Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest stationmaster buy cloud host technology Hall
Invade the country tens of thousands of computers, illegal profit more than 2 million yuan of the Yangzhou giant Trojan horse case before the verdict, Shaoming and other 15 defendants were Yangzhou Guangling District court to damage computer information system, sentenced to 6 months to 1 years, 6 months imprisonment.
In April 2008, Yangzhou Netizen Xiao Li, while playing computer games, downloaded a program claiming to improve the speed of the game, and then the computer screen jumped out of many web sites that could not be turned off.
When Xiao Li opened the computer again to enter the game, found that the game account of thousands of of the equipment all evaporated, then the alarm.
In the previous, Yangzhou police have received more than 10 consecutive similar alarm. Police have found that this is a kind of "bole" Trojan virus in mischief, behind the Black Hand is a production, sales "Bole" and other viruses network criminal organizations, they hired hackers to write Trojan horse program, and then put it on the internet to sell, used to steal the game player's account and password. After tracing, around July 2008, 15 suspects were arrested successively.
Court to find out, from August 2007 to July 2008, do IT business Shaoming found that selling network game accounts and equipment, etc. can make money, then hired Zhou Junxian and other people to design, development for stealing network game account information more than 20 kinds of Trojan program, to the offline sales and spread, To get the game player's account number and password, and then online to sell profits. Before the incident, the criminal gang total invaded tens of thousands of computers, profiting more than 2.15 million yuan. The court holds that, Shaoming and other people deliberately produce, sell, spread computer viruses and other destructive procedures, affecting the normal operation of computer systems, serious consequences, all constitute a crime of computer information system damage, and then make the above judgments.