was not uncommon for virus trojans and phishing websites to collude and promote each other.
Statistics show that the cyber security situation in China is becoming increasingly severe. According to the "2009 Report Series on Internet Security Situation of Chinese Internet Users" issued by China Internet Network Information Center CNNIC and National Internet Emergency Response Center CNCERT in April 2010, in 2009, 52% of netizens have encountered cybersecurity incidents, and the related service expenses paid by netizens to handle security incidents totaled 15.3 billion yuan. While these virus Trojans have caused losses to netizens, they are also gaining illegal benefits. The revenue of the virus industry is tens of billions of yuan. About half of these illegal groups have obtained illegal profits. The leading virus groups There can even be hundreds of millions of yuan a year.
According to Jinshan statistics, the top ten virus groups have controlled 80% of virus download channels on the Internet. The viruses released by these channels have the most serious impact on Internet users. Unlike ordinary virus makers, virus groups have sufficient financial resources and manpower to continuously update and spread the virus, and play a "cat and mouse" game with antivirus manufacturers.
Based on the characteristics of virus groups making and spreading viruses and phishing websites, Jinshan network security experts recommend that the majority of Internet users do a good job of security protection in the following aspects:
1. Develop good Internet habits, improve your awareness of network security, reduce visits to bad websites or download software to small websites;
2. Install necessary security software and enable real-time monitoring functions, such as web page Trojan filtering, smart interception of phishing websites, etc .;
3. Fix the system's vulnerabilities in a timely manner, install security software with active vulnerability repair functions such as Kingsoft Guardian or QQ Computer Housekeeper, and cut off the main way of virus transmission.
At the same time, experts also recommend targeted prevention. For example, "Gentle Killer" is a typical virus-controlled virus. Users infected with the virus will face serious security threats such as stolen account passwords and blue screen of death. The virus spreads mainly through websites that play pirated movies and bad videos online. To play videos from these websites, a dedicated player must be installed, and the virus is hidden in it. Li Tiejun said that the infected computer's homepage would be locked as a website navigation station, several IE icons would be added to the desktop, and online game players would also find that multiple mainstream game accounts were stolen.
Based on the spread of the virus, Jinshan network security experts advised that comprehensive prevention and control work must be done in advance: first, dangerous downloads are blocked through the web site security system, and users who install security software are blocked from downloading these dangerous programs; second Internet users are advised not to install special players provided by bad video websites. The probability of these programs bundling viruses is close to 100%. Finally, you can use security antivirus software to quickly check and kill computers that have been poisoned.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?