The intermediary transaction SEO diagnoses Taobao guest stationmaster buys the Cloud host technology Hall
Hackers are not "disruptive", but hackers who act as "intruders" have formed huge industrial chains with annual revenues exceeding 200 million yuan.
International Herald Herald reporter Yu Dong from Beijing "In fact, I used to be a real hacker." "The 33-year-old Zhan Kaike said. He used to be a programmer at one of the country's leading cyber-security companies, claiming to be "adept at challenging technological limits with intelligence in cyberspace". However, with the wide use of the Internet in the business world, hackers who only pursue free exploration without any damage to the technical Knight Spirit is going to decline, the real business interests of the drive began to change the environment of the hacker.
"I am becoming a wreck from a builder. "It's embarrassing to talk about it," Zhan Kaike. He now relies on selling malicious hacking software, phishing, and other means to earn millions of dollars and pay for his expensive golf-year tickets.
However, this is only the tip of the iceberg. According to the National Computer Network Emergency Center estimates, the current "hacker industry" the annual output value of more than 238 million yuan, resulting in losses of up to 7.6 billion yuan. This reporter investigation found that the huge underground industry behind a little-known industrial chain.
Thief: "Hang a horse" steal valuable information
In the eyes of hackers, any system will have loopholes, but the use of Trojans to successfully sneak into other people's computers, steal private information but also have a lot of trouble--and this is just to show off technology? In fact, the Trojan program behind the hidden enormous economic benefits.
"With the development of the Internet industry, online banking, game passwords and other valuable information is becoming the preferred target of illegal hackers." "The Hu Shansheng researcher, chief scientist of the Network Security Laboratory of the Institute of High Energy Physics, the Chinese Academy of Sciences, told the International Herald leader that the key step of this network intrusion is the Trojan horse program, which is called" Hanging horses ". Illegal hackers usually have security vulnerabilities in the website of the Trojan Horse program, indirectly transmitted to the viewer.
In addition, the sending of spam, the use of Instant messaging tools and Third-party software, hackers are the main way to insert the Trojan program. "These Trojans, once implanted in a computer like a mouse, open the door after a hole in the house and let the hacker come in and steal all the valuable information."
An official of the Ministry of Public Security's Network Safety Supervision Bureau disclosed to this newspaper, at present, through the hacker way steals the valuable information the network crime phenomenon has presented the group trend. December 16, 2007, Jiangsu Police successfully cracked the "3 5" large online bank theft. The group's 8 members are online as virtual identities, although unidentified each other identity, but with close, the division of labor is clear: someone made Trojan virus, someone responsible for collecting information, some people based on information to make bank cards, and some people withdraw cash, collect stolen goods, in less than a year in total theft of RMB more than 3 million yuan.
In addition to bank account information, a higher level of QQ numbers, online game accounts and other virtual property is the target of hackers coveted, this is a low-level retail market. The senior hackers sent the stolen valuable information to the retailer in bulk, in the jargon "envelope". Then, the retailer will be these QQ numbers, network game accounts through BBS, e-commerce sites, such as channels sold, earning tens of thousands of yuan a month is very easy.
Businessman: "Sell gun" selling tools for profiteering
Trojan Horse program, is illegal hackers steal valuable information important tools, natural priceless. This has spawned another large group of hackers-selling guns.
"Gun sellers are a group of advanced hackers with the ability to write viruses that make hacking tools and sell them to downstream buyers," he said. Hu Shansheng said that 2007, endangering the domestic millions of people and enterprise users network security "Panda incense" virus manufacturer Li June, daily income near million, after the crime has profited tens of millions. Li June mainly relies on selling "Panda incense" virus code to profit.
Recently, a report from the National Computer Virus Emergency Management Center also exposed the rampant market of hacking tools. Peddling "web horse Generation Tools", "black spider web Silver Interceptor," Machine Dog generator "and other hacker tools ads flooded with many software download sites, trading methods are very flexible, online banking, mobile phone messages, QQ coins are exchange tools; In addition, the hacker tool's" after-sale technical support is also very complete ", Even a lot of hacker community open the source code of the program, encourage hackers to communicate with each other, improve, to achieve the upgrade of hacker products update.
Goodfellas。 "Selling guns" not only pay attention to advertising marketing, but also set up a variety of rules. To learn from the "Panda burning Incense" virus maker Li June peddling Trojan horses and causing a massive outbreak of the virus, today's "gun sellers" mostly claim to be able to customize hacking tools and ensure that a tool is sold only to one customer.
In this respect, the Public Security department in May, a case report revealed that a public production and sale of Trojan Download website promised: "The old version of the Trojan Defender series generator price of 1000 yuan, the generator a buyout, not responsible for updating, we can give you custom-made generator." Only sell one, after the sale of this series of software we will never do updates and sales. ”
Killer: Hackers hired as cyber killers
Compared with the "thief hackers" who specialize in stealing valuable information on the Internet, and the "gun sellers" who peddle hacker tools, some of the hackers are less peaceful and they are becoming "Internet hire killers".
