The "Panda Burning Incense" virus that broke out on a large scale in December 2006 caused serious harm: According to statistics, millions of computers across the country were infected, and thousands of companies were harmed... ... But no matter how cunning the fox is, he can't escape the hunter's eyes. The reporter learned that on January 22 this year, on the same day that the National Computer Virus Emergency Response Center issued another alarm, and on the same day that "Panda Burning Incense" was wanted across the country, Xiantao police discovered the source code of the virus, and officially launched it on January 24. The case was filed, and on February 7, all six suspects including Li Jun were arrested, which took less than half a month. Hu Hongyi, instructor of Xiantao Public Security Internet Surveillance Brigade, said, "The vast majority of netizens have a misunderstanding, thinking that no one will know what they do online. In fact, even if you write a virus, there are traces." "Panda Burning Incense" Virus The special "signature" in the code - WHBOY (Wuhan Boy) - provides important clues for detecting the case. In addition, after the "Panda Burning Incense" virus infects the web page file, it will add a piece of code to the web page to redirect the web page to a specific URL, and the registration information of the website showed that the registrant was from Wuhan, so the police quickly analyzed that the person with all the virus codes should be from Wuhan, and was likely to be related to the "Wuhan Boy", "QQ Tail", etc. that broke out in 2005 Trojan viruses have a lot to do with it. Pi Yong, a professor at Wuhan University Law School, said: "Many netizens in our country have weak legal awareness and believe that they can be lawless online. While strengthening publicity and education, the country must show its strength in controlling the Internet by solving major cases in order to prevent computer crimes. and the role of deterrence.” Zhao Junxin, a professor at the School of Law of Zhongnan University of Economics and Law, said that if you deliberately create and spread computer viruses and other destructive programs to invade other people’s systems and cause serious consequences, such as system crashes and inability to operate normally, you will be punished in accordance with the regulations. Penalties are provided in Article 286 of the Criminal Law: Those who constitute the crime of damaging computer systems shall be sentenced to fixed-term imprisonment of not more than 5 years or criminal detention; if the consequences are particularly serious, they shall be sentenced to fixed-term imprisonment of not less than 5 years. Producer - Middleman - Buyer Vulnerability 2: How to cut off the "industry chain" of Internet viruses? Li Jun usually lives in seclusion, but spends money extremely lavishly, even spending tens of thousands of yuan a day, mainly for flying to meet netizens in other places. It is understood that the deposit amount on Li Jun's bank card account once reached a maximum of more than 400,000 yuan. As an unemployed person, his income mainly comes from spreading the "Panda Burning Incense" virus. How did Li Jun make money from viruses? "In fact, Li Jun directly sold the 'Panda Burning Incense' virus only 10 to 20 times, and the selling price was only about 500 yuan. He mainly made money by selling 'broiler chickens', which relied on an illegal 'industrial chain.'" Xiantao City Police Ye Tieguan, deputy director of the bureau, said that after a computer is infected by the "Panda Burning Incense" virus, it is equivalent to destroying all information protection capabilities and becoming a "broiler chicken" for slaughter. "If 'broiler' is compared to a house, Li Jun is the one who holds the key. He uses the key to open the door and lets the person who pays him go in and steal things." Zhang Liangyao, deputy captain of Xiantao Public Security Network Surveillance Brigade, explained, This "industrial chain" includes virus producer Li Jun, middlemen, virus buyers (horse-mongers), "recipients", "letter openers" and other links. Its operation mode is roughly as follows: Li Jun needs to rewrite his virus program code according to "market needs" to control the infected computer to automatically access the website of the virus buyer. The "horse-hanger" hangs a Trojan horse program on the website to invade the infected computer. The program "steals" QQ coins, game equipment and other items from the poisoned computer and sends them to the "recipient" via email. The "recipient" then resells these valuable emails to the "email opener". "After selling "virtual assets", real money was obtained... After being arrested, a "horse-affiliated person" confessed: "I am a traffic manager with amazing users. I know that making money in this industry is faster than real estate.
"In this chain, Li Jun is actually not the one who makes the most money," said Wan Zhengmin, captain of Xiantao Public Security Network Surveillance Brigade. "A notable feature of current computer crimes is that they have begun to develop from showing off technology and capabilities to illegal The purpose is to make profits, and some cases show that the spread of the virus has formed a one-stop, clustered industrial chain, which deserves the vigilance and in-depth study of the public security departments. " There are already viruses that can invade the banking system. Vulnerability 3: How many more "patches" do we need to apply to protect network information security? "He is a network genius," experts from the Network Supervision Team of the Hubei Provincial Public Security Department described Li Jun. But in the detention center However, Li Jun said "modestly": "Actually, the virus can spread so fast mainly because netizens have poor information security awareness. If they are regularly 'patched', computers will not be infected so easily." " However, Teacher Gong from Hubei Police College said, "Anti-virus software will always lag behind the emergence of viruses. Although anti-virus software and even network legislation are necessary, establishing network morality and network order is the fundamental solution." Professor Pi Yong said, "Technically, the fight against viruses is endless. You mutate once, I upgrade, and then mutate again, and then again. It is always criminals and anti-virus software manufacturers who profit from upgrading. And who will make up for the loss of social resources? "The lag in legislation has also become a concern for the Internet police: The criminal suspect has been caught, but how to convict and sentence him? Zhang Liangyao said that according to the law, those who spread the virus must be sentenced according to the severity of the consequences, but the "Panda Burning Incense" virus caused How should the consequences be measured? There are millions of victims, how can it be possible to provide evidence one by one? Secondly, most of the stolen items are "virtual property" such as game equipment. Even if everyone knows that an equipment is worth 10,000 yuan, as long as it is not If it becomes a real currency, it does not constitute a "theft crime", which may lead to light sentences or difficulty in convicting many suspects other than Li Jun. When it comes to the current situation of network information security in our country, Hu Hongyi is not optimistic, "In fact, some thefts have occurred. Cases of online banking passwords have already occurred. Another example is the Panda Burning Incense Virus, which can actually invade the banking system, but Li Jun and others did not dare to do it. If you wait until computer crimes destroy national financial, security and other information systems before strengthening security supervision, it will be too late! ”
Lvyuan is in this life, and Han loves this world.
▲. ▲.〆〆〆Tears and deer?
Lu Han: My life?
Deer deer ▁メ
Hello, the picture above is your signature;
If you are satisfied with the signature sent, please accept my answer.