How hackers make a wealth from the virtual world

Source: Internet
Author: User
Keywords Password hacker through game

The intermediary transaction SEO diagnoses Taobao guest stationmaster buys the Cloud host technology Hall

"Hacker Introductory Course", "I hacker receive disciple", "Quick catch ' chicken", "teach you to make a simple QQ bomb" ... This is a forum called "China Red Guest Alliance" several popular posts. In the discussion area, "rookie" and "master" have asked a answer, on some hacker technology, skills discussed in full swing.

The "Black Century Net" website is a marked price, each member pays 100 yuan to become the VIP users of this site, and pay 30 yuan to download the system maintenance costs, you can "share to the genuine 2007 gray Pigeon", "3389 batch login tool, let you catch chicken" ...

In search engine input "hacker" two words, hacker software, hacker technology, Hacker forum, hacker website and so on all have more than 4 million search results. Random access to a hacker forum or website, there will be a large number of tutorials and software.

These ferocious hackers, although in the virtual world everywhere, but for computer experts, they are at most only the destruction of the network, compared with the real hackers, far from the difference.

"These are" pseudo hackers, "said a website technical director He Yichao in an interview with reporters. These hackers are called "hackers" or "script boys" in circles. The only difference between them and the average user is that they know the existence and use of some specialized tools. These people do not have the technology, only use the existing tools to sabotage, but the harm is very large-"They want to invade a simple web site, as long as the download of a software, good luck in 15 minutes can be done." ”

The profit of fictitious property gradually appreciates to drive hacker market operation

According to the perennial and hackers of the Network company Security Center assistant general Manager Introduction: With the rapid development of the Internet industry, the number of virtual property network increased dramatically, some popular online games virtual goods began to appreciate gradually. As a result, more and more children start hacking themselves since 2002, most of them under the age of 20. The goal of these young hackers has essentially shifted, from the previous hacking in the online world to Shing into virtual worlds.

Hackers used to be aimed primarily at showing off technology. They often play pranks on the homepage of the site, write "I've been here" a few words and so on. However, now the "hacker", more is the invasion of the site to "hang the horse", that is, embedded in the site Trojan virus, users just browse the site will be poisoned, thus becoming a hacker to make money for a "chicken."

Become the "broiler" user computer, virus software will simulate the operation of the machine, click on a specific website ads, resulting in false click rate and traffic, cheat advertising fees. Usually a single click is a dime, often tens of thousands of to hundreds of thousands of of the computer is controlled by hackers, while clicking on ads, the revenue is very substantial.

"Hanging horse" there is another more common way to make money, namely: computer poisoning, the user's bank password, QQ number, network game accounts and equipment, etc. were stolen, hackers put passwords, accounts, equipment to sell online, to obtain money.

He introduced that users in the input bank, online games and other account passwords, these account passwords will be continuously sent to the hacker rental server. Sent to the server account password, jargon is called "letter." A letter is an account password.

When a horse receives more letters, it can receive hundreds of thousands of letters a day and a few ten thousand or twenty thousand. Then, hackers will use special washing tools, inventory stolen letters, the game equipment, the beautiful number "wash" out. Take QQ as an example, the washing tool will specialize in the number of Q coins and the beautiful number wash out. If it is 10 dollars above the Q currency, that is, high-quality "letter", 10,000 letters will probably wash out two hundred or three hundred dollars, 10 Q-Coins below, the quality is lower, a letter value of 5 cents, 10,000 is 50 yuan money. Meet the special good QQ number, also will take out separately to sell.

In addition to QQ games, some well-known online game "letter" Price is very considerable, the average of a "letter" of wholesale prices around 1 yuan. The hacker sells the letter channel often is through chats, the forum, 5173, Taobao and so on trading platform carries on the transaction.

Interestingly, the hackers here are "very reputable". In the Chinese hacker base website There is also an advertisement: "The stolen number is actually so simple, do is the virtual business, earning is priceless credibility!" ”

The Network company Security Center assistant general manager said, if the discovery fraud, the buyer will be in BBS, QQ group shout: So-and-so is deceitful, call everyone together do not buy his "letter".

