Don't row away! The victims of this hacker gang are involved in multiple parts of the country
AD |
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money.
Platform e-commerce computers repeatedly become "poisoned"
In early June, the Minhang Branch of the Shanghai Public Security Bureau received a report from a well-known platform in the city, stating that multiple e-commerce companies entering the platform reported that their customer service computers were suspected of being "poisoned".
The police immediately conducted an investigation and found that there were hidden and automatically running Trojan programs in the computers of multiple e-commerce customer service providers, which could steal computer data and automatically send fraud messages.
(Trojan programs hidden in computers)
After a comprehensive investigation, the police found that many customer service computers on the e-commerce platform have been implanted with Trojan programs, involving different industries such as navigation, printing, shopping, home decoration, and intermediaries, and there is no substantial connection between them.
After conducting extensive visits and investigations into the businesses involved, the police discovered a suspicious situation where the customer service of these businesses had encountered customers claiming to "customize products" in their daily operations, and the customer sent a compressed file and requested customer service to decompress and browse for various reasons.
After the customer service follows suit, the Trojan program will automatically search, collect information stored on the computer, and upload it to an overseas server.
The appearance of a "stranger" with a hidden Trojan horse
After investigation and analysis, the task force quickly identified the criminal gang led by Lu.
Among them, Lu is the general agent, and Lin and Suo are the first level agents. The three individuals developed offline members separately, forming a multi-level and loosely organized hacker criminal gang.
After receiving tasks and Trojan files from overseas, Lu posted information to gang members through instant messaging tools.
Gang members impersonate customers and use scripts to add e-commerce customer service WeChat under the guise of purchasing goods and services. Then, they send files containing Trojan viruses to customer service on the grounds of needing customized products, enticing them to download and browse on the computer, thereby implanting Trojan programs and collecting information.
(impersonating a customer and chatting with customer service)
Nationwide arrest of behind the scenes criminal gangs
In the middle of July, the special case team organized police forces to go to 4 provinces and 7 cities across the country to catch all 30 suspect in the gang, and initially verified that the gang made illegal profits of more than 1 million yuan.
After investigation, the criminal gang has been recruiting gang members since May, in accordance with the requirements of overseas fraud groups, by planting Trojan programs on a computer for a profit of 80 to 120 yuan. Afterwards, they were subcontracted layer by layer through agents, while the lower level personnel contacted merchant customer service on major e-commerce platforms to deceive and implant Trojan programs.
As of the incident, the gang has planted Trojan programs on more than 12000 e-commerce computers in China, and the affected businesses involve multiple regions across the country.
At present, three suspect including Lu have been arrested by the procuratorial organ according to law due to their suspicion of illegally controlling the computer information system, and 27 suspect including Xu have been taken criminal coercive measures according to law due to their suspicion of illegally controlling the computer information system.
Police reminder: Strange links are not important, build a strong data security "firewall"!
Source: WeChat official account of the Internet Security Bureau of the Ministry of Public Security
Editor: Xie Yongli
Process Editor: Guo Dan
Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])
Mobile advertising space rental |
Tag: of Don row away The victims this hacker gang
Pretending to be a 60 year old man using social media and receiving 10 video pop-ups in one second
NextTesla has lowered its selling price in the United States, but analysts say demand is weak
Guess you like
- Detail
-
Apple Phones Banned: Why Has the Once-Shining Star Fallen From Grace?Detail
2024-10-01 12:19:49 1
-
AI Audio Incident: Hefei Police Unravel the Truth Behind Online Rumors, A Clash of Technology and JusticeDetail
2024-09-30 22:45:17 1
-
Yadea Guaneng E8: The "Rolls Royce" of Electric Vehicles, A Perfect Blend of Performance and IntelligenceDetail
2024-09-30 22:05:41 1
-
The Chaos of Live Streaming E-commerce: Deep Reflections Triggered by the San Zhi Yang False Advertising IncidentDetail
2024-09-30 19:43:26 1
-
New E-commerce Development Trends: Regulation and Empowerment, Boosting High-Quality Development of the Digital EconomyDetail
2024-09-29 18:03:14 1
- Detail
- Detail
-
Maoyan Entertainment Unveils "Shenbi Malia": AI-Powered Screenplay Creation with One-Click Dynamic Storyboard GenerationDetail
2024-09-27 15:52:43 1
-
Huawei Cloud and CAICT Jointly Released Two Value Reports to Empower City Digital Transformation and UpgradingDetail
2024-09-27 15:29:32 1
-
Huawei MateXT: Scalpers Caught in the Crossfire, High Prices Unrelenting, Can Production Ramp-Up Offer Relief?Detail
2024-09-27 14:40:15 11
-
10G-PON Leads Digital Transformation: 2024 International Information and Communication Exhibition Focuses on Innovative DevelopmentDetail
2024-09-27 14:00:08 1
-
The Light of Science Illuminates Dreams: The Path of Science Popularization at the Shandong Science and Technology MuseumDetail
2024-09-27 11:59:09 11
-
The Huawei Chip Dispute: A Balancing Act Between Independent Innovation and Open CollaborationDetail
2024-09-27 09:34:01 11
-
"Playing it Safe": Li Pao'er's Exit from Sanzhiyang, the Dilemma of "Siege" in Internet Celebrity EconomyDetail
2024-09-27 09:31:55 1
- Detail
-
From "Catching Up" to "Surpassing": The "Golden Age" of China's Precision Instrument DevelopmentDetail
2024-09-25 14:16:48 21
-
Huawei's "Closedness" and "Science": A Debate About the Direction of Technological DevelopmentDetail
2024-09-25 13:43:01 11
- Detail
- Detail