Current location - Quotes Website - Signature design - Computer virus crime cases
Computer virus crime cases

Computer viruses are very harmful and may lead to crimes. So what are the cases of using computer viruses to commit crimes? Below are the computer virus crime cases that I have collected. I hope it will be helpful to everyone~~ Computer virus crimes Case 1

25-year-old Lu Xuwen is from Guangzhou and graduated from high school. During the trial, the court found that Lu Xuwen joined a domestic hacker organization in April 1997. From January to February last year, he stole other people's online accounts and used illegal accounts for online activities, and attacked the Guangzhou host of the China Public Multimedia Communication Network (i.e., the Guangzhou host of "Visual Listening"). After the successful intrusion, Lu Xuwen obtained the highest authority of the host system and illegally opened two accounts with the highest authority. After that, he illegally invaded the host many times and performed a series of illegal operations such as deleting, modifying, and adding some of its files, including illegally opening four accounts for his own Internet use and giving them to others for use, installing and debugging network security monitoring Software (attempted). At the same time, in order to cover up his behavior, he also deleted and modified some of his online records. What's more serious is that Lu Xuwen changed the password of the highest authority of the host system three times on February 25 and 26 last year, causing the password to become invalid three times, resulting in serious consequences of the host system management being out of control for a total of 15 hours. . In addition, Lu Xuwen also attacked the Blue Sky BBS host on February 12 last year. After obtaining the highest authority of the host, he illegally opened a highest authority user account for himself.

After trial, the Guangzhou Intermediate People’s Court held that the defendant Lu Xuwen had committed the crime of damaging computer information systems.

The perpetrator, Zhao Zhe, is 28 years old and works in a Hebei securities sales department in Shanghai. On April 16 this year, he went to the sales department of a securities company on Xinzha Road, Shanghai, and took advantage of the vulnerabilities in the computer security of the sales department to modify some of the stock trading data of the sales department. As a result, shortly after the stock market opened in the afternoon, two companies, Industrial Real Estate and Lotus MSG, The stock was instantly pulled to the daily limit, and trading volume also increased sharply. After only a moment, the prices of these two stocks fell back quickly, causing the stock prices to fluctuate violently in a short period of time. After the Shanghai Stock Exchange discovered this situation, it was determined that it was caused by a large buying order from a securities company in Hainan. After enquiry, it was found that the computer system had been invaded by hackers. After the first-instance verdict today, Zhao Zhe said: "The court's decision is fair." This case sounded the alarm to the securities business department that had neglected to take precautions.

After several days of intense analysis, experts finally revealed the secret of YAI, a virus that is more ferocious than CIH. The author is a computer scientist from Chongqing University of Posts and Telecommunications. College students. According to the Guanqun Jinchen Virus Monitoring Network, this vicious virus is called "Secret". The KILL98 domestic virus monitoring network has received hundreds of virus infection reports, which is the largest number of virus infection reports this year after the CIH virus outbreak. It is worth mentioning that the "Secret" virus is the first large-scale popular "hacker" virus written in China. The case is currently being processed. It is understood that after a computer system is infected with this virus, the virus can be activated without special signs. At this time, a .YAI file will appear on the computer hard drive. At this time, users should take timely measures to avoid causing greater losses. Experts remind computer users to upgrade their anti-virus on the Internet as soon as possible to detect and kill this virus.

Curious high school student hacker was punished. The defendant, Ma Qiang, is from Anhui and lives in Zhenjiang City, Jiangsu Province. At 17:00 on July 19 last year, out of curiosity, he used his computer at home, used his home phone to dial up the Zhenjiang 169 network, and used a certain account to log in to the IP addresses of two servers in the Jiangxi 169 Multimedia Communication Network from the Internet. Illegally downloaded user password files from two servers, used hacker software to decipher some user passwords, and edited and modified the files to gain superuser management rights in the ADM server. At 18:00 on the 21st of the same month, Ma Qiang used the same method as above to log into the Jiangxi 169 ADM server, performed illegal operations, and deleted system commands.

