Analysis Report on China’s Internet Network Security Monitoring Data in the First Half of 2020

In order to fully reflect the spread of malicious programs, vulnerability risks, DDoS attacks, website security and other aspects of China’s Internet in the first half of 2020, CNCERT combed the monitoring data in the first half of the year and formed the monitoring data analysis report as follows. To download the report, please click the attachment at the end of the article.

catalogue

First, malicious programs

(A) computer malicious program capture

(2) Infection of users of computer malicious programs

(3) Malicious mobile Internet programs

(4) Malicious programs for networked smart devices

Second, security vulnerabilities

Third, denial of service attacks

(A) the active situation of attack resources

(2) The situation of large-volume attacks in China

(3) The activity of mainstream attack platforms

Fourth, website security

(A) phishing

(2) The back door of the website

(C) Web tampering

V. Cloud platform security

Six, industrial control system safety

(A) exposure of industrial control system on the Internet side

(II) Threat monitoring on the Internet side of industrial control system

(3) Information on safety loopholes of industrial control products

First, malicious programs

(A) computer malicious program capture

In the first half of 2020, about 18.15 million samples of computer malicious programs were captured, with an average daily spread of more than 4.83 million times, involving about 11,000 families of computer malicious programs. According to the statistics of communication sources, overseas malicious programs mainly come from the United States, Seychelles and Canada, and the specific distribution abroad is shown in Figure 1. Malicious programs located in China mainly come from Zhejiang, Guangdong and Beijing. According to the target IP statistics, there are about 42.08 million IP addresses attacked by computer malicious programs in China, accounting for 12.4% of the total IP addresses in China. These attacked IP addresses are mainly concentrated in Shandong Province, Jiangsu Province, Guangdong Province, Zhejiang Province, etc. The distribution of IP addresses attacked by computer malicious programs in China is shown in Figure 2.

Figure 1 Distribution of computer malicious code propagation sources outside China

Fig. 2 IP distribution under computer malicious code attack in China

(2) Infection of users of computer malicious programs

The number of hosts infected with computer malicious programs in China is about 3.04 million, up 25.7% year-on-year. About 25,000 computer malicious program control servers located abroad control about 3.03 million hosts in China. In terms of the countries or regions where the control servers belong, the number of control servers located in the United States, China, Hong Kong and the Netherlands ranks in the top three, with about 8,216, 1,478 and 1,064 respectively, with specific distribution as shown in Figure 3; In terms of the number of hosts controlled in China, the control scales of control servers located in the United States, the Netherlands and Germany rank the top three, controlling about 2.52 million, 1.27 million and 1.17 million hosts in China respectively, as shown in Figure 4. In addition, according to the sampling monitoring data, it is found that attacks against IPv6 networks have also begun to appear, and computer malicious program control servers with about 1,200 IPv6 addresses abroad have controlled about 15,000 IPv6 address hosts in China.

Fig. 3 Distribution of control terminals of overseas Trojan botnets that control hosts in China.

Figure 4 Countries or regions that control the number of TOP10 hosts in China.

From the regional distribution of the number of hosts infected with computer malicious programs in China, they are mainly distributed in Jiangsu Province (accounting for 15.3% of the infected number in China), Zhejiang Province (accounting for 11.9%), Guangdong Province (accounting for 11.6%), etc. The specific distribution is shown in Figure 5. Among botnets infected with malicious computer programs, there are 4,696 botnets with a scale of more than 100 hosts and 16 botnets with a scale of more than 100,000, as shown in Figure 6. Relevant institutions have disposed of 45 botnets with large control scale, effectively controlling the harm caused by computer malicious programs infecting the host.

Figure 5 The number of hosts infected with Trojan bots in China is distributed by region.

Figure 6 Scale distribution of botnets

(3) Malicious mobile Internet programs

Through independent capture and vendor exchange, more than 1.63 million malicious mobile Internet programs were discovered, up 58.3% year-on-year. Through the statistics of malicious behavior of malicious programs, it is found that the top three are still hooliganism, tariff consumption and information theft, accounting for 36.5%, 29.2% and 15.1% respectively. In order to effectively prevent the harm of malicious programs on the mobile Internet and strictly control the spread of malicious programs on the mobile Internet, 812 malicious programs on 125 platforms providing mobile application download services in China have been removed, effectively preventing the harm of malicious programs on the mobile Internet and strictly controlling the spread of malicious programs on the mobile Internet.

In recent years, China has gradually increased the security management of App stores and Applications, requiring App stores to conduct real-name audits of developers who put apps on the shelves, and conduct security inspections and content copyright audits on apps, which makes it more difficult for Internet black-market app stores to spread malicious apps. At the same time, however, the "edge-ball" gray applications that can evade supervision and achieve bad purposes have increased. For example, counterfeit apps with fishing purposes and fraudulent behaviors have become an important tool for illegal production, which continues to pose a greater threat to users in important industries such as finance, transportation and telecommunications. In the first half of 2020, 180 new download links of counterfeit apps were discovered through independent monitoring and complaint reporting. These counterfeit apps have the characteristics of easy copying, frequent version updates, and rapid spread of hot spots. They are mainly concentrated in popular applications such as counterfeit public security law, banking, social software, payment software, and ticketing software. The counterfeiting methods are mainly counterfeit names, icons, pages, etc., which are very deceptive. At present, because developers need to submit proof materials such as software copyright before Applying for the Application in the app store, it is difficult for counterfeit apps to be put on the app store, and its circulation channels are mainly concentrated in other online communication channels such as network disk, cloud disk and advertising platform.

(4) Malicious programs for networked smart devices

At present, there are more than 15 malicious programs active on smart devices, including Mirai, Gafgyt, Dofloo, Tsunami, Hajime, MrBlack, Mozi, PinkPot and so on. These malicious programs generally invade and control smart devices through vulnerabilities and violent cracking. After being controlled by intrusion, there are security threats and risks such as user information and device data being stolen, hardware devices being controlled and destroyed, devices being used as a springboard to attack other hosts in the intranet or launching DDoS attacks abroad. In the first half of the year, about 1.26 million malicious programs were found on smart devices, most of which belonged to Mirai family and Gafgyt family, accounting for more than 96.0%. There are more than 50,000 IP addresses in the server, and the number of IP addresses of suspected infected smart devices in China is about 920,000, which is basically the same as that in the first half of 2019, mainly located in Zhejiang, Jiangsu, Anhui, Shandong and Liaoning provinces. The accused networked smart devices launched DDoS attacks on more than 1,000 targets every day, which was basically the same as that in the first half of 2019.

