Don't row away! The victims of this hacker gang are involved in multiple parts of the country
AD |
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money.
Platform e-commerce computers repeatedly become "poisoned"
In early June, the Minhang Branch of the Shanghai Public Security Bureau received a report from a well-known platform in the city, stating that multiple e-commerce companies entering the platform reported that their customer service computers were suspected of being "poisoned".
The police immediately conducted an investigation and found that there were hidden and automatically running Trojan programs in the computers of multiple e-commerce customer service providers, which could steal computer data and automatically send fraud messages.
(Trojan programs hidden in computers)
After a comprehensive investigation, the police found that many customer service computers on the e-commerce platform have been implanted with Trojan programs, involving different industries such as navigation, printing, shopping, home decoration, and intermediaries, and there is no substantial connection between them.
After conducting extensive visits and investigations into the businesses involved, the police discovered a suspicious situation where the customer service of these businesses had encountered customers claiming to "customize products" in their daily operations, and the customer sent a compressed file and requested customer service to decompress and browse for various reasons.
After the customer service follows suit, the Trojan program will automatically search, collect information stored on the computer, and upload it to an overseas server.
The appearance of a "stranger" with a hidden Trojan horse
After investigation and analysis, the task force quickly identified the criminal gang led by Lu.
Among them, Lu is the general agent, and Lin and Suo are the first level agents. The three individuals developed offline members separately, forming a multi-level and loosely organized hacker criminal gang.
After receiving tasks and Trojan files from overseas, Lu posted information to gang members through instant messaging tools.
Gang members impersonate customers and use scripts to add e-commerce customer service WeChat under the guise of purchasing goods and services. Then, they send files containing Trojan viruses to customer service on the grounds of needing customized products, enticing them to download and browse on the computer, thereby implanting Trojan programs and collecting information.
(impersonating a customer and chatting with customer service)
Nationwide arrest of behind the scenes criminal gangs
In the middle of July, the special case team organized police forces to go to 4 provinces and 7 cities across the country to catch all 30 suspect in the gang, and initially verified that the gang made illegal profits of more than 1 million yuan.
After investigation, the criminal gang has been recruiting gang members since May, in accordance with the requirements of overseas fraud groups, by planting Trojan programs on a computer for a profit of 80 to 120 yuan. Afterwards, they were subcontracted layer by layer through agents, while the lower level personnel contacted merchant customer service on major e-commerce platforms to deceive and implant Trojan programs.
As of the incident, the gang has planted Trojan programs on more than 12000 e-commerce computers in China, and the affected businesses involve multiple regions across the country.
At present, three suspect including Lu have been arrested by the procuratorial organ according to law due to their suspicion of illegally controlling the computer information system, and 27 suspect including Xu have been taken criminal coercive measures according to law due to their suspicion of illegally controlling the computer information system.
Police reminder: Strange links are not important, build a strong data security "firewall"!
Source: WeChat official account of the Internet Security Bureau of the Ministry of Public Security
Editor: Xie Yongli
Process Editor: Guo Dan
Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])
Mobile advertising space rental |
Tag: of Don row away The victims this hacker gang
Pretending to be a 60 year old man using social media and receiving 10 video pop-ups in one second
NextTesla has lowered its selling price in the United States, but analysts say demand is weak
Guess you like
-
The Facial Swelling of Shenzhou 18 Astronauts: The Physiological Cost of Space Exploration and Future ChallengesDetail
2024-11-17 08:03:04 1
-
Xiaomi Automobile Unveils Intelligent Chassis Pre-Research Technology, Ushering in a New Era of "Human-Car-Home Full Ecosystem"Detail
2024-11-14 11:24:27 1
-
Douyin E-commerce Double 11 Data Report: Merchants Businesses Grow, Consumer Trends EmergeDetail
2024-11-14 11:23:11 1
-
New Trends in SOE Reform: Focusing on Five Values to Build a "Living Organism"Detail
2024-11-14 11:19:26 1
-
CATL Chairman Zeng Yuqun: Musk Doesn't Understand Batteries, Tesla's Bet on Cylindrical Batteries is Doomed to FailDetail
2024-11-13 18:47:38 1
-
China Eastern Airlines Technology and Thales Renew Cooperation Agreement, Deepening Avionics Maintenance PartnershipDetail
2024-11-13 16:40:50 1
- Detail
- Detail
- Detail
-
Li Jiaqi's Livestream Double 11 Report: Domestic Brands Surge, Winter Warmer Economy BoomsDetail
2024-11-12 11:07:26 11
-
BYD: Plug-in Hybrids "To the Rescue," Behind the Price War Lies a "Davis Double-Click" in ProfitabilityDetail
2024-11-12 10:49:05 1
-
The Rise of Online Livestreamers: A Mass Career with 15 Million Dream Chasers in Live RoomsDetail
2024-11-11 15:27:33 11
-
Microsoft "Mail and Calendar" app will be officially discontinued at the end of next year, users need to migrate to the new OutlookDetail
2024-11-10 14:53:36 11
- Detail
-
Alibaba Pictures' Phoenix Cloud Intelligence International Edition iCIRENA Expands to Hong Kong and Macau, Bringing Technological Upgrades to CinemasDetail
2024-11-09 11:22:49 11
-
From Daughter of Heaven to Ordinary Mom: Liu Yang's Space Dream and the Diversification of LifeDetail
2024-11-09 10:36:56 1
- Detail
-
Global Focus: CIIE Signs Deals Worth Over 10 Billion, 6G Technology Takes the Lead, Avian Flu Outbreak Ravages, Typhoon "Ginkgo" ApproachesDetail
2024-11-08 14:39:05 1
-
The Battle for the Smartphone Throne: Apple, Samsung, and Huawei Vie for DominanceDetail
2024-11-07 21:01:50 1
-
Why Chinese Astronauts Lie Down When Exiting the Capsule? The Truth is Not InferiorityDetail
2024-11-07 00:51:26 11