100 yuan per account! A gang used a face-changing app to "revive" tens of thousands of restricted WeChat accounts

100 yuan per account! A gang used a face-changing app to "revive" tens of thousands of restricted WeChat accounts

Turn on the camera and use the software to simulate a variety of expressions. I believe many students must have used or seen "face-changing" apps similar to portrait recognition. With the help of short video channels, the app has become popular on the Internet for its strong entertainment value, but the software has security risks and can be easily exploited by criminals.

Recently, according to Jiangsu News, during the Net Clean 2021 special operation, Nantong police have cracked a case of overseas fraud using restricted WeChat accounts, and a five-member gang has been arrested.

In this case, the common face-changing app became an accomplice.

It is reported that in this new type of cybercrime case, a gang of five people used AI software to forge facial recognition authentication, and then lifted login restrictions at a price of 100 yuan per account. These restarted accounts were used by overseas fraudsters.

The gang restarted more than 10,000 accounts and made illegal profits of more than 1 million yuan.

According to official introduction, the accounts they collected were all registered by people in remote areas, and were sold to criminals at low prices after registration.

According to the gang members, at that time, in order to ensure that the person performing the operation was the person who registered the account, when initiating the application to lift the login restriction, the action of opening the mouth was required to be completed within a limited time.

However, the seemingly impossible to bypass the "firewall" can be easily accomplished by using "face-changing" software to simulate real-life movements and relying on a specific mobile phone. The whole process only takes a few seconds.

The gang members said that this smartphone was "flashed" to obtain root permissions (the highest permissions of the mobile phone system), and used a video switching software. When the application to lift the restriction login process entered the stage requiring dynamic face recognition, the software would read the last video saved in the album.

As long as the clarity of the portrait in the video meets the requirements, the system will determine that the behavior is a real-life operation, thereby successfully completing the verification.

<<:  Unable to escape the supply chain crisis, even Apple is facing a "chip shortage"

>>:  Four reference types of in-depth learning objects in Android (strong reference, soft reference, weak reference, virtual reference)

Recommend

Important release! A chart to understand the white paper "China's Space in 2021"

Source: Science and Technology Daily Editor: Zhan...

Dopamine VS endorphins, which one brings true happiness?

If you are also a heavy patient of short videos, ...

CCTV's "Weekly Quality Report": Hidden Concerns of Mobile Payment

Introduction: CCTV's "Weekly Quality Repo...

6 steps to plan social fission activities and case analysis

Yang Fei of Luckin Coffee said that the most effe...

How much basic knowledge do you know about our home planet?

This article is based on answering similar questi...

Huawei App Market Paid Promotion Operation Guide!

1. Developer Registration First, you need to regi...

How to use questionnaires in app operations?

Note that it is “use”, not “do”. This article tal...

A review of the top ten public relations crisis events in 2018 (Part 2)

The second part of the top ten crisis public rela...

How do overseas Chinese restaurants obtain WeChat mini-program authentication?

Q: How do overseas Chinese restaurants authentica...