Secrets: How hackers make a virtual world

Source: Internet
Author: User

"Hacker Introductory Course", "I hacker receive disciple", "Quick catch ' chicken", "teach you to make a simple QQ bomb" ... This is a forum called "China Red Guest Alliance", several popular posts. In the discussion area, "rookie" and "master" have asked a answer, on some hacker technology, skills discussed in full swing.

The "Black Century Net" website is a marked price, each member pays 100 yuan to become the VIP users of this site, and pay 30 yuan to download the system maintenance costs, you can "share to the genuine 2007 gray Pigeon", "3389 batch login tool, let you catch chicken" ...

In search engine input "hacker" two words, hacker software, hacker technology, Hacker forum, hacker website and so on all have more than 4 million search results. Random access to a hacker forum or website, there will be a large number of tutorials and software.

These ferocious hackers, although in the virtual world everywhere, but for computer experts, they are at most only the destruction of the network, compared with the real hackers, far from the difference.

"These are" pseudo hackers, "said a website technical director He Yichao in an interview with reporters. The hackers are called "hackers" or "script boys" in circles. The only difference between them and the average user is that they know the existence and use of some specialized tools. These people do not have the technology, only use the existing tools to sabotage, but the harm is very large-"They want to invade a simple web site, as long as the download of a software, good luck in 15 minutes can be done." ”

The profit of fictitious property gradually appreciates to drive hacker market operation

According to the perennial and hackers of the Network company Security Center assistant general Manager Introduction: With the rapid development of the Internet industry, the number of virtual property network increased dramatically, some popular online games virtual goods began to appreciate gradually. As a result, more and more children start hacking themselves since 2002, most of them under the age of 20. The goal of these young hackers has essentially shifted, from the previous hacking in the online world to Shing into virtual worlds.

Hackers used to be aimed primarily at showing off technology. They often play pranks on the homepage of the site, write "I've been here" a few words and so on. However, now the "hacker", more is the invasion of the site to "hang the horse", that is, embedded in the site Trojan virus, users just browse the site will be poisoned, thus becoming a hacker to make money for a "chicken."

Become the "broiler" user computer, virus software will simulate the operation of the machine, click on a number of specific websites ads, resulting in false clicks and traffic, cheat advertising fees. Usually a single click is a dime, often tens of thousands of to hundreds of thousands of of the computer is controlled by hackers, while clicking on ads, the revenue is very substantial.

"Hanging horse" there is another more common way to make money, namely: computer poisoning, the user's bank password, QQ number, network game accounts and equipment, etc. were stolen, hackers put passwords, accounts, equipment to sell online, to obtain money.

He introduced that users in the input bank, online games and other account passwords, these account passwords will be continuously sent to the hacker rental server. Sent to the server's account password, the jargon is called "letter." A "letter" is an account password.

When a horse receives more letters, it can receive hundreds of thousands of letters a day and a few ten thousand or twenty thousand. Then, hackers will use special washing tools, inventory stolen letters, the game equipment, the beautiful number "wash" out. Take QQ as an example, the washing tool will specialize in the number of Q coins and the beautiful number wash out. If it is 10 dollars above the Q currency, that is, high-quality "letter", 10,000 letters will probably wash out two hundred or three hundred dollars, 10 Q-Coins below, the quality is lower, a letter value of 5 cents, 10,000 is 50 yuan money. Meet the special good QQ number, also will take out separately to sell.

In addition to QQ games, some well-known online game "letter" Price is very considerable, the average of a "letter" of wholesale prices around 1 yuan. The hacker sells the letter channel often is through chats, the forum, 5173, Taobao and so on trading platform carries on the transaction.

Interestingly, the hackers here are "very reputable". In the Chinese hacker base website There is also an advertisement: "The stolen number is actually so simple, do is the virtual business, earning is priceless credibility!" ”

The Network company Security Center assistant general manager said, if the discovery fraud, the buyer will be in BBS, QQ group shout: So-and-so is deceitful, call everyone together do not buy his "letter".

A few days ago, the author pretended to buy a letter, with the net name "100% Love You" hacker transaction, want him to first give a letter test, and then remit money. "100% alone Love You" very angry, tell the author: Buy letters are first to pay before shipment, 50~100 letter from the sale, if there are quality problems can be covered.

At present, the hacker has formed a complete industrial chain, the division of labor is more and more fine, in addition to hanging horses, stolen number of "Script Kid", Chashin, washing letters, as well as training site to write Trojan virus hackers. At the top of the industry chain, they, in addition to the "Script kid" needs to write a price of about five thousand or six thousand yuan a virus program, but also for scripting kids to provide "kill service." "No Kill service" is to change the signature of the virus, so that anti-virus software identification does not come out. General change a characteristic code to charge hundreds of yuan.

online games for hackers to patronize the hardest -hit

NET game contains huge profits not only achievements Chen Tianqiao, Shi Yuzhu career legend, also accomplished the hacker's huge empire. Today, online gaming has become the hardest hit by hackers and viruses.

According to statistics, 2006 Chinese online game players for 31.12 million people, close to the frequent Internet users of the number of 50%, netizens in the online game of consumption is increasing year in years. At the same time, the emergence of the network of Third-party trading platform for the network game accounts and equipment set up a smooth channel, hackers can be stolen virtual goods quickly realizable, so, online games become hackers focus on the goal.

According to the rising company released "2007 in the first half of the Chinese mainland region computer virus outbreaks and Internet Security Report" shows that in the first half of 2007 intercepted the new virus, Trojans and backdoor virus more than 110,000, the vast majority of these viruses and online games. Among the top ten viruses in the first half of 2007, game-related viruses accounted for 3. The password is stolen, the equipment is looted, has become the most troublesome problem that swims the game player.

Take the Usbkey (American SafeNet authentication) with higher safety factor as an example. Ti Xinhua told reporters that even if the user's computer installed Usbkey, hackers can also be removed through the Trojan horse password. Hackers are disconnected from the user's network, log on with their computer, and take the account's equipment away. While the dynamic secret is known as a password that expires in 5 minutes, the hacker can completely rob the game equipment within 5 minutes.

He believes that the goal of hackers is something valuable--mainly to steal some game accounts and passwords. Still, there are hackers who hack into users ' computers in an attempt to steal important documents and blackmail.

August 15, face-changing master, Andy Lau's master Pengdenghui two e-mail by hackers stolen passwords, and Andy Lau's many personal emails were posted on the internet forum "publicly." Although not suspected of extortion, but private documents by hackers easy to get, or let people Khanyi network security. However, this approach cannot be industrialized, and only a handful of hackers are still using it.

Total 2 page: previous 1 [2] Next page



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.