At 17:00 on the 23rd of the same month, Ma Qiang adopted the same method mentioned above, causing the loss of user data in a host hard drive. After trial, the court held that the defendant Ma Qiang violated relevant national regulations and deliberately performed improper operations three times, adding and modifying the data stored in the Jiangxi Province 169 network and formatting the disk, resulting in the loss of user data in the hard disk. Because he played with the computer network, causing the ADM server to interrupt service for 30 hours twice, the consequences were serious and the impact was bad, constituting the crime of damaging computer information systems. According to the provisions of Paragraph 1 of Article 72 and Paragraph 2 of Article 73 of the Criminal Law of the People's Republic of China and the People's Republic of China, given that the defendant Ma Qiang had just graduated from high school and had always performed very well in school, out of curiosity, The above-mentioned judgment was made because he had the motive of being clever and committed an accidental crime. After committing the crime, he was able to plead guilty, repent, and actively assist the public security organs in collecting evidence. Moreover, the neighborhood committee where he was located has established a counseling group and requested the court to give a lighter sentence.

Computer virus crime case 2

In January this year, when the police from Longhuashan Police Station in Xiantao City were applying for second-generation ID cards, they found that the computer used to apply for the second-generation ID cards had been poisoned. Even after killing the virus, the police Immediately afterwards, some office computers in the bureau were also paralyzed due to the Panda Burning Incense virus

At the same time, the Internet Supervision Team of the Municipal Public Security Bureau received a report from the Jianghan Hotline Information Center of Xiantao City. , the central server of the website was infected with the Panda Burning Incense Virus

This fierce computer virus appeared for the first time in the city, which attracted the attention of the Internet Supervision Department of the city’s Public Security Bureau. Relevant data shows that since Since December last year, more than 500,000 computers have been infected by the Panda Burning Incense virus, and millions of netizens have suffered greatly.

The police also found that the Rising 2006 security report listed Panda Burning Incense as one of the 10 The number one virus among the top ten viruses in the 2006 Computer Virus Epidemic and Internet Security Report in Mainland China, this virus became the poison king in one fell swoop

On January 22, the Internet Supervision Brigade of the city’s Public Security Bureau will The case was reported to Public Security Director Yu Pinghui, political commissar Li Peigang and deputy director Ye Tieguan. On January 24, the bureau formally opened the case for investigation and named it Case 1?22

The Wuhan boy was listed as a major suspect

Yesterday, Ye Tieguan, deputy director of the Xiantao City Public Security Bureau, introduced that after the case was filed, the city’s Internet Supervision Department searched the Internet for relevant information and conducted an analysis and investigation of the Panda Burning Incense computer virus

As a result, it was found that Panda The Burning Incense virus is an infectious worm that can infect files such as execcompifsrchtmlasp in the system, terminate a large number of anti-virus software and firewall software processes, and will try to read the list of downloaded files on a specific website, and share and share files on the LAN through web browsing. Rapid spread through U disk and other ways

In addition, the infected computer will have a blue screen and frequently restart, and the data files in the system hard disk will be damaged, the GHO file will be deleted, etc. All the infected user systems will The exe executable files have all been changed to look like pandas holding three incense sticks

Based on the analysis of the infection and spread characteristics of the virus, the Internet Supervision Department of the bureau speculated that the author of the Panda Incense Burning Virus is a team or One person writes it; or one person compiles it and many people spread it again

The National Computer Virus Emergency Response Center and related information on the Internet show that the Panda Burning Incense computer virus program has the signature of whboy, a boy from Wuhan, and the virus After infecting a web page file, a piece of code will be added to the web page to redirect the web page to a specific URL

The registration information of the website shows that the registrant is from Wuhan Internet Supervision Department technical staff Hu Hongyi and Liu Jie analyzed that the person who has all the virus codes The person, who should be from Wuhan, is very likely to be closely related to the Wuhan Boy QQ Tail and other Trojans that broke out in 2005. The Internet Supervision Department of the city’s Public Security Bureau decided to conduct a parallel case investigation.

During the investigation, the The Internet Supervision Department of the Bureau obtained relevant information. wh鄄boy is famous for writing about the legendary Trojan of Wuhan Boy, and his works are usually signed with whboy and Wuhan Boy.

