网络安全威胁信息共享平台

Malware, short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. The first category of malware propagation concerns parasitic software fragments that attach themselves to some existing executable content. The fragment may be machine code that infects some existing application, utility, or system program, or even the code used to boot a computer system.

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim.

A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform Distributed Denial Of Service Attack, steal data, send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.

Control address is server's IP address that controlled by Hacker. They can use these IPs to do bad things or just steal data.

Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth.

People use a certain way (tools) to convey information, exchange ideas of the platform, such as: QQ, WeChat and so on.

Email spoofing is the creation of email messages with a forged sender address. Because the core email protocols do not have any mechanism for authentication, it is common for spam and phishing emails to use such spoofing to mislead the recipient about the origin of the message.

Generally, spread address is a special type of URL, which linked a malicious program. Users carelessly download malicious programs from these URL.

Mobile phone number with malicious behavior such as fraud. Some phone number is used on to send and recive information by hackers. 2G network is stable and secret. So textmessages become an importent way to transport information.

Distributed Denial of Service attack refers to the use of client / server technology, the combination of multiple computers as an attack platform, DDoS attacks on one or more targets, thereby exponentially increasing the power of denial of service attacks.

Open source intelligence refers to the information obtained through the analysis of public information or other resources.

SP is the abbreviation of service provider. It is a new type of mobile data service which is used to obtain the position information of mobile terminal through the mobile communication network and positioning technology, and to carry out a series of application services.

Anti Network-Virus Alliance of China

ICP: No. 京10012421 Contact us: cctga@cert.org.cn