Second, security vulnerabilities

The National Information Security Vulnerability Sharing Platform (CNVD) included 11,073 general security vulnerabilities, a substantial increase of 89.0% year-on-year. Among them, the number of high-risk vulnerabilities was 4,280 (accounting for 38.7%), up 108.3% year-on-year, and the number of "zero-day" vulnerabilities was 4,582 (accounting for 41.4%), up 80.7% year-on-year. Security vulnerabilities mainly cover vendors or platforms such as Google, WordPress and Oracle Bone Inscriptions. According to the statistics of the affected objects, the top three are application vulnerabilities (48.5%), Web application vulnerabilities (26.5%) and operating system vulnerabilities (10.0%), as shown in Figure 7. In the first half of 2020, CNVD handled nearly 15,000 incidents involving network security vulnerabilities such as government agencies and important information systems.

Figure 7CNVD includes statistics of security vulnerabilities classified by affected objects.

Third, denial of service attacks

Due to the characteristics of low attack cost and obvious attack effect, DDoS attack is still one of the most common and influential network security threats faced by Internet users. Sampling monitoring found that the number of high-traffic DDoS attacks with daily peak traffic exceeding 10Gbps in China was basically the same as that in 2019, with about 220 incidents.

(A) the active situation of attack resources

After continuous monitoring, analysis and disposal, the stability of available DDoS attack resources is reduced, and the number of available active resources is controlled at a low level. Cumulative monitoring found 2,379 active C&C control servers for launching DDoS attacks, of which 95.5% were located abroad, mainly from the United States, the Netherlands, Germany, etc. There are about 1.22 million active controlled hosts, of which 90.3% are from China, mainly from Jiangsu, Guangdong, Zhejiang, Shandong and Anhui provinces. There are about 8.01 million reflection attack servers, of which 67.4% are from China, mainly from Liaoning, Zhejiang, Guangdong, Jilin and Heilongjiang provinces.

(2) The situation of large-volume attacks in China

During the monitoring, it is found that the main attack methods are still TCP SYN Flood, NTP Amplification, SSDP Amplification, DNS Amplification and UDP Flood.The above five attacks accounted for 82.9%. In order to avoid traceability, attackers tend to use these attack methods which are easy to hide the attack source, and flexibly combine the attack traffic according to the protection of the attack target, and the proportion of mixed attack methods is 16.4%. In addition, with the rampant "DDoS as a service" black production mode in recent years, attackers tend to use high-traffic attacks to instantly paralyze the target network. The proportion of attacks with DDoS attack duration less than half an hour is 81.5%, and the targets are mainly located in Zhejiang, Jiangsu, Fujian, Shandong, Guangdong and Beijing, accounting for 81.1%.

(3) The activity of mainstream attack platforms

Through continuous monitoring and tracking of the activity of DDoS attack platforms, it is found that DDoS attack platforms on web pages and botnet families such as Gafgyt, Mirai, Xor, BillGates and Mayday are still active, and there are many DDoS attacks. As one of the black production modes of "DDoS as a service", the web page DDoS attack platform provides services directly to users, and users can launch attacks on their own as needed, which greatly reduces the difficulty of launching DDoS attacks and leads to further proliferation of DDoS attacks. The monitoring found that the number of DDoS attacks initiated by the web DDoS attack platform was the largest, increasing by 32.2% compared with the first half of 2019. At present, a large number of active Internet of Things devices lacking security protection on the Internet provide a large number of controlled resources for the rampant development of DDoS attack platforms, resulting in a high number of DDoS attacks. New variants of Gafgyt and Mirai malicious programs appear constantly, which keeps the number of botnet control terminals and attack events formed by them at a high level, while Xor malicious program family has obvious characteristics that it provides "DDoS as a service" black-market business, showing that it maintains a high attack frequency with a small number of control terminals.

Fourth, website security

(A) phishing

The monitoring found that there were about 19,000 counterfeit pages for websites in China. CNCERT mainly disposed of 6,226 counterfeit pages such as online business halls in the financial industry and telecommunications industry, with a year-on-year decrease of 48.1%. In the coordinated disposal of counterfeit pages, the IP address of the counterfeit page still ranks first in China and Hongkong, accounting for 74.0%. At the same time, the number of counterfeit pages on the "ETC online authentication" website on the internet has increased by spurt. After entering May, the number of phishing pages related to "ETC online authentication" accounted for as high as 61.2%, and the main IP addresses of such phishing websites are still located abroad. The forms of counterfeiting mainly include different page themes such as "ETC information authentication", "ETC online authentication" and "ETC online authentication center", and fraudsters trick users into submitting personal privacy information such as real name, bank card account number, ID number, bank reserved mobile phone number and withdrawal password.

(2) The back door of the website

About 18,000 IP addresses at home and abroad have implanted backdoors into about 35,900 websites in China, and the number of websites implanted with backdoors in China has increased by 36.9% compared with the first half of 2019. Among them, there are about 18,000 overseas IP addresses (accounting for 99.3% of all IP addresses) that have implanted backdoors into about 35,700 websites in China, with the most IP addresses located in the United States, accounting for 19.0% of the total overseas IP addresses, followed by IP addresses located in the Philippines and China, as shown in Figure 8. In terms of controlling the total number of websites in China, IP addresses located in the Philippines control the largest number of websites in China, about 13,600, followed by IP addresses located in China, Hongkong and the United States, which control 7,300 and 6,020 websites in China respectively. In addition, with the accelerated deployment of IPv6 in China, the scope of websites supporting IPv6 is expanding. In addition, there were 592 backdoor incidents of websites whose attack source and target were IPv6 addresses, involving a total of 35 attack source IPv6 addresses and 72 domain names of attacked IPv6 address resolution websites.

Figure 8 TOP10 of the country or region where the backdoor IP address is implanted into the website in China from overseas.