May 19, from 21:50 to 24 o'clock, Jiangsu, Anhui, Guangxi, Hainan, Gansu, Zhejiang and other 6 provinces and a rare event, a large number of Internet users can not normally visit the website. Subsequently, the Public security organs criminal detention of 4 suspects.
There is a hacker-crime fact behind the blackout: some businesses are employing hackers to launch cyber attacks to crack down on rivals. And these hackers are not individual combat, they often hijacked a large number of infected computers, known as the "chicken", together to launch large-scale hacker attacks. Perhaps, inadvertently our personal computer may degenerate into "broiler", become the "springboard" of hacker attack.
Hackers hit the internet. There are experts to describe the hacker's DDoS attack mode: Hackers with a large group of people (infected with the computer) came to the House (Internet) to block the door, so that the people inside the house can not get out, so that outside people can not go.
After verification, the network event is the fault of the net game of the market. A network server that is set up after an improper access to a game server-side installation program without the permission of the copyright owner. In this respect, 360 security expert Dr Shi Xiaohong used the university's peripheral "stolen car gangs" to explain the phenomenon: many people in college have lost the bicycle experience, and then to buy second-hand bicycles, and this increasingly large demand, and gradually spawned a professional "car theft gang." Relative to the "robes", the "private" is not only cheap, but also easy to upgrade, illegal hackers are using online gamers to rush and covet cheap psychology, set up a "private". As a result, a variety of web sites, plug-in, Pilfer number studios continue to emerge.
These "servers" because of the conflict of interest, mutual offensive phenomenon is very common. Some insiders said that some of the strength of the "illegal" each month will spend 2 million or 3 million yuan to combat competitors, "according to the black market price of one hours within the 1G attack flow price of 60,000 yuan."
Coincidentally, the business area outside the network game also exists the phenomenon that employs hacker to attack each other. Last July, Shandong Weifang Two logistics companies because of the existence of commercial competition, a company for the seizure of customer resources, employing hackers using DDoS means large area of intrusion network computer, has led to 400,000 netcom users one months can not normal internet.
Teacher: Hacker training is also a cash cow
"Many hackers have a yearly salary of millions, they often appear in golf courses and other high-end entertainment, or even go abroad to participate in a variety of hacker exchange activities." "It is this high income and luxurious life that make a huge appeal to young people," Hu Shansheng. Therefore, a variety of "hacker training courses" operating and life-hacker training is also a cash cow.
These "hacker training course" Teaching content almost contains a variety of viruses, Trojan production technology and a variety of network attack technology, training prices from hundreds of yuan to nearly million. "Hacker training class" classroom is entirely dependent on the network, reporters in Google and Baidu and other well-known search engines, input "hacker technology", "hacker training" and other keywords can be clicked on nearly hundreds of hackers training website.
Especially noteworthy is that many hacker training sites are using the "MLM" organization model: Advanced hackers successfully trained "apprentice" after the arrangement of "Apprentice" development of the line, the organization is very strict. It is revealed that the average hacker website annual income at least between 2 million yuan to 5 million yuan.
Compared with the massive hacker training website, those QQ group is the Pattern hacker training course appears like stragglers, but the number is numerous. The usual mode is: the formation of a QQ group, the Trojan Horse software in space, students can download at any time, and ask the group of owners. This "hacker simple classroom" charge is relatively low, usually only need hundred yuan or so.
More than that, hackers have a fifth way to do it. There is a class of hackers to accept business employment, using technical means to network users to push all kinds of spam ads, although the harm is not small, but wasted the user's time, but also caused the waste of network resources.
Any hacker action has a flaw.
Undoubtedly, this gray hacker industry chain is devouring the internet economy. "But not all hackers are destructive, and many hackers are technology enthusiasts," he said. Hu Shansheng explains that many hackers silently observe professional rules: "Do not maliciously destroy any system, do not modify any documents, do not damage or modify the host of government agencies," and so on.
While the western countries in the legislation to crack down on hacker crime, but also show a tolerant attitude towards hacker culture. According to the introduction, in 2001, the United States government issued a number of laws prohibiting hacking, some members said that "the spirit of free exploration against hackers and the democratic spirit of the United States is not conducive to maintaining U.S. it technology leadership."
Yahoo, the United States, has repeatedly held "hacking open day" activities, and even allow hackers to arbitrarily repair the Yahoo online system, including the world's popular Yahoo free mailbox, and the best among them. "The company wants to remain open and innovative, but we know we can't come up with all the good ideas," said David Fillo, one of Yahoo's founders. Hackers, take your good ideas. ”
However, both at home and abroad, the hacker industry chain is not only large, but also a new trend of collusion with traditional criminal gangs. Western countries mostly adopt the technology, law and Internet security economic model three-pronged approach to governance.
In this connection, Hu Shansheng said that China, in addition to actively promote the development of the market-oriented anti-virus service industry, the relevant technical departments are also developing "computer evidence acquisition system" for hacker crime investigation to provide technical support, after all, "to ungrateful, conceal." Any hacker action is bound to leave traces. "
[Daily debate] The hacker road, the Great temptation, you will take the risk?