Home Page >  News List >> Tech >> Tech

Don't row away! The victims of this hacker gang are involved in multiple parts of the country

Tech 2023-10-07 16:49:14 Source: Network
AD

In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money

In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money.

Platform e-commerce computers repeatedly become "poisoned"

In early June, the Minhang Branch of the Shanghai Public Security Bureau received a report from a well-known platform in the city, stating that multiple e-commerce companies entering the platform reported that their customer service computers were suspected of being "poisoned".

The police immediately conducted an investigation and found that there were hidden and automatically running Trojan programs in the computers of multiple e-commerce customer service providers, which could steal computer data and automatically send fraud messages.

(Trojan programs hidden in computers)

After a comprehensive investigation, the police found that many customer service computers on the e-commerce platform have been implanted with Trojan programs, involving different industries such as navigation, printing, shopping, home decoration, and intermediaries, and there is no substantial connection between them.

After conducting extensive visits and investigations into the businesses involved, the police discovered a suspicious situation where the customer service of these businesses had encountered customers claiming to "customize products" in their daily operations, and the customer sent a compressed file and requested customer service to decompress and browse for various reasons.

After the customer service follows suit, the Trojan program will automatically search, collect information stored on the computer, and upload it to an overseas server.

The appearance of a "stranger" with a hidden Trojan horse

After investigation and analysis, the task force quickly identified the criminal gang led by Lu.

Among them, Lu is the general agent, and Lin and Suo are the first level agents. The three individuals developed offline members separately, forming a multi-level and loosely organized hacker criminal gang.

After receiving tasks and Trojan files from overseas, Lu posted information to gang members through instant messaging tools.

Gang members impersonate customers and use scripts to add e-commerce customer service WeChat under the guise of purchasing goods and services. Then, they send files containing Trojan viruses to customer service on the grounds of needing customized products, enticing them to download and browse on the computer, thereby implanting Trojan programs and collecting information.

(impersonating a customer and chatting with customer service)

Nationwide arrest of behind the scenes criminal gangs

In the middle of July, the special case team organized police forces to go to 4 provinces and 7 cities across the country to catch all 30 suspect in the gang, and initially verified that the gang made illegal profits of more than 1 million yuan.

After investigation, the criminal gang has been recruiting gang members since May, in accordance with the requirements of overseas fraud groups, by planting Trojan programs on a computer for a profit of 80 to 120 yuan. Afterwards, they were subcontracted layer by layer through agents, while the lower level personnel contacted merchant customer service on major e-commerce platforms to deceive and implant Trojan programs.

As of the incident, the gang has planted Trojan programs on more than 12000 e-commerce computers in China, and the affected businesses involve multiple regions across the country.

At present, three suspect including Lu have been arrested by the procuratorial organ according to law due to their suspicion of illegally controlling the computer information system, and 27 suspect including Xu have been taken criminal coercive measures according to law due to their suspicion of illegally controlling the computer information system.

Police reminder: Strange links are not important, build a strong data security "firewall"!

Source: WeChat official account of the Internet Security Bureau of the Ministry of Public Security

Editor: Xie Yongli

Process Editor: Guo Dan


Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])

Mobile advertising space rental

Tag: of Don row away The victims this hacker gang

Unite directoryCopyright @ 2011-2024 All Rights Reserved. Copyright Webmaster Search Directory System