(C) Web tampering

There are about 74,000 websites that have been tampered with in China, including 318 government websites that have been tampered with. Judging from the distribution of top-level domain names of tampered web pages in China, ".com", ".net" and ".org" still rank in the top three, accounting for 74.1%, 5.1% and 1.7% of the total respectively, as shown in Figure 9.

Figure 9 Distribution of tampered websites in China by top-level domain name

V. Cloud platform security

The situation of network security threats on China’s cloud platforms is still grim. First of all, the proportion of all kinds of network security incidents that occurred on the mainstream cloud platforms in China is still high. Among them, the number of DDoS attacks on the cloud platform accounts for 76.1% of the attacks on domestic targets, the number of embedded backdoor links accounts for 90.3% of all embedded backdoor links in China, and the number of tampered pages accounts for 93.2% of the number of tampered pages in China. Secondly, attackers often use China’s cloud platform to launch cyber attacks. Among them, the number of DDoS attacks initiated by the cloud platform as the control terminal accounts for 79.0% of the number of DDoS attacks initiated by domestic control, the number of IP addresses of controlled terminals controlled by malicious programs such as Trojans and botnets accounts for 96.3% of all IP addresses of controlled terminals in China, and the number of malicious programs carried by them accounts for 79.0% of the number of malicious programs carried on the domestic Internet.

Six, industrial control system safety

(A) exposure of industrial control system on the Internet side

Monitoring found that 4,630 industrial devices were exposed to the Internet, involving 47 types of devices, such as programmable logic controllers, intelligent buildings and data acquisition, from 35 domestic and foreign manufacturers. The specific types are shown in Figure 10. Among them, the equipment with high-risk vulnerabilities accounts for about 41%. The monitoring found 480 sets of networked monitoring and management systems exposed in key industries such as electric power, oil and gas, urban rail transit, etc., including 262 sets of electric power, 118 sets of oil and gas, and 100 sets of urban rail transit. The types involved include government supervision platform, remote monitoring, asset management, engineering safety, data detection system, pipe network dispatching system, OA system, cloud platform, etc. The specific platform types are shown in Figure 11. Among them, about 11.1% systems have high-risk vulnerabilities such as information leakage, cross-site request forgery and improper input verification. Once the industrial control system exposed to the Internet is attacked, it will seriously threaten the safety of the production system.

Fig. 10 Type statistics of networked industrial equipment discovered by monitoring.

Figure 11 Statistics on the types of networked monitoring management systems in key industries discovered by monitoring.

(II) Threat monitoring on the Internet side of industrial control system

The network assets of domestic industrial control systems continue to be scanned and sniffed from abroad, with an average of more than 20,000 times a day. Through analysis, the sniffing behavior originated from 90 countries such as the United States, Britain and Germany, and the target involved networked industrial control equipment and systems in key industries such as energy, manufacturing and communication. A large number of network assets information of key information infrastructure and its networked control system are sniffed abroad, which brings hidden dangers to cyberspace security in China. China’s large industrial cloud platforms, such as Genyun, Aerospace Cloud, OneNET, COSMOPlat, Aopu Cloud and Jizhiyun, continue to suffer from network attacks from abroad, with an average number of attacks of 114 times per day, up 27% year-on-year. The types of attacks are shown in Figure 12, involving remote code execution, denial of service, Web vulnerability exploitation, etc. Industrial cloud platforms carry a large number of access devices, business systems, as well as enterprise, personal information and important data.

Figure 12 Type distribution of attack events of industrial cloud platform

(3) Information on safety loopholes of industrial control products

The four vulnerability platforms of CNVD, CVE, NVD and CNNVD newly included 323 vulnerabilities of industrial control system products, of which high, medium and dangerous vulnerabilities accounted for 94.7%. As shown in Figure 13 and Figure 14, the products affected by the vulnerability are widely used in key information infrastructure industries such as manufacturing, energy, water treatment, information technology, chemical industry, transportation, commercial facilities, agriculture, water conservancy projects, government agencies, etc. The product suppliers involved in the vulnerability mainly include ABB, Wanke, Siemens, Advantech, Schneider, Mossa, Mitsubishi, Haiwei, Asia Control and Yonghong.

Figure 13 Industrial distribution of new industrial control product vulnerabilities TOP10 (Note: products affected by vulnerabilities can be applied to multiple industries)

Figure 14 Supplier Distribution of Newly Added Industrial Control Product Vulnerabilities TOP1

Attachment: Analysis Report on China’s Internet Network Security Monitoring Data in the First Half of 2020

Pupils are addicted to "cigarette cards", and what’s more, they rummage through trash cans! Many schools in Guangzhou reminded

Liuzhou Evening News recently

There is a new trend among primary school students.

Play "smoke card"

The "cigarette card" is made of discarded cigarette cases.

The children tore off the lids of various cigarette cases.

Fold into a rectangular card

Put your hands together and hit the ground with your empty palm.

If a cigarette card is hit by the palm wind and turned over, it will win.

not only that;nay

Children will also pay attention to the price of cigarettes

Divide "cigarette cards" into different grades.

Some children are already familiar with the "grade" and price of cigarettes

Students are addicted to the "cigarette card" game.

On the evening of March 27th, a group of children were lying on the ground in a residential area in Haizhu District, Guangzhou. They took out different brands of cigarette cards from the outer box of long cigarettes and began to beat them. The "cigarette cards" folded from discarded cigarette cases can make a group of children around the age of ten get together and play excitedly.

▲ Students play the "smoke card" game in the community.

Some parents reported that because of playing "cigarette cards", many children know more about cigarette brands than adults who smoke. In order to collect different brands of cigarette cases, they will ask their families who smoke, or ask their parents to buy them online, and some even rummage through the trash cans for cigarette cases discarded by others.

At noon on March 28th, a group of children outside a primary school in Haizhu District, Guangzhou, scrambled for discarded cigarette cases thrown away by others on the ground, just to make a "cigarette card". One of the students took out a "cigarette card" from his pocket, showing off a large number and rich brands.

