Tagged articles
6 articles
Page 1 of 1
21CTO
21CTO
Oct 15, 2021 · Information Security

How a WeChat Payment System Was Hijacked: A Code‑Injection Theft Case Study

This article details how a former technical director inserted malicious code into a company's WeChat payment platform, diverting millions of yuan to his own account, the subsequent investigation, witness testimonies, and the court's judgment sentencing him for large‑scale theft.

Code InjectionInformation SecurityWeChat
0 likes · 7 min read
How a WeChat Payment System Was Hijacked: A Code‑Injection Theft Case Study
DataFunTalk
DataFunTalk
Jul 15, 2021 · Artificial Intelligence

Graph Neural Network‑Based Payment Fraud Detection at eBay

The article explains how eBay protects its global payment system using a graph‑neural‑network driven risk management framework called xFraud, which combines heterogeneous graph sampling, node‑type encoding, attention mechanisms and dynamic‑graph extensions to detect and explain both individual and organized fraud patterns in real‑time.

eBaygraph neural networksmachine learning
0 likes · 13 min read
Graph Neural Network‑Based Payment Fraud Detection at eBay
Java Backend Technology
Java Backend Technology
Mar 16, 2021 · Information Security

Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled

Security researchers dissect the counterfeit “Le Bao” app that mimics WeChat, revealing its covert QR‑code group‑joining, custom decoding, member‑paid porn livestreams, embedded payment methods, server infrastructure, and illicit profit models, highlighting its high concealment and the need for aggressive mitigation.

Information Securitycybercrimemalware analysis
0 likes · 15 min read
Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled
Top Architect
Top Architect
Nov 6, 2020 · Information Security

Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion

The report investigates the malicious “Le Bao” application that mimics WeChat, detailing its hidden QR‑code group‑joining mechanism, server‑side communication, payment and gambling integration, and the broader illicit promotion and profit model, while providing forensic traces, source‑code decoding, and mitigation recommendations.

Information SecurityMobile Securityapp spoofing
0 likes · 13 min read
Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion
Programmer DD
Programmer DD
Oct 27, 2020 · Information Security

How a Fake WeChat App ‘LeBao’ Fuels Hidden Porn Networks – A Deep Dive

This report analyzes the malicious “LeBao” application that masquerades as a WeChat‑like chat tool, detailing its covert QR‑code group entry, custom decoding, member‑paid porn livestreams, payment fraud, server tracing, and recommended mitigation measures to curb its illicit operations.

Information Securityapp investigationcybercrime
0 likes · 11 min read
How a Fake WeChat App ‘LeBao’ Fuels Hidden Porn Networks – A Deep Dive
DataFunTalk
DataFunTalk
Jun 22, 2020 · Artificial Intelligence

Ctrip's Automated Iterative Anti‑Fraud Modeling Framework for Payment Risk

The article describes Ctrip's payment fraud risk characteristics, a comprehensive automated iterative anti‑fraud model framework—including variable system, GAN‑augmented sample generation, RNN behavior encoding, and tree‑based classifiers—and demonstrates how this approach restores recall performance compared with traditional static models.

GANRNNRisk Modeling
0 likes · 12 min read
Ctrip's Automated Iterative Anti‑Fraud Modeling Framework for Payment Risk