After clicking on Purchase Information , the merchant s computer is remotely controlled

Mondo Technology Updated on 2024-02-01

One is dedicated to ** operation.

Never connect to a computer with any external devices.

Just because of the **boss.

I clicked on a "Purchase Information".

Implanted with a Trojan virus.

As a result, a large number of customer transaction information was stolen.

A few days ago, after the Nantong Haimen District Procuratorate initiated a public prosecution, the court sentenced the defendants Wang and Su to fixed-term imprisonment ranging from four years and six months to one year and three months for the crime of illegally obtaining computer information system data; Defendant Lin was sentenced to three years imprisonment with a suspended sentence of three years and six months for the crime of providing programs and tools for intrusion and illegal control of computer information systems; Defendant Zhao was sentenced to three years imprisonment with a suspended sentence of three years and six months for the crime of infringing on citizens' personal information; All 12 defendants were fined and all their illegal gains were confiscated.

In November 2022, Mr. Li, who runs a home textile store on an online platform, received complaints from several customers, saying that they had received several scams**, and the fraudsters claimed to be the customer service of Mr. Li's store, and were able to accurately tell the items purchased by the customers and the delivery address. Mr. Li immediately called the police, and after investigation, the public security organs found that Mr. Li's computer had been maliciously implanted with a Trojan virus, and the Trojan virus was sent through WeChat.

It turned out that the criminals disguised the Trojan virus as shopping information and sent it to Mr. Li, and after Mr. Li clicked on it, the computer was remotely controlled by the criminals. Criminals can arbitrarily steal customer transaction information cached on the computer without Mr. Li noticing. The public security organs then followed the vine and locked up 4 people, Wang, Yang, Chen, and Zhu, and arrested 4 people in February 2023.

After investigation, Wang and other 4 people were friends. By chance, Wang learned that someone on the Internet had purchased the cache files of an online shopping platform store. Wang, who had opened a network company, knew that this behavior might be suspected of a crime, but he still did not resist the high return of **, and began to study how to obtain ** cache files.

Wang first purchased a Trojan virus from Lin that can remotely control other people's computers, and then arranged for Yang and other 3 people to pretend to be customers on the short ** platform to chat with the merchant, and disguised the Trojan virus as a shopping list and sent it to the merchant through WeChat. After the merchant's computer was infected with the Trojan virus, Wang used remote control software to illegally obtain the cache files in the merchant's computer, and then sold the files through overseas software. In just over two months, Wang and other 4 people sent Trojan viruses to many businesses, making illegal profits of more than 6 million yuan.

At the same time, Wang shared this way of "making money" with Su, who was far away in Changsha City, Hunan Province. Su entrusted his friend Yuan, who was proficient in computer technology, to make a Trojan virus with remote control function, and arranged for Xiang and four others to pretend to be customers to chat with the merchant, and disguised the Trojan virus made by Yuan as a shopping list and sent it to the merchant, while Yuan acted as the technical adviser of the gang. During this period, Su also contacted the programmer Zhao through the Internet, and Zhao used a self-made crawler script to help Su illegally obtain more than 20,000 pieces of customer shopping information.

The business information of Wang, Su and others, after being processed by "buyer" technology, is mostly used by overseas fraud gangs to defraud citizens.

Due to the novelty of the criminal modusion, the Haimen District Procuratorate intervened in accordance with the law, discussed the investigation ideas with the public security organs, and guided the public security organs to investigate and collect evidence. In the process of handling the case, the prosecutor in charge found that in addition to Wang, there were other personnel who had also purchased remote control software from Lin. Considering that most of these remote control software are used for illegal purposes, the court recommended that the public security authorities investigate and identify these buyers one by one, and find out the use of the remote control software, so as to intensify the crackdown on cybercrime.

In June 2023, the Haimen District Procuratorate filed a public prosecution of the case with the Haimen District Court. After a trial, the court recently rendered the above judgment.

*: Procuratorate**, Nantong Municipal Procuratorate, Haimen District Procuratorate.

Related Pages