Chapter 541
If he hadn't encountered this kind of thing himself, if he hadn't known Northwest Feng, an industry insider, it would have been difficult for Chen Bo to know that there was such an industry in a short period of time.
Following Northwest Feng's explanation, Chen Bo finally understood what this thing called the social work library was.
Hackers usually invade websites that they find valuable, and then steal all user data and information on the website.
However, because there is so much user information stored on the website, this information must be collected and stored centrally for later search.
The place used by hackers to store information is the social engineering library.
After hackers collect a large amount of user information, they store it in a social engineering database for sorting and classification, and divide it into different categories according to different uses.
Hackers only need to log in to the social work library website that they have set up in advance, and then they can enter the social work library to query the information they want. Of course, hackers are not the only ones who can do this. As long as this website exists, they are ordinary people. , you can also query other more private information by entering other people's common information (such as mobile phone number, QQ number).
For example, the family situation, social experience, etc. that were revealed after Chen Bo and Chen Xiaoyan were searched through human flesh searches were actually queried through the social work database.
"Have you ever done this kind of thing?" Chen Bo asked.
"I used it for legitimate purposes, to eliminate evil and promote good, and I also bought the information. This cannot be told..."
Chen Bo was speechless, but faced with such a situation, there was nothing he could do.
He could only listen to the northwest wind and continue talking.
"There are several industry terms here. The first one is database dragging, which means hackers invade valuable websites and steal databases. The second one is database washing, which means cleaning data and converting valuable data into cash transactions. Three are database collisions, which means using the obtained data to log in on other websites or APPs, and the last one is the social engineering database, which is very complicated..."
According to Northwest Feng, the sources of these data are also very complicated. One is that hackers program to steal data, and the other is that it is difficult to prevent domestic thieves.
One is that hackers will place Trojan viruses on many websites, and use crawlers to obtain the information filled in by registered users of these websites, including home addresses, age and gender, contact information, etc. Once successfully obtained, the hackers will put it in the social engineering library. , waiting for someone in need to buy it.
The second source of data is more abominable, internal employees of major websites. As the saying goes, "It's hard to guard against house thieves if you guard against them day and night." Therefore, many websites do not guard against their internal employees.
These employees working inside the website can naturally easily obtain user information. In order to obtain illegal benefits, a considerable number of employees will sell the user privacy information they know about these websites to illegal personnel who control the social engineering database.
Such internal employees usually have more comprehensive user information than hackers. After all, hackers have to write various codes to enter the website to obtain information. The probability of being discovered is not small, but these employees will not arouse the company's suspicion. , therefore, a considerable part of the user privacy information stored in the social engineering database is sold by insiders of major websites themselves.
The user information stolen by employees and hackers covers many aspects, and the content involved depends on what software or website the user has registered.
So why would a hacker build such a social engineering library? The reason is simple: there is demand and it can make money.
After all, if there is demand, there will be a supply chain. If someone wants to obtain other people's information through illegal means, someone will satisfy their desire.
Hackers satisfy this idea, but hackers are not philanthropists.
Therefore, if someone wants to obtain other people’s information from the social work database, they must pay these social work organizations. And this is one of the sources of income for establishing a social work bank organization.
Another source of income is the large-scale sale of ordinary user data by social engineering libraries. The premise of the kind of income mentioned above is that the information of the person being inquired is very valuable, so people are willing to spend money to go to the social engineering database to check private information.
What about other information about ordinary people collected by the social work database? After all, these days there are still only a few people who are willing to spend money to check other people's information online. However, the social engineering database organization still found buyers for the information of these ordinary users, and they are notorious online fraud companies.
I believe you have always been confused. Although I don’t seem to have posted my phone number and personal information randomly on the Internet or made it public, I always receive calls from various online scams, and I can still tell the truth about my personal information. , seems to know you better than your parents.
In fact, they may really know you. Of course, in addition to fraud companies, many financial companies and real estate companies are also among the buyers of social work libraries. However, they do not purchase a large amount of user information to make fraudulent calls, but to collect this data to accurately locate users.
When these ordinary user information is in the social worker database, it has been classified and processed according to the obtained information, such as being divided into different groups according to family status, marital status and financial management.
Once this large amount of data is obtained by a financial company or real estate company, they will accurately recommend the services needed to users based on these categories. For example, if the user's family situation is known, insurance companies in the financial industry can accurately recommend the insurance they need, such as personal accident insurance, critical illness insurance, and even car insurance.
The same is true for the real estate industry. If you know the user's marital status and financial situation, you can determine whether the other party needs to buy a house, decorate, etc., and make accurate recommendations to the user's needs.
"Do you know the person who controls the social work library?" Chen Bo's last words startled Northwest Feng.
"It can't be said that we know each other, it's just work needs, so it's normal to have contact, right?"
"Help me find such a person. I want to meet the person you are trading with. I have no other intention. I just want to learn some of their crawler technology, programming and so on..." Chen Bo said.
Northwest Feng was stunned for a while, and after a long time he said sarcastically: "Who would believe what you said? You don't want me to trick people out and then..."
"I'm not a policeman. You don't have to worry about this. Besides, is it useful to catch this person? I really want to learn something. Let's feed the Internet sharks as soon as possible. I'm going to make a phone call and ask my parents to go out and hide. A few days..." After Chen Bo finished speaking, he left.