Virus counterfeiting has become the Internet to form the black industry chain

Source: Internet
Author: User
Keywords Internet attack become

The intermediary transaction SEO diagnoses Taobao guest stationmaster buys the Cloud host technology Hall

In China has basically formed the manufacture of Trojans, transmission Trojans, theft account information, Third-party platform fence, money-laundering, a clear division of the online black industry chain. Some small and medium-sized enterprises to ensure the security of E-commerce even have to pay regular "protection fees" ... How many unknown secrets are hidden in the black industrial chain behind the web?

Network virus counterfeiting form black industry chain.

"It's a lucrative industry that's faster than real estate!" When Wang Lei, the panda's drug man, was caught sighing, more attention was paid to the cyber case.

However, looking back at 2007, when pandas burn incense, gray pigeons, av terminator ... These virus software outbreak, any one network rookie can easily buy and become a hacker master to "steal, Rob, cheat", the Chinese virus industry tip of the iceberg began to emerge.

At present, in China has basically formed the manufacture of Trojans, transmission Trojans, theft account information, Third-party platform fence, money-laundering, a clear division of the online black industry chain. Some small and medium-sized enterprises to ensure the security of E-commerce even have to pay regular "protection fees" ... How many unknown secrets are hidden in the black industrial chain behind the web?

Virus Empire creates "universal hacker" online banking as "bull's-eye"

Trojan is an attacker secretly installed on the computer eavesdropping and control procedures, it can steal accounts, passwords, so as to steal the user's property or virtual property. In the early 2007, the network of "Panda incense" Trojan virus, in just two months so that millions of individual users, Internet cafes and corporate LAN users suffered infection and destruction.

Panda Incense Virus Creator Li June was arrested in February 2007 by police and sentenced to four years in September, but this did not slow the pace of the virus industry expansion. Compared with the subsequent raging gray pigeons, panda incense is just a "pale." For three consecutive years, the ten-year virus, known as the most dangerous backdoor by antivirus experts, came out in 2001, with the release of the "Grey Pigeon 2007", which erupted in March 2007. According to incomplete statistics, its direct sales value of more than 20 million yuan, used to steal accounts and other black interests can be imagined. So far, the "gray pigeon" variety of varieties are continuing to endanger the network security.

Deputy Director of National Computer Network Emergency Technology Treatment Coordination Center China Internet Association Secretary General Huang introduced, and panda incense "publicity" different, gray pigeons more like a stealth "thief", lurking in the user "home", monitoring the user's every move, and even users and MSN friends chat each words are difficult to escape the "thief" eye. If the harm of panda incense is still in the destruction of the computer itself, and gray Pigeon has developed to the "People" control, and the accused people do not know.

Beijing Haidian District Court in early 2007 the trial of the use of Trojans to invade other people's computer case, the perpetrator of a Trojan horse virus to obtain the victims naked photos and successfully extorted 70,000 yuan. "The past always felt that the network has a password is very safe, now their computer became a TV program, who came in to see, do not boot will be photographed, too hung!" By the ash Pigeon and other Trojan horse program of the bitter Netizen "not I accidentally" told reporters.

National Computer network Emergency Technology Processing Coordination Center statistics show that in the first half of 2007, China's mainland was embedded Trojan host IP far more than 2006 year, the increase of 21 times times. One of the important reasons is that in the interests of the driver, the threshold of hackers continue to decline. Reporter in Baidu search "gray pigeon virus", pop-up 2.24 million entries, which about how to use gray pigeons catch "broiler" tutorials everywhere. A computer blind that can only be typed can be a hacker in just one day, and the virus Empire has spawned the advent of a "universal hacker" era.

The security of the Net bank, which is the focus of the attack, is more worrying than the theft of the files. Since 2007, some internet banking users have encountered the password stolen things, and some property stolen tens of thousands of dollars. Police in Hunan have arrested a hacker group that specializes in stealing money from the net, which controls more than 1000 bank accounts and steals more than 400,000 yuan. According to Shanghai Iris Survey, the theft of Internet bank card password "net Silver Trojan" 2006 years to the Chinese network of silver users brought nearly billion economic losses.

Every link in the black industrial chain has a different way of making money.

"One of the obvious signs of industrialization is that the virus makers are turning from a mere display of technology to profit-seeking, which wants the virus to be known to as many people as possible, but the latter wants to maximize the concealment of the virus to gain more." Huang said that the virus counterfeiting the industry chain every link has a different way of profit, which also allows netizens to "internet underground economy" impossible.