▲ A student shows how to stack "cigarette cards"

In a toy and stationery store next to the school, I asked the merchant if there were any "cigarette cards" for sale. The boss said that when I went to wholesale recently, I found that I could buy "cigarette cards", but I thought that "cigarette cards" could be made by folding themselves, and students would not necessarily buy them, so there would be no purchase.

However, on some e-commerce platforms, "smoke cards" can be easily purchased. An e-commerce platform can see that two shops selling "cigarette cards" show that the goods have been spelled 200,000+pieces, and the price of 100 unfolded "cigarette cards" is 19.75 yuan.

▲ There are many shops selling "cigarette cards" on the e-commerce platform.

The school issued an initiative.

The popularity of "cigarette cards" has also attracted the attention of teachers and schools. A class teacher in a primary school in Haizhu District, Guangzhou, said that students get together to play the "cigarette card" game as soon as class breaks, and even children can be seen playing the "cigarette card" on the bus after school. Some students find their own discarded cigarette cases to make, while others buy them directly. Every time he sees students playing with "cigarette cards", he will confiscate them.

▲ Students collect "cigarette cards" and are familiar with the grades and prices of cigarettes.

Recently, several primary schools in Guangzhou issued tips to parents for students to play "cigarette cards". According to the Family Committee of Guangzhou Science City Primary School, "cigarette cards" come from cigarette cases and contain harmful substances, which are harmful to children’s physical and mental health. "Cigarette cards" come from different sources, some from students’ personal collection, and some from online shopping. Parents are also requested to be vigilant and strengthen relevant education and guidance.

▲ "cigarette card" is made of discarded cigarette cases.

What’s the effect of taking a "cigarette card"?

Visible influence

1. Affect your studies. The appearance of "taking a cigarette card" arouses curiosity, attracts children’s attention, and leads to inattention in class. Even some children will secretly fold cigarette cards during class, exchange games with each other, and sometimes they can’t help but make actions to make sounds, which may affect their study concentration.

2. Affect your health. In recent years, the virus has been raging, and students have been playing with cigarette cards on the ground in groups of three or five. The ground is covered with countless dust and bacteria, which makes it easy to be infected with bacterial viruses. In order to get more cigarette cards, many children ask their smoking families for them, ask their parents to buy them online, and even go to food stalls to collect them, rummage through trash cans, and stand next to smokers waiting for an opportunity to ask for cigarette cases. Premature exposure to tobacco can easily arouse children’s curiosity about smoking, and indirectly absorb second-hand smoke, which is harmful to health.

3. There are security risks. Children are addicted to cigarette card games, and some students are still immersed in them after school. Many children often just look underground when they walk, looking east and west for a cigarette case. Some children also pay attention to whether there are cigarette cases on the roadside and in flowers and plants when riding bicycles. If you don’t go home on time after school, you will gather outside the school, in the community or on the roadside open space to "shoot a cigarette card". Your personal safety is not protected and there are great security risks. At the same time, in the game, there may be serious behaviors such as fighting and fighting because of comparison and quarrel.

The influence of "invisibility"

1. It may bring hints about smoking. Premature exposure to cigarettes may arouse children’s curiosity and even bring positive hints about smoking. Moreover, nicotine in tobacco is highly addictive, and children and adolescents are still in the stage of growth and development, so they are more sensitive to it, which will affect brain development and may lead to learning disabilities and anxiety in children.

2. It may form bad psychology such as comparison. In the process of collecting "cigarette cards", children will know the brand and price of cigarettes, and the collected "cigarette cards" are graded. The higher the price of cigarettes, the higher the "cigarette cards" and "grades" made of corresponding cigarette cases. Students are proud of the more "high-grade cigarette cards" collected, and even decide who will start the game first according to the price of cigarettes, which may lead to the formation of unhealthy psychology such as comparison.

3. It may cause gambling in disguised form. Another way to play the game of "taking cigarette cards" is to gamble in disguise. Simply put, bet first. If classmate A wins classmate B, classmate B will lose a corresponding number of "cigarette cards" to Party A, or directly give cash or other items. As we all know, gambling is a habitual behavior. Although winning or losing can bring people adrenal stimulation and dopamine-like pleasure, it can also bring harm to life and profoundly affect people’s life. Especially in primary school, it is the key shaping period of children’s behavior habits. During the shaping period of children’s outlook on life and values, bad phenomena appeared on campus, and the phenomenon gradually spread.

For children’s physical and mental health development and academic progress

Let’s educate our children together.

Supervise and manage the game of "smoking cards"

The "Liuzhou No.1" video number is concerned today.

When the marathon meets Liuzhou "Net Red Bridge"

Reading recommendation

● Publicity of Liuzhou leading cadres before taking office ● Screen! Liuzhou Marathon starts in 2024! Just now, the first all-Malaysian racer crossed the line Source/Nanfang Daily, Dongfang Education Bureau

Audit/Tan Yanbin Editor/Zhou Zhijia Proofreader/Li Xinqi

Copyright belongs to the original author. If there is any infringement, please contact to delete it.

News breaking phone number: 18977221234; Contact information for promotion and cooperation: 13877213344 (WeChat with the same number)

Continue to slide to see the next touch to read the original text.

Liuzhou Evening News slides up to see the next one.

Original title: "Primary school students are addicted to" cigarette cards ",and what’s more, rummaging through trash cans! Reminders from many schools in Guangzhou "

Read the original text

Nine major leaders and key personnel of the telecom network fraud group wanted by the A-level wanted order of the Ministry of Public Security have arrived.

  CCTV News:Since the launch of the "100-day Action" to crack down on public security in summer, public security organs all over the country have made every effort to arrest major leaders and key personnel of telecommunication network fraud criminal groups in accordance with the relevant arrangements of the "nail pulling" action. Up to now, 9 of the 12 major leaders and key personnel of the telecom network fraud group publicly wanted by the A-level wanted order of the Ministry of Public Security have arrived at the case.

