China's largest net silver theft case broke: 40% suspects is a

Source: Internet
Author: User
Keywords Sue broke suspicion the nation's largest people are
Tags .net alipay anti- anti-virus software bank transfer broke case broke change
"God Horse is a cloud" is a network popular language, and 20-year-old program writer Gao Yang but it used as a new Trojan virus name. In just two months time, this horse "God horse" spread across the country through QQ rampage, stealing nearly hundreds of victims net bank account funds, involved in the amount of up to more than 10 million, created the country's largest network of silver theft gang case. Recently, Xuzhou City, Jiangsu Province Public Security Bureau Network Police Detachment cracked the theft case. This powerful "God horse", eventually become a network of eye clouds. This reporter Wang Qiuxi this newspaper map will be enthusiastic netizens sent mysterious documents this March 22 night, the family lives in Jiangsu province Xuzhou Wang as usual, operating his own Taobao shop, in his and customers in the online bargaining, QQ jumped out of a dialogue window, a nickname called "I Love Taobao" Netizen claiming to know the company's people pat, can help Mr. Wang brush Pat shop reputation. Mr. Wang was a little skeptical at first, but as the conversation deepened, he gradually felt the sincerity of the other person's words and slowly relaxed his vigilance. Seeing Mr. Wang enter his trap, the stranger sent a software package online to Mr. Wang, saying that the new rules are within the package. Mr. Wang did not want to click to receive this software package, at the same time unfamiliar netizens "inadvertently" to tell Mr. Wang, now Alipay has preferential activities, recharge 100 to send 30, very cost-effective, and only that night. At this time Mr. Wang has completely believed this netizen's words, he immediately employment line online bank to his own Alipay account dozen money, the first hit 2000 yuan, computer screen suddenly jumped out a few words "giant account recharge success", but the query Alipay account, found that the recharge did not succeed. Mr. Wang knows that giants are online game accounts, but they never play games, how can they recharge to the giant network account? He did not know what had gone wrong. But the feeling is bad Mr Wang looked at his bank account, which he was stunned: his bank account of more than 30,000 yuan in cash, was transferred to the giant network account into the game currency. The next morning, he ran to the precinct of the police station to report his sweat. New virus can change the amount of the background after the DA Tun Public Security Bureau and Xuzhou Public Security Bureau Network Police Detachment of the joint investigation found that the criminal suspect to send "clap new rules" for the name, the actual sent to Mr. Wang is a kind of "cloud" of the new Trojan virus. The virus, in the course of the victim's use of net bank transfer, secretly intercepted the bank transfer information in the background, and, without the victim's knowledge, secretly transferred the money from the victim's net bank to the game account designated by the suspect. In addition to having a general net silver theft Trojan function, "floating clouds" Trojan is more covert, and even can avoid anti-virus software scanning, and according to the bank card funds, change the amount of money stolen. The whereabouts of Mr Wang's money is the only breach of the case. In accordance with the clues provided by Mr. Wang, the police force will soon lock the suspect's position in Weihai, Shandong province, by analyzing and tracing the victim's capital flow. Get thisInformation, March 31, the police will again be ready to commit the crime of two suspects Lin and Wang MoU captured. Rent "horse" people pull out theft gang according to Lin MoU confessed, in early 2011, he met a netizen in a hacker group "GG", "GG" taught him to use the sending "cloud" Trojan software, to control the victim online Bank payment, change payment address, theft of other people's net Silver card cash, And the price of 3000 yuan per month to the Trojan virus rental to him. Wang is mainly responsible for contact shop users, in a variety of ways to trick users into the implementation of the stallion, stolen funds and forest a split. The police found that the "cloud" Trojan theft gang main members of nearly 60, the role of the gang members of the division of labor is extremely meticulous, from the Trojan author, to be responsible for the modification of viruses to avoid killing anti-virus software kill personnel, as well as renting Trojan Money "package horse", specifically to lure the victim to the bait "pull single" and after the successful washing card people, Each member has its own clear role. Gang members were all arrested in the funds involved analysis, the police found that in less than two months time, "cloud" Trojan case of the victims reached nearly hundred people, the amount of money involved more than 10 million. Xuzhou Municipal Public Security Bureau Network Police Detachment case investigation team captain Zhang Wei told reporters, this figure shows that the "cloud" Trojans and the past computer viruses than more harmful, if not solve the case as soon as possible, the virus may be a geometric progression to spread out, cheat pour more netizens. The