19-year-old hackers have hacked Internet games to promote firewall products

Source: Internet
Author: User
Tags firewall

To promote the company's firewall product network security experts to become "killer"

Computer genius black out online games

Luo Chun, the boss of a network company in Shanghai, joined three employees to promote the network security products developed by the company, hackers used the technology to launch a one-month denial of service (DDOS) attack (DDOS) on servers related to Beijing Lianzhong Computer Technology Co., Ltd., resulting in millions of losses to Lianzhong. At nine o'clock A.M. yesterday, four criminal suspects, including Luo Chun, were publicly tried in Haidian court.

Event: "black" contacts for products sold

According to the prosecutor's complaint, Luo Chun, the boss of a network company in Shanghai, purchased and rented multiple servers from January 1, April 26, 2007, and cooperated with Li Yichao, an employee, to use Hacker technology, A one-month DDOS attack on servers of Beijing Lianzhong Computer Technology Co., Ltd. has seriously affected the operation of Lianzhong Computer Technology Co., Ltd.'s online game "Lingyu. During this period, Li Yichao, as the deputy manager of the company, contacted the relevant person in charge of the company and took the opportunity to sell the firewall developed by the company to the other party. In addition, the company received a test fee of more than 30 thousand yuan. In response to the problem, Lianzhong invested a lot of manpower and material resources and spent more than a million yuan. On February 1, June 2007, four criminal suspects were detained by Haidian branch for alleged damage to the computer information system.

According to four people, to increase the company's product sales, the manager Luo Chun purchased and rented multiple servers and placed them in the data center located in Shandong, led by Li Yichao, deputy manager, Huang and Bian attacked computer servers of multiple online game operators in Beijing and Hangzhou using DDOS techniques, after a successful attack, the attacker can sell his devices to the attacked Company. Only one of them is connected.

The 19-year-old Li Yichao was the principal offender in the destruction case. He specially invited Li Yichao, according to Luo Chun. In his eyes, Li Yichao is very proficient in business. As a result, after communication, the two sides provided the equipment, Li Yichao began to use the "hacker technology" to attack some online game companies, and then served to promote the company's network security products. Unexpectedly, despite the excellent test results of their products, South Korean shareholders of Lianzhong company would rather spend nearly one million yuan to hire foreign experts and never agree to buy or rent their products. In the end, four people were trapped.

Facebook: "hackers" only have junior high school culture

Although Luo Chun, the boss of the company, was the first defendant in this case, a conversation with the client reporter found that the main character of the hacker was Li Yichao, 19 years old at the time of the incident. In Luo Chun's eyes, this is a talented young man who is familiar with his business. He is willing to invite Li Yichao, a junior high school culture, to work out of the mountains. In Li Yichao's own description, he played a computer at the age of 9, set up his own studio at the age of 15, and developed his game to earn nearly yuan a day ......

After graduating from junior high school, I joined an organization engaged in encryption and decryption, except for the teenagers who sat in front of the computer and did not use excel ", familiar with various attack and defense technologies. In junior high school, his father set a two-hour time limit for installing software on his computer to prevent him from playing games, and the password became the first "deciphering" object of Li Yichao.

Later, Li Yichao, who fell victim to opening a pet shop, joined luochun's company and began to engage in "hacking ". He was always obsessed with computers. He said that he was just a fever and put his smart mind into the wrong place. When talking about computers, Li Yichao is still talking about crimes. When talking about crimes, he just said, "Today is my year in Beijing. This is my sad place !"

Yang Jingwen, Morning Post reporter

Dialog client

"Helping games with security detection"

Reporter: What do you think of your "hacker" behavior?

Li Yichao: I think it's easy to make money. But I am not a hacker, and hackers are all just right. It's called "weird customer", and I'm not "weird customer". I just have a hot mind.

Reporter: The other party did not buy your product, but you are in jail. Do you regret it?

Li Yichao: at that time, I was a little dissatisfied. They didn't trust the products we made, and invited experts. They were also disturbed by us. In addition, I don't think I have damaged their computer framework structure. I just interfered with the front-end network cable. At that time, their game was in the testing phase and may also be explained as I was helping them perform a security test.

Reporter: What are your ideas?

Li Yichao: Today is the first anniversary of my stay in Beijing. This is my sad place and I don't want to mention it any more.

Reporter: What are your plans?

Li Yichao: I still want to use my computer to do something safe, and I will not do anything else. The cost of committing crimes is too high.

Reporter: What is the cost?

Li Yichao: time. I haven't touched my computer for a year. This industry has never been in touch for a year, even if it is outdated.

DDOS attacks: DDOS is a special case of DOS attacks. Hackers attack multiple computers at the same time, causing paralysis of other users' servers. For example, if the server bandwidth is 1 GB, the hacker will send a junk file package larger than 1 GB, blocking the delivery and output of the server, resulting in paralysis of the server. It is reported that DDOS attacks are currently the most common "hacker" cyber crime.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.