🦑 Why don't hackers attack online lending platforms?

 ðŸ¦‘Why don't hackers attack online lending platforms?

#FastTips


1) The risk of an attack outweighs the benefit

For example, I might get 200,000 yuan from this online lending platform, but according to the "Internet Security Law," I have to go in and squat for 5 or 6 years. It is not guilty to go in for a small profit. And you may not know how powerful our cyber police are. Let’s just say: my country’s current cybersecurity risk handling system is very complete, and it can "look for you along the network cable." The Internet is not a place outside the law! !!


2)  Not bad money

Powerful hackers (technologists) have long since become the executives of listed technology companies (such as Ali, Tencent, Baidu, 360, etc.).


Moreover, the online loan platform is also undergoing risk testing before being launched. Behind a complete product is a very large and detailed risk control system. If the technology is not enough, it is definitely not black. To put it simply: Technologists can't keep up with this little money and are too lazy to attack, and rookie skills can't keep up with the attack.


3) Attacks are always there.

Yes, of course, there are people who have the technology but some are not afraid of death and lack of money. So they will take risks to attack online loan platforms, payment platforms, etc. But there are also white hats (especially against hackers) who work for the company to defend and trace the source & counter-attack. The war between hackers and white hats on the Internet has been in fierce confrontation. For example, the app suddenly fails to open, your computer has a blue screen inadvertently, your computer is poisoned, and so on. Network offense and defense is like a war without gunpowder, which takes place 24 hours a day.


4) There are online lending platforms that have been hacked, but ordinary people will never know

According to my industry experience, there are indeed platforms that have been hacked, trousers removed, black pages posted, data tampered, and so on. Most of them were done by foreign APT organizations, and many of them were "instructed"


Post a Comment

0 Comments