police force after one months of data analysis and investigation, successfully captured the Trojan horse, including the author, Baoma, free of murder, including 58 suspects. At present, 41 suspects have been arrested in accordance with the law, cracked more than 30 cases, seizure of the machine 112, bank card 456, the recovery of the victim was cheated capital of more than 3 million yuan. The Ministry of Public Security listed overseeing the country's largest network of silver theft gang case thus broken. -Case characteristics 40% The suspects are all. According to Xuzhou Public Security Bureau Network Police Detachment case investigation team captain Zhang Wei, the case captured criminals show the characteristics of the low age, most of the young, 22 years of age within the 40%. These people's academic degrees, ranging from junior high school to college graduates have, but there is no legitimate source of income, and covet enjoyment, the use of net silver Trojan theft has become their "rich" a shortcut. And along with the network technology development, the Trojan Horse gradually presents the intelligence, the fool's characteristic, "the cloud" Trojan horse through the process real-time monitoring user browser address bar URL, when the user has the payment behavior, this Trojan will automatically read the instruction, then according to the instruction carries on the anti-killing escalation. After the criminals planted the "horse", only need to use the modification tool for simple configuration can immediately implement the theft. A stallion, multiple recharge account to use, can be implemented multiple thefts. Because the Trojan is easy to operate, they also impart experience to each other in the implementation of theft, resulting in the rapid increase of crime members. The criminal member's consciousness of anti-detection is strong although the criminal suspects in this case are not very old, but they have a rich and sophisticated sense of anti detection. They do not use real identity information to hide identities, evade tracing,Immediately after the theft to find someone to "wash the card." The card holder buys the game point card, then sells the game point card to the net swims the company or the game player to become present. In addition, the crime of the collection account number, Third-party recharge and other accounts are more than one case, the frequency of conversion is high, and the location of the crime, the location is not fixed, to the police to trace the suspect brought great difficulty. In the past, cyber-criminals were usually alone, or at most a few people temporarily formed gangs, in contrast, the case of numerous criminal gangs, the source of Trojan author, kill personnel, to the following washing card personnel, package horse personnel, pull single personnel, each level of personnel have a clear role of division of labor, the means of crime are different, very strict organization, And the gang area distribution is wide, from the most northern Heilongjiang to the southernmost end of the Hainan Province have, all over the country 32 cities. -Police suggest that the most vulnerable to the police statistics of the victims of this case found that although the suspect is to send a virus to a specific target to commit the crime, but the victims of the group is relatively fixed, mainly in the online transactions are often internet users this huge group. In addition, like Mr. Wang in the case, some shopkeepers who shop in the online shopping group often become the object of theft. Now some Internet users registered to open shop after the low price transfer shop, these shops are very easy to become criminals posing as shopkeepers to implement theft and fraud cloak. Criminal suspects are generally buy some shop black as "shopkeeper", in the store to upload several cheaper than the market to attract buyers, and then with the buyer online communication, the successful acquisition of the trust of the buyer, then in a variety of ways to the victims of the transmission of Trojan files, Trojans using compressed files, EXL files, pictures and other formats of packaging, many to " Object Map "," Special Offer "," Latest price "," activity rule "and so on to deceive the victim. Guide the victim to plant a Trojan horse can be successful implementation of the theft. In order not to arouse the suspicion of the victim, the Trojan runs, first will pop up a dialog box to confuse the victim, let them feel that they run the program error, will not interrupt the operation. After users pay, the Trojan will also modify the bank to the user's confirmation information, showing the "Payment failure" prompt page, which makes many victims tried again and again, repeatedly stolen, until the money has been paid to find that the money has been into someone else's account. To this end, network alert netizens, chatting on the internet do not trust strangers, especially the active contact with strangers, not to strangers to disclose their own bank card information, the victim in this case is in the process of chatting with the suspect, leaked part of their personal information. Do not click, run the files of unknown origin, in the use of online banking, as far as possible to use the upgraded version, with LED display of the U shield.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.