"A student less than 20 years old, online hanging horse steal QQ, one months of income has more than five digits!" Guangzhou's "hacker Wen" found the reporter said so. Hacker's intention is very simple, he bufen the past advocates of freedom "hackers" are gradually becoming the pursuit of interests, participation in the crime of "hacker." The cyber-crime industry, built by these hackers, is growing more powerful and attacking any "act" that is intended to stop it.
In the Saturday, on behalf of 17 stolen QQ netizens and Tencent to negotiate the Guangdong public Interest litigation network suddenly attacked, once paralyzed 5 hours. J, a lawyer at the law firm, which specializes in such lawsuits, told reporters that virtual crime on the Internet is often considered far away. In fact, from its acceptance of the case, virtual crime has already been in line with the reality, and form its own operating system. In a recent credit-card fraud he had received, the credit card information used by criminals was stolen from the internet by a Guangdong hacker.
More and more young people are involved in cyber crime
According to the hacker text guidelines, the reporter found a guangzhou teenager "hacker" blog. On this public blog, the less than 20-year-old young hackers, the brain has no "crime" concept, calm in the log briefly recorded their participation in the online horse theft QQ After the income situation: "From the monthly income of 1500 yuan (mother to the) to 30,000 yuan." ”
Hacker Wen said that with the network fee era and more and more network trading platform construction, the online black industry has already formed a chain. Hackers by hanging Trojan and other background virus, the theft of tens of millions of personal information, such as QQ number, game account, game currency, credit card information, etc., in the classification and sampling, production into various types of "envelopes" (such as QQ envelopes), sold to middlemen, intermediaries through the online trading platform to sell to the needs of "customers." And it is because of a large number of hacker software sales, so that the theft of personal information technology requirements significantly reduced, more and more young people in the interests of the temptation to participate in cybercrime.
Help netizens find QQ but be hacked
In Guangzhou Zhujiang New Town, the reporter found the Guangdong Public Interest Litigation network in charge of is Liu Hua. Is Liu Hua said that these days, they have been helping 17 lost QQ number of netizens and Tencent company, and with the help of volunteer lawyers, issued a letter of attorney, asking Tencent to return the 17 QQ number. Although the current situation, Tencent has explicitly rejected such a request. But the behavior of public interest litigation network obviously angered a lot of hackers, so, in the Saturday, the Guangdong Public Welfare lawsuit network was invaded by hackers, and once paralyzed for 5 hours. Hackers in the change of the lawsuit network on the main page of the public message to: XX you, but also help others find QQ, first of all the safety of their own website to say. ”
"Did you call the police?" "In the face of reporters ' inquiries, is Liu Hua said with a wry smile," they do not feel like such an event will be the result of the alarm. In fact, in the help of netizens agent QQ complaint cases, they repeatedly encountered Tencent company and network supervision departments buck each other. In fact, from the legal point of view, the QQ number itself does not have any value, but the attendant losses are very large. The material has membership fees, game equipment and Q coins, and immaterial things include wedding photos, business customer contacts, and important personal files on the network's hard drive.
Credit card information 400 Yuan/GB hawking
The volunteer lawyer J of the public Interest lawsuit Network has entertained many lawsuit cases of network crime.
Just this June, J has just completed a case of a large credit card fraud. J told reporters that one of the heads of the case was a young man from Huizhou, Guangdong province. This person is a rather typical "envelope" seller, online person "top Fox". 2006, he produced a "top Fox downloader" software, put on the network for people to use. But in the "downloader", but there is another hidden in the name of "Top Fox stuttering" Trojan software. Once users use the "Top Fox Downloader", hidden in which the "Top Fox Stammer" will sneak into the computer, the user will continue to send personal information to the creator designated cyberspace. And part of the Trojan horse software slightly different is, "Top Fox Stammer" has recorded the function of keyboard percussion, so, in the sale of "envelopes", it contains a number of online bank accounts and passwords. At first, the "Top Fox" was the only way to sell such "credit card envelopes" at 400 yuan/GB to the middleman Venus. In the 2007, Venus met the counterfeit credit card criminals fleeing the Yongjiang, virtual crime quickly and reality, and created a high priority for the Ministry of Public Security "3 5" mega Online bank theft case. Among them, "top Fox" is responsible for separating the net silver information, Venus is responsible for turnover, Yongjiang use such information to make counterfeit bank card after going to the bank to take money, total theft seven times, steal more than 1.4 million yuan, from the more than 400,000 yuan, to the accomplice more than 1 million yuan.
What is QQ envelope
QQ envelope is a special noun of QQ black market. QQ envelopes-like in many QQ trading forum will see these words, the so-called QQ envelope is hackers through illegal means (put Trojan, invade other people's computer, steal LAN information) to get the QQ number and password, in million units saved information text.
The envelope is divided into one hand envelope (the original, the hacker will steal the QQ number and password without any tools, random storage), second-hand envelopes (has been the hacker tool to take out the value of the number, the remaining number) and N-Hands envelopes.
Wash the letter--through some hacker tools, the first letter in the value of the number (there are QB, unprotected beauty, 5-bit, 6-bit Liang, etc.) filtered out of the process.
Death-protection number-a password-protected number that forgets a password-protected answer because it is too long.
Hash--The number of QB that is not an integer.