Current location - Quotes Website - Signature design - How long did the "panda burning incense" last? How great will the impact be?
How long did the "panda burning incense" last? How great will the impact be?
On June 14, at the First Detention Center in Xiantao City, 25-year-old Li Jun expressed regret: "I really didn't expect that the consequences of making this virus would be so serious." On June 5438+February, 2006, the "Panda Burning Incense" virus broke out on a large scale, causing serious harm: according to statistics, millions of computers were infected and thousands of enterprises were infringed ... but even the cunning fox could not escape the eyes of hunters. The reporter learned that this year1October 22nd, 65438, the National Computer Virus Emergency Response Center issued an alarm again. On the same day that the panda was wanted nationwide to burn incense, Xiantao police found the source code of the virus, and formally put it on file on124 October 65438. On February 7, all six suspects, including Li Jun, were arrested in less than half a month. Hu Hu, instructor of Xiantao Public Security Network Supervision Brigade, said: "Most netizens have a misunderstanding that no one will know what they have done online. In fact, even writing viruses is traceable. " The special "signature" in the virus code of "Panda Burning Incense"-WHBOY (Wuhan Boy) provides important clues for solving the case. In addition, after the "Panda Burning Incense" virus infects the webpage file, it will add code to the webpage and transfer the webpage to a specific URL. The registration information of this website shows that the registrant is from Wuhan, so the police quickly analyzed that the person who owns all the virus codes should be from Wuhan. Pi Yong, a professor at Wuhan University Law School, said: "Many netizens in China have a weak legal awareness and think that they can be lawless online. While strengthening publicity and education, the state must show the power of controlling the network by breaking major cases, so as to prevent and deter computer crimes. " Zhao Junxin, a professor at the School of Law of Zhongnan University of Economics and Law, said that those who deliberately manufacture and spread destructive programs such as computer viruses and invade other people's systems, causing serious consequences such as system collapse and abnormal operation, shall be punished in accordance with Article 286 of the Criminal Law: those who constitute the crime of destroying computer systems shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention; If the consequences are especially serious, they shall be sentenced to fixed-term imprisonment of not less than five years. Manufacturer-middleman-buyer loophole 2: How to cut off the network virus "industrial chain"? Li Jun usually lives in seclusion, but he spends a lot of money, even tens of thousands of yuan a day, mainly to fly to meet netizens in different places. It is understood that Li Jun has a bank card account with a deposit of up to 400,000 yuan. As an unemployed person, his income mainly comes from spreading the "panda burning incense" virus. How does Li Jun make money from viruses? "In fact, Mr. Li sold the panda incense burning virus directly only 10 to 20 times, and the price was only around 500 yuan. He mainly makes money by selling broilers, relying on an illegal industrial chain. " Ye Tieguan, deputy director of Xiantao Public Security Bureau, said that after the computer was infected by the panda incense burning virus, it was equivalent to destroying all the information protection capabilities and became a "slaughter". "If the' chicken' is compared to a house, Li Jun is the owner of the key. He opened the door with a key and let the person who paid him in to steal. " Zhang, deputy head of the Xiantao Public Security Network Supervision Brigade, explained that this "industrial chain" includes virus producers, middlemen, virus buyers (people who hang horses), "recipients" and "letter openers". Its operation mode is roughly as follows: Li Jun wants to rewrite his virus program code according to the market demand, so as to control the poisoned computer to automatically visit the website of the virus buyer. The "horse-hanging person" hangs a Trojan horse program on the website to invade the poisoned computer, and the Trojan horse program "steals" QQ coins, game equipment and other items from the poisoned computer and sends them to the "recipient" in the form of e-mail, and the "recipient" then resells these valuable e-mails. The "letter opener" got real money after selling "virtual property" ... A "horse hanger" was arrested and confessed: "I am an amazing trafficker. I know this business makes money faster than real estate. ""In this chain, it is actually not the most profitable, "said Wan, the captain of Xiantao Public Security Network Supervision Brigade." At present, a remarkable feature of computer crime is that it begins to develop from showing off technology and ability to making illegal profits, and some cases show that the spread of virus has formed a one-stop and clustered industrial chain, which deserves vigilance and in-depth study by public security departments. "Existing viruses can invade loopholes in the banking system. 3. How many "patches" should we make to protect the security of network information? " He is a network genius, "said an expert from the Network Supervision Corps of Hubei Provincial Public Security Department. However, Li Jun, who is in the detention center, said modestly: "In fact, the virus can spread so fast, mainly because netizens have poor awareness of information security. If they often' patch', computers will not be so easily infected. However, Gong, a teacher from Hubei Police College, said: "Antivirus software always lags behind the generation of viruses. Although anti-virus software and even network legislation are necessary, establishing network ethics and network order is the fundamental solution. Professor Pi Yong said, "The technical confrontation with viruses is endless. You mutate once, I upgrade once, then mutate and upgrade again, and criminals and manufacturers of antivirus software will always make a profit. Who will make up for the loss of social resources? "The lag of legislation has also become a concern of the network police: the suspect has been caught, but how to convict and sentence? Zhang said that according to the law, those who make and spread the virus should be sentenced according to the severity of the consequences, but how to measure the consequences caused by the "panda burning incense" virus? There are millions of victims. How can I prove it all at once? Secondly, most of the stolen items are "virtual property" such as game equipment. Even if everyone knows the value of a piece of equipment 1000 yuan, as long as it doesn't turn into real money, it doesn't constitute "theft", which may lead to a light sentence or difficult conviction for many suspects except Li Jun. Referring to the current situation of network information security in China, Hu is not optimistic. In fact, some cases of online banks stealing passwords have occurred from time to time. Another example is the panda incense burning virus, which can actually invade the banking system, but others in Li Junhe dare not do so. After computer crimes have destroyed the national financial and security information system, it is too late to strengthen security supervision! "