Centennial operation | Why do Internet cafe computers grow slowly?Because Trojan is "mining"!
Author:Harbin Net Police Inspection L Time:2022.09.13
Source: Network Security Bureau of the Ministry of Public Security
I am XX online Internet cafe owner
My Internet cafe
Convenient transportation and luxurious decoration
Computer configuration is superior
Give every customer to fly a general network speed
Home -like care
Somehow
My Internet cafe has always received customers' complaints recently
Team battle must be card, repeatedly send "head"
The customer was scolded as a "pig" teammate
Obviously the top computer
No effect on restarting, reinstallation, no effect
It's better to call the police
Let's reveal the mystery together
According to the "Hundred Days Action" work deployment in accordance with the summer public security blows, recently, Yancheng.com successfully destroyed a hacker gang of illegal control of computer information systems led by Zhang Moutang, seized 475 custom Trojan U disks, hackers, and hackers 1 set of program source code.
Suspicious point: Internet cafe computer collective poisoning
In July of this year, the owner of a Internet cafe in Yancheng, Jiangsu, said: Internet cafe computers are very abnormal and suspected to have been implanted with viruses -the operation speed of the computer becomes very slow, let alone run online games, even normal Internet search is very stuck. Essence
Even more bizarre is that as long as the computer is turned on, even if it does not run any program, the share of computer system resources has reached more than 70%. After self -examination, it was found that the computer host in the Internet cafe was inserted into an unknown U disk.
Shooting: The net police found out the "cause"
After receiving the alarm, the Yancheng Network Security Department launched an investigation immediately.
After the police found that these suspicious U disks were inserted into the host, the computer would be identified as the keyboard by default. It has extremely high concealment and camouflage, and it is difficult for general users to notice it.
Subsequently, the program in the U disk began to automatically conceal the mining program.
Net Police Class: What is mining?
The "mining" on the Internet refers to the "miner" based on the open source software provided by the designer, providing a certain computer computing power. Through complex mathematical operations, the process of finding the equation special solution, and the "miner" who solves the special solution You can get a certain number of virtual currency rewards such as Bitcoin.
The required "shovel" is a computer with high configuration and fast operation speed. "Miner" is also a user who manipulates the computer.
Liang Jian: The police attacked the "black hand"
After the in -depth investigation, the police found out that since June 2022, the suspects of Huai'an criminals Zhang Mantang, Liu Moubo, and Dai Mouxin began to discuss how to use Internet cafes to make money to make money. Hacker Wei, Cao Mou, customized 475 Trojan U disks with a value of 38800 yuan.
The U disk is only the size of the nail cap, which can be disguised as keyboards, mouse and other peripherals, and automatically silently silently customize the operation. It runs high concealment. In order to facilitate the timely grasp of the mining mining of the mining pool through the background, the main criminal Zhang Mantang also requested that Cao was numbered for each U disk when he wrote the program.
After receiving the U disk, three people including Zhang Moutang drove to Yangzhou, Yancheng, Huai'an and other places to find 35 e -sports hotels, chain Internet cafes, and stole 188 U disks to implement illegal control computers for mining.
In just over half a month, the three of them were illegally profitable for more than 40,000 yuan. In Zhang's view, the big buying and selling of chicken eggs has just begun, and it is unknown that a lot of Tianluo Di.com has begun slowly behind him.
After fully grasping the facts of the crime of the hacker gang, Yancheng.com immediately launched a centralized network collection operation and successfully captured five criminal suspects.
The five are currently being detained for suspected illegal control of computer information systems.
Illegal control of computer information systems: violating national regulations, invading national affairs, defense construction, and computer information systems outside the field of cutting -edge science and technology or adopting other technical means to obtain data stored, processed or transmitted in the computer information system, or to the computer If the information system is implemented illegally, the circumstances are severely imprisoned or detained for less than three years, and the fines are ordered or single; if the circumstances are particularly serious, they will be imprisoned for three years and seven years, and the fines will be punished.
- END -
The State Defense Office and the Emergency Management Department also allocated the central government's flood prevention and drought -resistant materials and equipment to the two provinces
Xinhua News Agency, Beijing, August 20th. On the 20th, reporters learned from the Emergency Management Department that the National Defense Office and the Emergency Management Department, together wit
Shanxi issued 128 million yuan to support rural revitalization projects in the old revolutionary district
A few days ago, news from the Provincial Department of Finance. After research, th...