Today's network crime has been organized, large-scale, open, and formed a very perfect flow of the process of operation. To "Gray pigeon" as an example, the Trojan maker as the first level, itself does not participate in "make money" or only charge a small amount of fees, but he will leave a backdoor in the Trojan, after the program is finished, by the virus wholesalers (more writers friends or QQ friends) bought, improve the price sold to a large number of virus retailers (webmaster or QQ group master), The latter as "prawn" began recruiting "apprentice", Professor Trojan Virus control technology and technology, collect "training fee", after often will "apprentice" development for the offline, the full-time pilfer number or steal others information, the most low-level machine that is hacked by Trojan is called "broiler", these user's personal information, account number, game equipment, private photograph, Private video and so on by the full-time theft of hackers after theft in the online regular trading website normal trading. Hackers can also be "chicken" reselling to advertisers, controlled computers are randomly put ads, or simply control the computer click on a website ads, every move can be monitored.

In the industry, a computer that can be controlled is called "broiler". Can use a few days of "broiler" in the domestic can be sold to 0.5 yuan to 1 yuan A, if you can use more than half a month, you can sell to dozens of yuan one. According to a common gray pigeon operator one months to catch 100,000 "broiler" calculation, one months can easily earn at least 10,000 yuan, this does not include stealing "chicken" computer QQ number, game currency, bank account and other transactions earned income. It is because of the gray pigeon behind every link huge economic temptation, countless people into alternative wealth, black industry chain is also more solid.

In order to protect the "victory", the virus makers began to try to escape the killing of anti-virus software, and even from the technical point of view of the anti-virus software attack, formed a team of collaborative group. To comprehensive Trojan, worms and other viruses, "AV Terminator" as an example, the virus's biggest feature is the use of a variety of ways technology sharing to improve the virus infection against the most popular security software.

Huang revealed that the recent virus attacks on the pharmaceutical industry and the gaming industry are widespread, and even formed an internet enterprise only to pay "protection fee" to protect against the situation. Hacker group to embark on the information road but its own defense relatively weak small and medium-sized enterprises to attack, resulting in corporate web site paralysis, some small and medium-sized enterprises have to pay "protection fee" to ensure the normal operation of the network.

May 2007, a well-known domestic network game company for up to 10 days of network attacks, the server completely paralyzed, its operating network game was forced to stop, loss of up to 34.6 million yuan. Jiangxi investigated a network of extortion cases, the suspect Zhou by attacking some of the game web site to collect "protection fees", only two months on the illegal profit of more than 12 million yuan.

"Selling viruses is like selling a chopper."

Reporter survey found that the current implementation of cyber security attacks are very low cost, attack tools can be online at very low prices to buy, but the cost of handling attacks, defense attacks is very high. The existing laws and regulations on network security crime lacks specific judicial interpretation, lack of specific sentencing criteria. In addition, because the network crime chain is often trans-regional, it needs to break the jurisdiction problem in the real case.

"Virus software is like a kitchen knife, may be manufactured, the sale of people is not illegal, but was bought to hurt people on the illegal, but it is difficult to ensure that every kitchen knife is cut vegetables are not hurt people, it is difficult to find out exactly which is a kitchen knife case." "Huang cited an image of an example, he said, virus software is only a computer program, look at each link is not illegal, but if applied to the theft of accounts and other acts, it is illegal and endanger the network security, but difficult to investigate.

It is understood that the current "Computer Information Network international networking Security Management measures" in the provision of manufacturing and transmission of the virus is illegal, but for Trojans, hackers and other procedures are not clearly defined, this is also a gray pigeon, such as Trojan horse program manufacturers Dare to use the network of the root cause of the public hawk.

In addition, there are still some difficult problems in the fight against new forms of crime, such as difficulty in filing a case, difficulty in obtaining evidence and hard conviction. For example, virtual assets in the reality is difficult to determine the value of the crime of theft has no basis. The victim has the right to bring a civil action request, but there are some difficulties in operation, including the collection of evidence, compensation standards and methods of calculation, at present, our legislation lacks uniform provisions.

Huang said that in the face of the black virus industry chain, we must safeguard the national security and promote the healthy and rapid development of China's Internet to ensure network security, establish a network security national emergency system, increase the attack on cyber-security crime, improve legislation, accelerate anti-virus and network attack technology and tool product development. If you can learn from foreign experience, the development of electronic secret key system, to ensure network security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.