  It is understood that in order to severely crack down on telecommunication network fraud crimes in accordance with the law and effectively safeguard people’s property safety and legitimate rights and interests, the Ministry of Public Security, together with the Supreme People’s Court, the Supreme People’s Procuratorate and other departments, deployed a one-year "nail-pulling" campaign throughout the country and issued an A-level wanted order to publicly arrest major leaders and key personnel of telecommunication network fraud criminal groups. Public security organs in various places moved quickly at the news, made every effort to arrest and pursue, and launched a fierce offensive against fugitives of telecommunication network fraud crimes. After a lot of meticulous investigation work, on June 11, Henan provincial public security organs successfully captured Zhang Shilong (male, from Dehua County, Fujian Province); On June 12th, Anhui public security organs successfully captured Wu Zhiqiang (male, from Jinjiang City, Fujian Province). At the same time, under the strong arrest pressure and policy inspiration of public security organs, Liu Fengliang (male, from Ruzhou City, Henan Province), Zhao Panfeng (male, from Shuangfeng County, Hunan Province), Xie Jiawang (male, from Anxi County, Fujian Province), lin li (male, from xinyi city City, Jiangsu Province), Xie Hui (male, from Ninghua County, Fujian Province) and Tan Dong (male, from Fujian Province). The three people who are still at large are Peng Keling, Ouyang Zhipeng and Zhu Zhenkui.

  The relevant person in charge of the Criminal Investigation Bureau of the Ministry of Public Security said that the public security organs will always maintain a high-pressure pursuit situation for the major leaders and key personnel of the telecom network fraud group who are still at large, further strengthen the investigation and pursuit, and resolutely arrest them. The public security organs welcome the masses to provide relevant clues, assist the public security organs in their investigation and arrest, and jointly promote the "nail pulling" action to develop in depth.

  The three fugitives are:

  1. Peng Keling, male, born on September 16, 1982, registered address: No.17 Nanpeng Team, Chentun Village, Jianying Township, Yingshang County, Anhui Province, ID number: 341226198209165210.

Suspect Peng Keling

Suspect Peng Keling

  2. Ouyang Zhipeng, male, born on December 18, 1985, registered address: Xintang Group, Juhua Village, Hongshandian Town, Shuangfeng County, Hunan Province, ID number: 432522198512186990.

Suspect Ouyang Zhipeng

Suspect Ouyang Zhipeng

  3. Zhu Zhenkui, male, was born on December 15th, 1980. His household registration address is Room 1501, Building A, Jin Henry Capital, Mintang Road, Longhua District, Shenzhen City, Guangdong Province. His ID number is 41272219801215771X.

Criminal suspect Zhu Zhenkui

Criminal suspect Zhu Zhenkui

Dong Mingzhu’s domineering side leakage: I paid for Gree employees with two rooms, one living room and a car.

[Observer Network Synthesis] Dong Mingzhu was once again domineering. Yesterday (February 21st), Dong Mingzhu announced a decision in an interview with the People’s Daily client that she would let every employee live in two rooms and one living room.

In addition to the house, Gree also gives employees incentives such as sending mobile phones and raising salaries. Dong Mingzhu also told reporters in the interview that when Gree cars were produced, "then I will give them".

Dong Mingzhu was interviewed.

Yesterday (February 21st), Dong Mingzhu announced a decision in an interview with the People’s Daily client that she would let every employee live in two rooms and one living room.In the interview, Dong Mingzhu admitted that Gree employees are most worried about the house at present, and she will let all Gree employees enjoy two rooms and one living room in the next few years, and she will pay for it. Dong Mingzhu then further explained that as long as the employees don’t leave, when they retire, the house will belong to the employees themselves.

This is not the first time that Gree has helped employees to distribute houses, as pointed out in a press release issued by Gree official website on November 24th last year. As early as 2005, Gree Electric invested 200 million yuan to establish the first phase of Kangleyuan, an employee living area. The park has a building area of over 120,000 square meters and can accommodate more than 10,000 employees. In 2014, the second phase of Kangleyuan, covering an area of nearly 40,000 square meters and spending 400 million yuan, has also been put into use.

Kangleyuan pictures

Gree’s move is "very local tyrant" and very real, which reminds people of the measures of housing allocation in the planned economy era. Big companies such as Alibaba and Tencent also use the same method to retain excellent employees. The Paper reported in March last year that Ma Yun found Greentown Development Real Estate Co., Ltd., a subsidiary of Song Weiping, and built 380 houses on a plot at Wenyi West Road, Chang ‘er Road, Hangzhou, and sold them to his employees. The price of Ali’s interior room is only 60% of the market price.

Tencent’s plan to help employees buy houses was implemented earlier. According to the Beijing News, Tencent launched the housing plan in June 2011, and will invest 1 billion yuan to provide the first set of interest-free loans for qualified employees in three years. Employees only need to issue a house purchase contract and submit a personal credit inquiry report issued by the central bank, and do not need other physical guarantees.

In 2015, the original plan was upgraded. In the first-class cities such as Beijing, Shanghai, Guangzhou and Shenzhen, the amount of interest-free loans has increased from 300,000 yuan to 500,000 yuan; In addition to the above four cities, the second category of cities has increased from 200,000 yuan to 250,000 yuan.

In addition to sending a house, as a manufacturing giant, Gree’s other welfare policies are even more varied. According to Nanfang Daily, Gree Electric has decided to increase the salary of every employee who has worked for three months by 1000 yuan.

Gree salary increase notice

Subsequently, the person in charge of the marketing department of Gree Electric confirmed the reliability of the content. "This salary increase involves about 70,000 employees, and the company’s per capita efficiency is constantly improving, so we should share the labor results with you." According to the number of people, Gree Electric will increase its expenditure by 70 million per month.

But not every benefit is popular. Gree Electric gave the latest Gree mobile phone 2nd generation to employees as a Spring Festival benefit, but it seems that some employees didn’t "buy it". According to the news of China Business News, a large number of second-hand Gree mobile phones were sold on the Internet, and some sellers claimed to be Gree employees.

According to the inquiry of Observer.com, there are indeed a large number of advertisements selling Gree second-generation mobile phones on the second-hand online trading platform "Xianyu.com", and the price is generally "cut by half".

Screenshot of salted fish net

Gree officially responded that it should not be sold by employees. Moreover, the mobile phone is a company’s welfare, not a deduction, but also hopes to motivate employees to use their own products. As for the problem that mobile phones are rarely seen in the market, Gree insiders told reporters that Gree mobile phones are all self-produced, and at present they are only sold in a small range, online platforms and internal channels. "The overall production capacity is very limited, in order to ensure quality."