A few days ago, the author pretended to buy a letter, with the net name "100% Love You" hacker transaction, want him to first give a letter test, and then remit money. "100% alone Love You" very angry, tell the author: Buy letters are first to pay before shipment, 50~100 letter from the sale, if there are quality problems can be covered.

At present, the hacker has formed a complete industrial chain, the division of labor is more and more fine, in addition to hanging horses, stolen number of "Script Kid", Chashin, washing letters, as well as training site to write Trojan virus hackers. At the top of the industry chain, they, in addition to the "Script kid" needs to write a price of about five thousand or six thousand yuan a virus program, but also for scripting kids to provide "kill service." "No Kill service" is to change the signature of the virus, so that anti-virus software identification does not come out. General change a characteristic code to charge hundreds of yuan.

Online games for hackers to patronize the hardest-hit

NET game contains huge profits not only achievements Chen, Shi Yuzhu career legend, also accomplished the hacker's huge empire. Today, online gaming has become the hardest hit by hackers and viruses.

According to statistics, 2006 Chinese online game players for 31.12 million people, close to the frequent Internet users of the number of 50%, netizens in the online game of consumption is increasing year in years. At the same time, the emergence of the network of Third-party trading platform for the network game accounts and equipment set up a smooth channel, hackers can be stolen virtual goods quickly realizable, so, online games become hackers focus on the goal.

According to the rising company released "2007 in the first half of the Chinese mainland region computer virus outbreaks and Internet Security Report" shows that in the first half of 2007 intercepted the new virus, Trojans and backdoor virus more than 110,000, the vast majority of these viruses and online games. Among the top ten viruses in the first half of 2007, game-related viruses accounted for 3. The password is stolen, the equipment is looted, has become the most troublesome problem that swims the game player.

Take USB (American SafeNet authentication) with higher safety factor as an example. Ti Xinhua told reporters that even if the user's computer installed USB, hackers can also be removed through the Trojan horse password. Hackers are disconnected from the user's network, log on with their computer, and take the account's equipment away. While the dynamic secret is known as a password that expires in 5 minutes, the hacker can completely rob the game in 5 minutes. #p # Paging Title #e#

He believes that the goal of hackers is something valuable--mainly stealing some game accounts and passwords. Still, there are hackers who hack into users ' computers in an attempt to steal important documents and blackmail.

August 15, face-changing master, Andy Lau's master Pengdenghui two e-mail by hackers stolen passwords, and Andy Lau's many personal emails were posted on the internet forum "publicly." Although not suspected of extortion, but private documents by hackers easy to get, or let people Khanyi network security. However, this approach cannot be industrialized, and only a handful of hackers are still using it.

The regulatory dilemma of hackers

No. 286 of the Penal Code stipulates that the intentional production, dissemination of computer viruses and other destructive procedures, affecting the normal operation of computer systems, the consequences of serious, five years imprisonment or criminal detention, the consequences of particularly serious, more than five years in prison.

The above-mentioned network Company Security Center assistant general manager told the reporter, "Although the legal stipulation has, but the user does not cooperate, is also the fight hacker process one difficulty." "A hacker may have stolen hundreds of user's password account, but each user also lost hundreds of yuan." Many password accounts have changed hands many times, it is difficult to confirm whether the user was stolen, and who was stolen. When the case is solved, it is difficult for the departments concerned to find these users and collect evidence. is to find, some users are afraid of trouble, and worry about retaliation.

In addition to the lack of legal regulation, the change in the way the hacker industry manages poses problems for regulation. The hacker industry from the first two years of "corporate" management mode, began to "market" type of decentralized mode of transformation.

Corporate management can make the hacker industry bigger, the corresponding risk is also big, easy to be sweep. The "market" type of decentralized way, is a yell, "Who wants to buy my letter?" "Someone will take over."

