Don't row away! The victims of this hacker gang are involved in multiple parts of the country
AD |
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money.
Platform e-commerce computers repeatedly become "poisoned"
In early June, the Minhang Branch of the Shanghai Public Security Bureau received a report from a well-known platform in the city, stating that multiple e-commerce companies entering the platform reported that their customer service computers were suspected of being "poisoned".
The police immediately conducted an investigation and found that there were hidden and automatically running Trojan programs in the computers of multiple e-commerce customer service providers, which could steal computer data and automatically send fraud messages.

(Trojan programs hidden in computers)
After a comprehensive investigation, the police found that many customer service computers on the e-commerce platform have been implanted with Trojan programs, involving different industries such as navigation, printing, shopping, home decoration, and intermediaries, and there is no substantial connection between them.

After conducting extensive visits and investigations into the businesses involved, the police discovered a suspicious situation where the customer service of these businesses had encountered customers claiming to "customize products" in their daily operations, and the customer sent a compressed file and requested customer service to decompress and browse for various reasons.

After the customer service follows suit, the Trojan program will automatically search, collect information stored on the computer, and upload it to an overseas server.
The appearance of a "stranger" with a hidden Trojan horse
After investigation and analysis, the task force quickly identified the criminal gang led by Lu.
Among them, Lu is the general agent, and Lin and Suo are the first level agents. The three individuals developed offline members separately, forming a multi-level and loosely organized hacker criminal gang.

After receiving tasks and Trojan files from overseas, Lu posted information to gang members through instant messaging tools.

Gang members impersonate customers and use scripts to add e-commerce customer service WeChat under the guise of purchasing goods and services. Then, they send files containing Trojan viruses to customer service on the grounds of needing customized products, enticing them to download and browse on the computer, thereby implanting Trojan programs and collecting information.

(impersonating a customer and chatting with customer service)
Nationwide arrest of behind the scenes criminal gangs
In the middle of July, the special case team organized police forces to go to 4 provinces and 7 cities across the country to catch all 30 suspect in the gang, and initially verified that the gang made illegal profits of more than 1 million yuan.


After investigation, the criminal gang has been recruiting gang members since May, in accordance with the requirements of overseas fraud groups, by planting Trojan programs on a computer for a profit of 80 to 120 yuan. Afterwards, they were subcontracted layer by layer through agents, while the lower level personnel contacted merchant customer service on major e-commerce platforms to deceive and implant Trojan programs.
As of the incident, the gang has planted Trojan programs on more than 12000 e-commerce computers in China, and the affected businesses involve multiple regions across the country.
At present, three suspect including Lu have been arrested by the procuratorial organ according to law due to their suspicion of illegally controlling the computer information system, and 27 suspect including Xu have been taken criminal coercive measures according to law due to their suspicion of illegally controlling the computer information system.
Police reminder: Strange links are not important, build a strong data security "firewall"!
Source: WeChat official account of the Internet Security Bureau of the Ministry of Public Security
Editor: Xie Yongli
Process Editor: Guo Dan
Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])
Mobile advertising space rental |
Tag: of Don row away The victims this hacker gang
Pretending to be a 60 year old man using social media and receiving 10 video pop-ups in one second
NextTesla has lowered its selling price in the United States, but analysts say demand is weak
Guess you like
-
Huyu Xianxiang and AVIC Optoelectronics Institute Forge Strategic Partnership to Shape China's eVTOL Avionics LandscapeDetail
2025-04-02 18:39:02 1
-
Haier Smart Home's 8th Global R&D Innovation Awards: Illuminating Better Lives with Technology, Achieving User SatisfactionDetail
2025-04-02 15:57:33 21
-
Huawei's 2025 China Digital Power Partner Conference: Carbon-Neutral Path for China, Shared Value CreationDetail
2025-03-31 18:57:09 11
-
OPPO Think Tank: A New Paradigm for Chinese Enterprises' Globalization From Wusha Village to the Global High-End MarketDetail
2025-03-31 18:48:21 1
-
ICLR 2025: Chinese Universities and Companies Showcase AI Prowess with Numerous Accepted Papers; Stanford-HKUST Collaboration Achieves Perfect ScoreDetail
2025-03-31 14:54:45 11
-
Huawei HarmonyOS Smart Home Partner Summit: Deep Dive into Spatial Intelligence Transformation and Ecosystem Development StrategyDetail
2025-03-31 13:01:45 1
-
AI Large Models Drive Innovation in Humanoid Robots and Autonomous Driving: 2025 as a Key MilestoneDetail
2025-03-31 13:00:04 1
-
Eight Cities Pilot Credit Supervision Data Openness, Empowering Micro and Small Enterprises with Mobile Payment PlatformsDetail
2025-03-26 09:32:47 1
-
Xiaomi's "Just a Little Profit": The Deep Logic and Sustainability Behind its Low-Margin StrategyDetail
2025-03-25 15:07:32 21
- Detail
-
The Ninth Huawei ICT Competition China Challenge Finals Conclude Successfully: Kunpeng and Ascend Tracks Crown Their ChampionsDetail
2025-03-24 16:26:03 11
-
Ronshen Sugar Cube Refrigerator: The Official Product of the 2025 FIFA Club World Cup, Ushering in a New Era of Healthy Food PreservationDetail
2025-03-24 15:40:35 1
-
Zhihu Launches New Version of Zhihu Straight Answer: Deep Integration of AI and Community to Enhance Professionalism and CredibilityDetail
2025-03-24 14:04:38 1
-
China Construction Ninth Harmony (Zhongjian Jiuhe) and Huawei HarmonyOS Smart Home Deepen Strategic Partnership at AWE2025, Building a Green and Intelligent Future HomeDetail
2025-03-23 15:21:15 41
-
ZuoYeBang Books Leads the New Trend in Intelligent Education Publishing at Changsha Book FairDetail
2025-03-21 15:15:33 1
-
Tianyancha: Shielding Consumer Safety and Reshaping Business Trust with DataDetail
2025-03-21 08:47:58 1
-
Hisense at AWE2025: AI Empowerment, Leading the Transformation of Future Smart LivingDetail
2025-03-20 18:24:11 1
-
Haier TV Makes a Stunning Debut at AWE 2024: Zhiyuan AI Large Model and PureScene Care Screen Usher in a New Era of Smart HomesDetail
2025-03-20 15:17:20 1
-
China Power's Xin Yuan Zhi Chu (New Source Smart Storage): Open Energy Intelligence Computing Center Leads Intelligent Transformation of the Energy IndustryDetail
2025-03-20 15:15:39 1
-
Leader's All-in-One Three-Drum Washing Machine: Say Goodbye to Laundry Hassles and Embrace a "Refined Lazy" LifestyleDetail
2025-03-20 11:32:30 21