He also revealed that at present, the proportion of Gree employees using Gree mobile phones is not very high. "Because the mobile phone production capacity is not large, many employees have never seen it themselves, and employees are very curious. Some core employees of the company have experienced it first."

The possible sellers are related manufacturers of Gree, and some sellers claim that their Gree mobile phones are paid off by Gree related parties at the time of checkout.

In addition to mobile phones, there may be "Gree cars" in the future. Gree Group announced on the evening of February 20th that the company intends to sign a Cooperation Agreement with Zhuhai Yinlong, and the total amount of mutual priority procurement between the two parties shall not exceed 20 billion yuan.

It seems that the failure of Gree’s acquisition of Zhuhai Yinlong last year did not affect Dong Mingzhu’s confidence in entering the automobile industry.Dong Mingzhu also told reporters in the interview that when Gree cars were produced, "then I will give them".

[Observer Network Integrated Gree official website, Beijing News, Caijing.com, Nanfang Daily, etc.]

Suzhou area Asian dragon special sale! 52,000, only this time

[Autohome Suzhou Promotions Channel] Especially for you, the much-talked-about luxury sedan is launching an unprecedented promotion in Suzhou. At present, car buyers can enjoy a cash discount of up to 52,000 yuan, making this already very cost-effective model more attractive. The starting price has been adjusted to 138,800 yuan, which undoubtedly brings real car purchase benefits to consumers in Suzhou. To seize this wave of car buying opportunities, be sure to click "Check Car Price" in the quotation form to get higher preferential treatment. This is a car buying opportunity not to be missed, so act now!

苏州地区亚洲龙特价出售!优惠5.2万,仅此一次

The exterior design of the Toyota Asian Dragon shows a unique sense of modernity and elegance. On the front face, it uses a delicate hexagonal air intake grille, paired with sharp LED headlights, to create a strong visual impact. The body lines are smooth, and the overall style is biased towards the perfect combination of sports and business, which not only highlights the sense of power but also keeps the luxury. The proportions of the body are coordinated, and the details all highlight its high-end sense and exquisite craftsmanship. The overall exterior design gives a visual enjoyment that is both stable and dynamic.

苏州地区亚洲龙特价出售!优惠5.2万,仅此一次

The side lines of the Asian Dragon are elegant and smooth, showing a unique sense of design. The body size is 4990mm*1850mm*1450mm, and the wheelbase is up to 2870mm, providing ample support for the interior space. The front and rear wheelbases are 1595mm and 1605mm respectively, ensuring driving stability and comfort. The tire size is 215/55 R17, and it is matched with a delicate wheel design, which not only enhances the visual effect, but also ensures the grip and handling during the driving process. Overall, the side design of the Asian Dragon fully reflects its luxury and practicality.

苏州地区亚洲龙特价出售!优惠5.2万,仅此一次

The interior design of the Asian Dragon is simple and exquisite, showing the perfect fusion of luxury and practicality. In the spacious cockpit, the steering wheel is made of plastic material, but it pays attention to the grip, supplemented by manual up and down + front and rear adjustment functions to ensure the comfort and convenience of the driver. The center is equipped with a 10.25-inch touch screen with clear display and smooth operation. Integrated multimedia/charging interface, including Type-C interface, provides rich entertainment and convenient functions for passengers. In terms of seats, the main fabric material is mainly used to provide good air permeability and comfort. The main and auxiliary seats support front and rear adjustment, backrest adjustment and high and low adjustment to meet the needs of different drivers. The overall interior design takes into account both practicality and texture, creating a quiet and technological interior atmosphere.

苏州地区亚洲龙特价出售!优惠5.2万,仅此一次

[Engine]
The Asian Dragon is equipped with a 2.0L displacement L4 engine, which reaches a maximum power of 127 kilowatts, providing a stable and efficient power output. The maximum torque of this engine is 206 Nm, which ensures the strong performance of the vehicle in daily driving. The matching CVT continuously variable transmission (analog 10th gear) further enhances the driving smoothness and fuel economy, allowing the driver to experience a smooth gear shifting experience while enjoying the power.

In general, Autohome owners are full of praise for the exterior design of the Asian Dragon, considering it delicate and impactful, with smooth body lines that make people feel good at first glance. This reflects the attention to detail and the persistent pursuit of beauty in the design of the Asian Dragon, so that every car owner can feel the unique charm during driving.

The most complete in history! Watch the super detailed comparison of each series of Xiaomi TV

  Xiaomi TV currently includes five series of Xiaomi TV 4, 4A, 4S, 4C, and 4X, with rich sizes and diverse choices. But rice fans often leave messages in the background, asking what is the difference between these five series? So today, the editor has compiled a super-detailed comparison picture and text of each series of Xiaomi TV for you, hoping to help you buy TVs!

  Xiaomi TV 4 series

  Ultra-thin high-end flagship series, 4K ultra-high definition image quality, with immersive design. Exquisite appearance, placed at home like a work of art, currently includes 49 "55" 65 "and just released large size 75" four size segments.

  Xiaomi TV 4A series

  An artificial intelligence voice TV for the elderly and children. It is cost-effective and currently includes 32 "40" 43 "49" 50 "55" 65 "and other size segments, and includes a youth version and a sports version specially created for sports fans.

  Xiaomi TV 4S series

  Metal body is commonly used (except 32 "), which is beautiful in appearance and full of artistic sense. It currently includes 32" 43 "50" 55 "and 55" curved surfaces, with four size segments.

  Xiaomi TV 4C/4X series

  Most use the piano paint process (except 32 "), and the TV appearance is more artistic. The current 4C series includes four size segments, 32" 43 "50" 55 ", and the 4X as the latest series only includes 55".

  The following is a 55 "example to illustrate the similarities and differences between Xiaomi TV series in more detail.

  The same point

  1. All 4K ultra-high definition image quality, restore the visual effect of the real environment, make the picture full of more details, and watch the blockbuster more smoothly.

