The running of hacker industry

Source: Internet
Author: User
Keywords Hacker industry
Tags .net abstract company data development group hacker hacker industry

Abstract: "My friend had a good night brush library 6 million profit, the next day bought a sports car to show off." "Chown Group (COG) advocates Li Qi to the morning paper reporter introduced the experience of the hacker rich, Li Qi net name LIWRML, is China's first hacker organization" Green Corps "

"My friend had a 6 million profit on a one-night brush, and bought a sports car the next day to show off," he said. "Chown Group (COG) advocates Li Qi to the morning News reporter introduced the experience of the hacker rich, Li Qi net name LIWRML, is China's first hacker organization" Green Corps "founder.

The COG-2011 Information Security Forum, hosted by Chown Group, a non-profit research organization focused on the field of cyber information security, was held in Shanghai yesterday, with nearly 400 "hackers and information security practitioners" involved, including China's top hacker group leader: Green Corps founder Goodwell, The Eagle represented WAN, the Red union representative Lion and KNOWNSEC representative Li Qi and others.

The so-called brush library is hacking Web server, stealing data in the database. According to Li Qi, this is one of the top hacking technologies and the most sophisticated hacker industry, "I admit that people have envy, but I will not do so, people have to have a bottom line." ”

Li Qi said that at present the Chinese hacker's black industry chain scale value tens of billions of yuan, in the interest drive, the Chinese internet now faces "out of control" situation.

The running of hacker industry

According to Cog's statistics, in 2008, Chinese hackers found that through the profit of hackers, began to engage in the non main business, that is, the so-called black industry chain, and before that, the majority of Chinese hackers to share information technology mainly.

For the Li Qi, however, it was long past their "active period". Li Qi said that in the 90 's when the Internet to find loopholes in the purely technical fun, there is no concept of black production. "Some people may not be respected in the real world, but feel like God on the Internet, do what they want to do, and start to do the black industry." ”

"The most active were 2004 and 2005, when regulation was in a vacuum. Now a large number of people have retired because they have made enough money in those two years. "Li Qi said.

Li Qi The current Chinese hackers into three categories, to do the black industry "hackers", the gray industry "gray" and the government background of the "white Guest."

"Grey industry is not black industry, the former do is plug-in, that is, the so-called rogue software." Li Qi said, this is placed in the computer memory of the mandatory installation of the advertising module can be sold at a price of 80 yuan. Li Qi revealed that a well-known player software once profited 600,000 yuan a day, while another software company that started with pirated windows had a first monthly income of seven digits, even the company's bosses lamented that they had never seen so much money.

But Gray and hackers always have a difference, the latter engaged in violation of the law content, the most well-known is the 2008 cracked the "Big Miss" Hacker Trojan program, Li Qi it described as a typical hacker industry chain.

According to Li Qi introduced, "Big Miss" has a strict agent system, from the gold total generation to the regional total generation, and in the process of manufacturing Trojans, there is a division of labor, a large Trojan program has 12 small Trojans, for different games can bypass active defense. "Make a wave, sell the Trojan again earn a wave, stolen number and can earn a pen." ”

The industry will be called "envelope", the most expensive time, "a letter" can be sold to more than 100 yuan, "one night earn a hundred thousand of are playing." "After the theft of the letter, the next is the" washing letter ", will steal the account of the equipment into the trumpet, and then through the underground banks will be obtained by the illegal proceeds of washing white," These are one-stop service, pipeline operations. ”

In addition to one-stop, of course, there is a do-it-yourself. "Black eat black is very common, is black you game server, also do network underworld, to blackmail, collect protection fees." "Li Qi said.

Primary Hacker Komatsu (alias) told The Morning Post reporter, the recent black Korean shopping site more, "Generally are money acquisition data, a data of 1 to 5 yuan." Komatsu also said that the common black industry is trojans and stolen numbers.

"Sina Weibo data was stolen"

Black industry chain "vigorous development" has pushed the internet to the edge of runaway, hackers rampant, the weakness of security manufacturers and market development of the deformity is invisible pushing hands.

Two people familiar with the matter told the Morning Post that Sina Weibo had suffered a "brush vault" several months ago. People familiar with the matter said that because Sina is responsible for the network security of the less people, and network security attention is relatively low, so there has been a database stolen events.

But Sina Weibo yesterday denied that.

The undeniable fact is that the income of professionals engaged in cyber-security is much lower than those in the black industry, although both have similar skills and levels, driving many skilled hackers onto the black road, or part-time black industry in their spare time.

A domestic well-known network security manufacturers told reporters that the network security company about One-third to One-fourth of the staff part-time black production, these part-time income floating range is also relatively large, sometimes can reach 200,000 yuan per month.

Ironically, cyber-security firms and hackers are a complementary relationship, and the rising level of hackers is forcing firms to cope.

Li Qi said that the hacker industry led to the development of the security industry, "although we have always said that the devil a foot in the road, but if China's security industry does not progress, it is difficult to say." "Li Qi Blunt Current security vendors are" shameless ", because a lot of testing did not really pass, and the industry is not a reasonable competition," the former firewall can sell 300,000 yuan a Taiwan, but now only tens of thousands of yuan, and even some manufacturers shout out free to send. ”

Of course, there are also concerns about the low age of cyber hackers, which is one of Cog's current missions.

Komatsu is a university student, yesterday the site there are many like Komatsu of the same, "these people are the main force of the black industry, because they have plenty of time." said the network security manufacturer.

Li Qi said Cog would now come forward and tell the current situation and mission of the new generation of hackers, "they only know how to make money, we want to influence them through ourselves, give guidance, and tell them a correct view of society and values."

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.