Don't row away! The victims of this hacker gang are involved in multiple parts of the country
AD |
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money
In the internet economy, online shopping has become mainstream consumption, and e-commerce online stores have also stored a large amount of customer information. And some information has become a tool used by criminals to make money.
Platform e-commerce computers repeatedly become "poisoned"
In early June, the Minhang Branch of the Shanghai Public Security Bureau received a report from a well-known platform in the city, stating that multiple e-commerce companies entering the platform reported that their customer service computers were suspected of being "poisoned".
The police immediately conducted an investigation and found that there were hidden and automatically running Trojan programs in the computers of multiple e-commerce customer service providers, which could steal computer data and automatically send fraud messages.
(Trojan programs hidden in computers)
After a comprehensive investigation, the police found that many customer service computers on the e-commerce platform have been implanted with Trojan programs, involving different industries such as navigation, printing, shopping, home decoration, and intermediaries, and there is no substantial connection between them.
After conducting extensive visits and investigations into the businesses involved, the police discovered a suspicious situation where the customer service of these businesses had encountered customers claiming to "customize products" in their daily operations, and the customer sent a compressed file and requested customer service to decompress and browse for various reasons.
After the customer service follows suit, the Trojan program will automatically search, collect information stored on the computer, and upload it to an overseas server.
The appearance of a "stranger" with a hidden Trojan horse
After investigation and analysis, the task force quickly identified the criminal gang led by Lu.
Among them, Lu is the general agent, and Lin and Suo are the first level agents. The three individuals developed offline members separately, forming a multi-level and loosely organized hacker criminal gang.
After receiving tasks and Trojan files from overseas, Lu posted information to gang members through instant messaging tools.
Gang members impersonate customers and use scripts to add e-commerce customer service WeChat under the guise of purchasing goods and services. Then, they send files containing Trojan viruses to customer service on the grounds of needing customized products, enticing them to download and browse on the computer, thereby implanting Trojan programs and collecting information.
(impersonating a customer and chatting with customer service)
Nationwide arrest of behind the scenes criminal gangs
In the middle of July, the special case team organized police forces to go to 4 provinces and 7 cities across the country to catch all 30 suspect in the gang, and initially verified that the gang made illegal profits of more than 1 million yuan.
After investigation, the criminal gang has been recruiting gang members since May, in accordance with the requirements of overseas fraud groups, by planting Trojan programs on a computer for a profit of 80 to 120 yuan. Afterwards, they were subcontracted layer by layer through agents, while the lower level personnel contacted merchant customer service on major e-commerce platforms to deceive and implant Trojan programs.
As of the incident, the gang has planted Trojan programs on more than 12000 e-commerce computers in China, and the affected businesses involve multiple regions across the country.
At present, three suspect including Lu have been arrested by the procuratorial organ according to law due to their suspicion of illegally controlling the computer information system, and 27 suspect including Xu have been taken criminal coercive measures according to law due to their suspicion of illegally controlling the computer information system.
Police reminder: Strange links are not important, build a strong data security "firewall"!
Source: WeChat official account of the Internet Security Bureau of the Ministry of Public Security
Editor: Xie Yongli
Process Editor: Guo Dan
Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])
Mobile advertising space rental |
Tag: of Don row away The victims this hacker gang
Pretending to be a 60 year old man using social media and receiving 10 video pop-ups in one second
NextTesla has lowered its selling price in the United States, but analysts say demand is weak
Guess you like
-
2024 Spring Festival Travel Rush New Train Schedule: 321 Additional Trains Nationwide Starting January 5th, Further Enhancing Service Quality and EfficiencyDetail
2024-12-23 12:05:44 1
-
Changan Automobile and EHang Intelligent Sign Strategic Cooperation Agreement to Build Future Flying Car EcosystemDetail
2024-12-22 15:08:38 1
-
Liaoning Province and Baidu Sign Strategic Cooperation Framework Agreement to Jointly Promote AI Industry DevelopmentDetail
2024-12-20 19:36:38 1
-
Wanxun Technology Secures Nearly RMB 200 Million in Funding to Lead Global Soft Robotics Innovation, Set to Showcase Breakthroughs at CES 2025Detail
2024-12-20 15:54:19 1
-
Huolala's 2025 Spring Festival Freight Festival: Supporting Spring Festival Travel, Offering New Year Benefits to Users and DriversDetail
2024-12-20 13:38:20 1
-
The Third Meeting of the Third Council of the International New Energy Solutions Platform (INES): Charting a Blueprint for a "Dual Carbon" FutureDetail
2024-12-19 17:03:07 1
-
WeChat's Official Account Launches "Author Read Aloud Voice" Feature for Personalized Article ListeningDetail
2024-12-18 17:19:57 1
-
The 12th China University Students' Polymer Materials Innovation and Entrepreneurship Competition Finals Grand Opening in Guangrao CountyDetail
2024-12-18 16:04:28 1
-
Tracing the Ancient Shu Road, Winds of the Three Kingdoms: Global Influencer Shu Road Journey LaunchesDetail
2024-12-18 15:23:35 1
-
Seres: A Pioneer in ESG Practices, Driving Sustainable Development of China's New Energy Vehicle IndustryDetail
2024-12-17 16:20:26 1
- Detail
-
My Health, My Guard: Huawei WATCH D2 Aids Precise Blood Pressure Management in the Winter Health BattleDetail
2024-12-17 09:36:15 1
-
Investigation into the Chaos of Airline Seat Selection: Paid Seat Selection, Seat Locking Mechanisms, and Consumer Rights ProtectionDetail
2024-12-15 16:45:48 1
-
Japanese Scientists Grow Human Organs in Pigs: A Balancing Act of Breakthrough and EthicsDetail
2024-12-14 19:48:50 1
-
Pang Donglai and Sam's Club: Two Paths to Transformation in China's Retail IndustryDetail
2024-12-14 17:57:03 1
-
In-Depth Analysis of China's Precision Reducer Industry: Technological Innovation and Market CompetitionDetail
2024-12-14 16:04:26 1
-
Alibaba's "TAO" App Launches in Japan, Targeting High-Quality Service and Convenient LogisticsDetail
2024-12-13 13:22:23 1
-
In-depth Analysis of China's Cross-border E-commerce Industry Chain: Opportunities and Challenges CoexistDetail
2024-12-13 11:37:17 1
-
Sweet Potato Robotics: How a Unified Software and Hardware Computing Platform Accelerates Robotics Industry DevelopmentDetail
2024-12-13 06:36:34 1
- Detail