Therefore, the Internet Supervision Department of the Municipal Public Security Bureau listed Wuhan Boy as Conducting targeted investigations on major criminal suspects

Closing the net

Pretending to purchase software to fish out the Wuhan boy

On January 31, at the Provincial Public Security Department Under the command and coordination of the Network Surveillance Team, the 1?22 task force was established

On February 1, the task force conducted an investigation and visited and found out that the Wuhan boy and two other people were renting together in Wuhan. Special investigators from Hongshan District pretended to buy anti-virus software in Wuhan and fished out a seller

Special police analysis: The seller was a boy from Wuhan. After investigation, the boy from Wuhan was named Li Jun, male, 25 Years old, from Yangluo Town, Xinzhou District, Wuhan City, proficient in computers

On February 2, police Zhang Liangyao, Liu Jie and others arrested Li Jun for renting a home-ownership house and executed him for 24 days.

On the afternoon of the day of hourly monitoring, the police on the special project studied and implemented the arrest operation and formulated an arrest plan and an interrogation plan.

On February 3, the task force analyzed various signs and concluded that the Wuhan boy may want to flee and the arrest operation must be carried out. Proceed in advance

At 8:40 pm on the 3rd, the police from the Xiantao Internet Supervision Brigade who were waiting in the rental house captured Li Jun who returned to the rental house to pick up things and conducted an inspection of the rental house

p>

After a sudden interrogation, Li Jun confessed that he wrote the panda incense burning virus, and that the source code of the virus was on the hard drive of a hotel room where he and Lei Lei lived. He also admitted that he had given a copy of the source code to Lei Lei (male, 25 years old, from Changshan Village, Yangluo Town, Xinzhou District, Wuhan, Li Jun’s classmate)

The police on the special case immediately attacked and captured Lei Lei who was about to flee, and extracted the laptop hard drive and other items from the National Computer The Virus Emergency Response Center identified the extracted source code and determined that the source code was the source code of the Panda Burning Incense Virus

Spreading the virus for fun and making money

In September last year, Li Jun was working in a certain company in Wuhan When he was studying software development in computer school, he started making the Panda Burning Virus. In October, after graduating, Li Jun rented a single house in Hongshan District, Wuhan, and devoted himself to making the Panda Burning Virus. During the writing process, he constantly communicated with Lei Lei about the writing progress

In November, Li Jun finished writing the panda incense-burning virus and announced the sale of the panda incense-burning virus through the QQ group. He sold about 20 sets of the panda incense-burning virus online at a price of 5,001,000 yuan per virus

On January 24 this year, Lei Lei found Li Jun and told him that the online hype about panda burning incense was very powerful and asked him to avoid it

On that day, Li Jun and Lei Lei booked a room in a hotel in Wuhan and went together. After studying panda burning incense, Lei Lei continued to sell 2,000 poisoned meat machines online for Li Jun

On February 4, the Internet Supervision Team of the Xiantao City Public Security Bureau inspected the scene again and removed Li Jun and Lei Lei. Escorted back to Xiantao, the Ministry of Public Security organized and coordinated the Internet surveillance departments of Shandong, Zhejiang, Yunnan, Guangdong, Guangxi and other places to implement control and seizure of the servers of the persons involved

On the evening of the 5th, Ye Tieguan, deputy director of the Xiantao Public Security Bureau, detained Wang Lei in Weihai, Shandong After being captured and initially interrogated, Wang Lei confessed that he was the person who spread the panda incense-burning virus the most, earning an average of more than 7,000 yuan a day, and the income was shared equally with Li Jun

Wang Lei also confessed to two other spreaders, one of whom was named X Huo. With the support of the Provincial Network Supervision Team, the Xiantao police learned that the person claiming to be Ye Peixin was captured

At this time, Wan Zhengming, the captain of the Internet surveillance team who was seizing the server in Nanchang, drove to Lishui, Zhejiang after receiving the notice from the headquarters. The 3rd pursuit team met in Lishui, Zhejiang 6 That night, the suspect Zhang Shun was captured

After interrogation, Li Jun was the creator of the panda incense virus, and the other five were sales disseminators, whose purpose was to have fun and make money

Li Jun According to the explanation, the Panda Incense Burning Virus merged several viruses together and evolved into a new virus to control the computer, create Trojan horse programs in the computer, steal QQ game equipment from other people's computers, etc., and then sell them for profit. Li Junyiyi The highest income reached 10,000 yuan

When the six suspects were arrested, the police confiscated more than 100,000 yuan on site, of which Wang Lei used the stolen money to buy a jeep