  2. Both use 64-bit quad-core processors, 2GB + 8GB storage, and run smoothly to meet daily storage needs.

  3. All are equipped with industry-leading PatchWall artificial intelligence system, which can be personalized recommended according to user usage habits. Thousands of people have thousands of faces, and you can understand the content better;

  4. All have built-in Xiao Ai, one-click voice to realize keyword search, open application games, check weather calendars and other voice interaction functions. At the same time, you can also control a variety of smart devices such as Mijia air purifiers and desk lamps. Through Xiaomi TV, create your own smart home and easily enjoy the convenience brought by smart life. (Among them, 4C 55 "and 4A 55" need to purchase their own Bluetooth voice remote control)

  5. With the same content source, movies, TV series, variety shows, massive film and television content, turn on the TV and watch it if you want; Dolby and DTS audio dual decoding, the sound is clear and bright, and the sense of presence is stronger;

  6. Both support seat installation and hanging installation methods. Xiaomi engineers provide door-to-door service, which is considerate, worry-free and assured.

  7. All support the third-party app. Users can download more smart TV software through the Dangbei market and expand TV applications, such as Dangbei Video Quick Search, Dangbei Fitness, etc.

  The difference

  √ Appearance and craftsmanship

  Xiaomi TV 4 55 ", 4.9mm ultra-thin and sexy body, immersive design, crystal clear as glass, like a desirable work of art;

  Xiaomi TV 4C 55 "and 4X 55" both use piano paint technology, with ultra-narrow borders, wide vision and super artistic sense;

  Xiaomi TV 4S 55 "metal body, six processes extracted from the gun-colored metal color, so that the appearance of the TV is more metallic, while the artistry is also perfectly presented.

  Xiaomi TV 4 55 inches

  Xiaomi TV 4A 55 inches

  Xiaomi TV 4X 55 inches

  Xiaomi TV 4C 55 inches

  Xiaomi TV 4S 55 inches

  √ Parameter configuration

  In terms of speakers, the 4A 55 "uses 2 * 6W speakers; the 4, 4X, and 4S 55" use 2x8W speakers; and the 4C 55 "uses 2 * 10W speakers.

  √ Price

  Xiaomi TV month-end promotion, all series of 55 "are in the special price reduction.

  Xiaomi TV 4 55 inches, 300 off the price of 3699 yuan

  Xiaomi TV 4S 55 inches, 200 off the price of 2799 yuan

  Xiaomi TV 4A 55 inches, 500 off the price of 2299 yuan

  Xiaomi TV 4C 55 inches, 500 off the price of 2299 yuan

  Xiaomi TV 4X 55 inches, 500 off the price of 2299 yuan

[mortal twilight] This team works efficiently to ensure the effective operation of the Olympic Games.

CCTV News:During the Winter Olympics and Paralympic Winter Games, the facilities and services of various venues left a good impression on athletes and staff from all over the world. As an outstanding contribution group of the Beijing Winter Olympics and Paralympic Games, Beijing Chaoyang District Operation Support Command has guaranteed a number of competition and non-competition venues, ensured the effective operation of the opening and closing ceremonies, and strictly implemented epidemic prevention and control measures to achieve the goal of "zero damage, zero infection and zero accident".

During the whole Winter Olympics and Paralympics, Chaoyang District Operation Support Command is mainly responsible for the service support of 3 competition venues, 8 non-competition venues, 5 transportation stations and 85 hotels (residences), including the National Swimming Center, National Speed Skating Hall and National Stadium. The headquarters also guaranteed four opening and closing ceremonies, served and received 2,076 athletes, 2,621 members of the Olympic family and the Paralympic family, and guaranteed the issuance of 141 medals.

Yang Hongfu, Deputy Director, Office of Operation Support Headquarters, Chaoyang District, Winter Olympics:In the preparations for the Winter Olympics and the guarantee of the competition, Chaoyang District firmly established the consciousness of "home court, main responsibility and main force", and coordinated all the work to operate efficiently. The majority of party member cadres from 245 units in the whole district went to war with all their might and made extraordinary efforts to complete all the service guarantee tasks.

Chaoyang District Operation Support Command dispatched 1,819 health professionals to the front line, strictly implemented the epidemic prevention and control measures of "one hospital, one policy" and "one store, one policy", and carried out 2.665 million person-times of health monitoring and 1.746 million person-times of nucleic acid testing. We have achieved "civil air defense+technical defense" and achieved the goal of "zero damage, zero infection and zero accident".

Zhang Rui, deputy head of the Medical and Epidemic Prevention Working Group of the Operational Support Command of Chaoyang District, Winter Olympics:We have strengthened our support team, including team leaders, assistants, disease control, supervisors, doctors, nurses, and nucleic acid sampling personnel. People in the closed loop are tested once a day, those outside the closed loop are tested once every two days, and those involved in the Olympics are tested once every seven days. We strive to ensure that during the whole winter Olympics epidemic prevention process, there must be both a system and a temperature.

Chaoyang District Operation Support Command also provided audience guidance and power support for 75 sports events and 32 event award ceremonies in the public area of Beijing Olympic Park, and completed the construction and renovation of 208 barrier-free facilities, successfully completing 373 tasks in 8 aspects including the launching ceremony of the torch relay in the Winter Olympics, the fire picking ceremony in the Winter Paralympics, the relay operation and other support tasks.

CCTV.com







    On May 20th, Yolanda, a famous movie star, was invited by a column in Henan Province to promote her latest solo album "Lonely Flowers" in Zhengzhou Grand Shanghai International Studios. After breaking up with her boyfriend Xia Yu, Yuan Quan really became a "lonely flower". China News Agency issued Chen Daishu photo







    Gao Yuanyuan, a mainland artist, snatched Xia Yu from Yolanda. China News Agency issued Han Yibing photo


    There are indications that Yolanda and Xia Yu did break up. So, at least half of Xia Yu’s affair with Gao Yuanyuan is true. Moreover, Xia Yu is not sorry for Yolanda. Single men are justified in looking for love.


    According to the reporter’s witness, Yolanda performed "Peach Blossom Garden" in poly theatre. Xia Yu’s car drove to the door, not to pick up Yolanda, but to enter the coffee shop. Yuan Quan got on Huang Lei’s car from another exit. Xia Yu should know that Yolanda is performing here, but he is no longer interested in being a flower escort. From the expression of two people, Xia Yu looks glum, while Yuan Quan is laughing.


