Hacker team provides test results modification business

Source: Internet
Author: User
Keywords Hackers claiming
Tags business change company computer customer data group hacker

Absrtact: A website called "hacker group", claiming to use hacker technology, to provide English 46, civil servants and other test results to modify the business, "even the college entrance examination results can be changed in the system", charging 3000 yuan to 15,000 yuan. The website contacts call themselves "Li Qi"

A website called "hacker group", claiming to use hacker technology, providing English level 46, civil servants and other test results modification business, "even the college entrance examination results can be changed in the system," charging 3000 yuan to 15,000 yuan. The site's contacts call themselves "Li Qi", an early member of the "Green Corps", a well-known hacker organization.

Yesterday, a well-known network company North region technical director Li Qi said that the site risked its own name to provide illegal hacking services, he has been to the police.

Claiming an intrusion system to change grades

The website shows that the contact person "Li Qi", profile for the well-known hacker organization "Green Corps" (known as the "Huangpu Military Academy" of China's earliest computer hacking organization. Early members of the original Kirin Network security group Webmaster.

Yesterday, the reporter to contact the customer identity "Li Qi." A man with a southern accent says he is a hacker Li Qi. Customers to provide personal information and test type, network personnel through the invasion of the college entrance examination system and the computer systems, to modify the results, "even if the examiners do not have a reference, technicians can also add information." ”

To prove the credibility of the "Li Qi" back to the reporter sent a few computer background screen, said the backstage department of Tsinghua University, Jilin Universities and other universities.

Accused of "Lee Ghost" for profit

"Steal my name and do the illegal work." Yesterday, the original Kirin network security group Webmaster, is currently a well-known network of the northern region, technical director Li Qi angrily said.

In 1999, he said, he registered a non-profit web site, named Kirin Network security group, to Exchange Network security and then log off the site.

Recently, Li Qi found that the site has not changed, the content also embezzled their personal data for publicity. At present, Li Qi has reported to the Haidian police.

Li Qi, a member of the Kirin Network security group, confirmed that he was from Beijing without a southern accent. "Li Qi has a certain influence in the network security circle, which may also be one of the reasons for the other person to impersonate him. Mr. Fu said.

Relevant departments will investigate

Reporter found that Beijing new network Digital Information Technology Co., Ltd. (hereinafter referred to as "new network") for the site to provide services to domestic users. The company's customer service personnel said that the site was queried through a new network of agents registered, through the new network to connect to the United States server, the registration of users registered in Guangzhou.

Yesterday, China Internet Network Information Center, the National Domain Registration Service Complaints Center personnel said the site announced that the provision of performance modification services suspected of breaking the law, they will contact the relevant departments to investigate the matter.

Response

Tsinghua Double Management Tamper proof performance

According to the website claiming to have invaded Tsinghua University computer backstage, yesterday, Tsinghua University computer and Information Management Center personnel said that the school's information security maintenance is very rigorous, hacker intrusion system modification results are unlikely. In addition, the Office of Information Management and artificial verification of dual management, even if the results of the system is maliciously modified, the academic office and the Institute of multiple checks will identify problems.

Ask

Can hackers really change grades?

Online Search "Hacker modification results", there will be a large number of companies and individuals to provide this service.

This May, Fengtai court sentenced "Meng Lingjian use Trojan Horse program to change the computer certificate" case. December 2008, Beijing Education Examination Institute temporary personnel Meng Lingjian, using Trojan virus program, entered the Beijing Education Examination Institute online Certificate Inquiry system, through remote operation, for candidates to add computer grade examination certificate.

According to Xinhua news agency, a few days ago, Jinan police cracked new counterfeiting fake case. The suspect takes the hacker attack means, invades the national education website and many colleges and universities website, directly adds the various qualifications data which the buyer requests to the inside, then sells the false certificate.

"Technically, it is possible to invade the Ministry of Education's website to modify and add data." "But hackers always leave an intrusion record," says a number of people involved in computer security research. Unless the technology is very high master, can almost modify without leaving traces of the current China's network security can not guarantee foolproof.

Li Qi and other professionals said that because some of the examination institutions of the server perennial online, very vulnerable to covert attacks and security threats, the examination institutions can be divided into the network module management, according to the work of each module different, take appropriate measures to reduce risk.

Secret

The black industry chain is profitable

"Hacking is like a gun, and the police hold it in hand to keep people safe, and criminals get guns to sabotage." Li Qi said he was responsible for the maintenance of network security for a number of important organizations. The main work is "authorized penetration test", similar to hacking, but the premise is to get the customer's authorization, and never sabotage, the purpose is to discover the technical vulnerabilities of customer sites and to improve. Li Qi and other people are called "white" or "Red guest".

A number of industry insiders revealed that the current hacker groups are mainly divided into three kinds: a kind of non-registration private group, with stragglers, money-laundering as the main business, the other is a company registered in the name of civil society, mainly to do hacker training, and another is a commercial espionage, employed by people to steal competitor information.

"The hacker group exists, mainly has the huge profit space." Large business intelligence, an order of up to more than 1 million yuan. Small number of Internet thieves, although the amount is small, but a large amount, the profit is still rich. Industry insiders say.

National Computer network Emergency Technology Processing Coordination Center deputy Chief Engineer Du Yuejin has said that the 2006 network Black Industrial chain of about 238 million yuan, resulting in losses of 7.6 billion yuan, 2009 is a breakthrough of 10 billion yuan.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.