The hacker's organizational relationships are not very close, he argues, and a criminal process is carried out by a lot of dispersed hackers. In the past, as long as an abortion of a company, you can solve the case, the crime must now be the process of an abort all the links.

In the past, the police can find criminals only by IP. Now, hackers to avoid police tracking, no longer leased line. They changed in the Internet café, often changing places, it is difficult to find. In the past two months, hackers have spawned a new division of labor, which is specialized in attacking foreign websites and stealing foreign IP. Many hackers now have IP addresses in Korea or Japan.

What can the online gaming company do?

According to the game company 17GAME staff Introduction, after the game account is stolen, the complete recovery process is this: the player discovers is stolen-fills in the application form-the technical department passes through the technical analysis, confirms that the stolen number is true-freezes the player's account-the analysis processing result reports to the company related leadership- According to the leadership of the company to determine the approach. The process generally takes four days. The company recently launched a "service-month" campaign, which can be shortened to two and a half days.

"The technology of stealing and anti-theft is developing at the same time. said the staff member.

It is reported that the hardware security is in recent years, the network bank to ensure the safety of users to launch a high-level secret insurance measures. A company has introduced a hardware random password generator that can generate a new, reusable dynamic password every minute, in combination with the original static password. The use of this security, users can be a certain amount of protection of the account.

Shanda as the largest online gaming company, has more than 500 million registered users. Shanda spent tens of millions of yuan to establish its own technical support system, the country has nearly 20,000 servers, all the user data collected. So that each user's game behavior is traceable.

Can the third trading platform supervise the source of virtual goods

"Hackers too rampant", "blood" of the players Mr. Zhang value thousands of equipment was stolen, 20 minutes to find the hackers blatantly in the 5173 sale of the equipment, mentioned two months ago the experience of the stolen number Mr. Zhang is still very angry. Mr. Zhang immediately dials 5173 on the network alarm phone, "toss for four or five hours, also did not succeed", finally he had to spend 800 yuan himself to buy back.

In fact, in 5173, Taobao, ebay and other online trading platform, the illegal access to the QQ number, game currency, game equipment transactions often staged, but these illegally obtained virtual objects hidden identity.

Reporters in these online trading platform to see some large-scale sale of game money, game equipment merchants, selling goods, many are the spoils of hackers. Because, a normal game player, absolutely no experience and strength at the same time in a variety of games to create so many game coins and equipment. To improve the existing model of network trading platform, cut off the black hand of the fence, is an important work link to combat the industrialization of hackers, without the direct impact of the interests, the myth of the matrix will be self-defeating.

At the end of last year, the Shenzhen Public Security Bureau cracked up the largest Internet virtual property robbery in the country. From May 2005 to July 2006, the criminal gangs to steal QQ numbers and game accounts, equipment more than 3 million (sets), up to one day stolen number 30多万个, through the Taobao station shot profit more than 700,000 yuan. Stolen QQ number, Q-coins through the Taobao station sales arbitrage, but also to Tencent and Taobao two companies between the relationship cast a heavy shadow.

Stolen virtual Goods sold on their own platform, as a Third-party trading platform for the head of the "fence" hat, the attitude is almost consistent: The network platform is difficult to identify the sale of virtual goods is legitimate, we do not have the responsibility to monitor the source.

"We're just a network intermediary, and only the official website of the game operator can tell if the game is legit." Otherwise, buyers and sellers a willing to buy, a willing to sell, we can not interfere. "China's largest gaming service website 5173 of customer service personnel told reporters, although the source of virtual goods can not be judged, their website or to prevent the game account password stolen and efforts." Sellers from 5173 Web site to pick up a game ID, with this ID to practice level, if ID stolen, the site can be saved by the seller to help retrieve information, but the number of applications in this way ID not much.

    Taobao PR manager Louviching that the third party platform does not have the right to deprive the user of the right to sell the banned goods. "For items that are sold on Taobao, if they can prove to be illegal, we will take a stand against the items we sell, and punish them in a serious way," he said. If the relevant amount is reached, we will contact the local Public Security Bureau and ask them to intervene. The

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.