    Earlier, Xia Yu exposed the news of living with Gao Yuanyuan, which greatly damaged his health image, while Yuan Quan burst into tears at the recording scene of Li Jing’s program, and even more, he put a knife in Xia Yu’s heart. Two people break up, although the reasons are diverse, but in this way, Xia Yu is much more passive than Yolanda.


    A love affair that has been going on for nearly ten years, although it has become a spent force in the end, and both of them have traces of struggling to survive, but the breakup still makes the public sigh, as if love has been hit again. Who believes there is still an out-of-touch feeling? Xia Yu is a Scorpio, but Venus falls in Sagittarius, a constellation that pursues sexual desire and does not hide its sexiness. Xia Yu has an open and exposed side in his bones, which can be seen in his dress and behavior. However, Yuan Quan is relatively strict with the package and much lower-key.


    Yolanda Sun and Mercury all fall in Libra, and Venus is Virgo. They pursue perfect love and abstract love, which is different from Xia Yu’s love that pays more attention to sensuality. Their views on love are essentially different. Because you are romantic when you are young, you can play with spiritual love, but the hot-blooded summer rain matures gradually, and hormones burn in the body, so it is impossible to keep the feelings pure and pure all the time. The pace of two people is different, so there is a gap between before and after.


    Two people’s astrolabes show that each other is the opposite sex type that they appreciate, but each person’s personality has something that the other person can’t tolerate. Summer rain is stubborn, Yolanda is cold outside and hot inside, and his temper is not necessarily good, especially when the moon falls on the Sagittarius, and his mood is out of place from time to time. If he happens to meet Xia Yu’s strength, it will be difficult to deal with it.


Editor: Peng Wei

Xunfei Intelligent Recorder: AI empowers the office scene, and treasure productivity tools help people in the workplace to evolve strongly.

If we compare life to a marathon, we will encounter various obstacles on the way:

If you are a journalist, but your patience is worn away by the noise of the city?

If you are a lawyer, but your ideas are disturbed by your client’s argument?

If you are a grassroots livelihood worker, you can’t understand the local dialect when visiting?

If you are a teacher, do you lecture during the day and organize at night?

If you are a student, can’t the typewriters keep up with their brains?

……

These questions can be answered in the brand-new short film "The Secret Code Behind the Leader" of Xunfei Intelligent Recorder!

Constantly explore users’ needs and give play to the leading spirit.

Many users say that they don’t want the content to be transmitted to the cloud when they participate in important confidential meetings. The offline transcription mode of Xunfei Intelligent Recorder is based on the user’s needs, fully considering the security and stability requirements of users in the financial, legal, journalist and other industries. The first research and implementation of the offline function can enable office workers to realize real-time and efficient transcription even when the network is poor or even offline, ensuring that the privacy content is not leaked, fully demonstrating the innovative spirit of the leader, and constantly bringing more convenience and convenience to users’ life and work.

Test of dialect transcription technology in Xunfei Institute

As a company that engraves artificial intelligence voice technology in its bones, Iflytek is almost strict in its technical requirements and pursuit of innovation. It is necessary to make technology keep pace with the update of users’ needs from a more forward-looking perspective.

Discussion on Optimization of Transcription Function of Xunfei Institute

Empowering office with science and technology, boosting workplace advancement with efficiency advantage

We always want to race against time to move forward, but the fast-paced life is full of many distractions, sometimes overwhelming. Whether it’s the boring city noise during the interview, the incomprehensible dialect or the disturbed meeting minutes, people have to stop. Just like the three users shown in the video, their enthusiasm and patience are gradually exhausted.

The reporter interviewed on the street.

Iflytek is committed to using AI voice technology to help users solve difficult problems and benefit more people’s work and life. The 15-meter long-distance pickup can meet the needs of large-scale conference scenes, and the speaker’s words can be accurately reduced in small-voice discussions. Real-time transcription in business negotiations distinguishes speakers, helping users to obtain information quickly and comprehensively, and refining effective content accurately, without worrying about missing details. Let more people get rid of the vacant arrangement, win the efficiency advantage in the office, and become the leader in their own career.

Grassroots workers are visiting the community.

Leading the formulation of industry norms and promoting the sound development of the industry to the world.

In July, 2022, Iflytek jointly took the lead in compiling the industry standard of intelligent recording pen, which was approved by the Ministry of Industry and Information Technology. In the future, the recording pen industry will gradually form a mature industry standard, which will guide the benign circular development of the industry. At the same time, this is also the recognition of the technical strength and market influence of Xunfei Intelligent Recorder.

Everyone wants to be a leader, but without these efforts behind it, it is impossible to support this title. Iflytek has always been committed to leading China’s voice technology to the world, always keeping its technological lead and foresight, allowing innovative technologies to land in the form of available products, allowing technologies to be used by consumers, solving problems for users in various scenarios, bringing them tangible gains, and promoting the sound development of the whole industry. This is the significance of a leader.

Gao Jianqing, Vice President of Xunfei Research Institute

As Vice President Gao Jianqing of Xunfei Research Institute said, "Turning the voice technology that can change the world into a tool that can be used by everyone has become a driving force for more people to move forward." Let artificial intelligence voice technology widely benefit daily applications, and help every user to achieve self-transcendence again and again on the career track!

Small new flat board purchase and use experience

I have always wanted to buy a tablet to chase the vetera, occasionally write a note.Recently, I have to buy a netizen explosive struggle to spend more than 10 billion subsidies. Small pαd 11 inch is 862 yuan, and it is inevitable.

But all the e-products have been purchased in Jingdong, and there are very few a lot of water.But this time I rushed on this low price, I would like to turn over the seller’s various comments, and I found that comments can be.I want to try it.

The order was sent on the third day.Is SF!

The packaging is slightly thin.

Back display configuration

charger

Boot

Clear.Try to put a look of love

It is particularly clear, it is 2K, and the sound quality can also be.Try to install a few applications, very smooth!

Overall, I feel that it is not bad.It seems that I still haven’t turned it!After all, there is a hundred oceans, it is also more satisfied!

What is worth buying app all net shop shopping prices