Current location - Trademark Inquiry Complete Network - Trademark registration - Computer virus crime case
Computer virus crime case
Computer viruses are harmful and may lead to crimes, so what are the cases of using computer viruses to commit crimes? The following are the computer virus crime cases I collected, hoping to help everyone ~ ~

Computer virus crime-25-year-old Lu Biwen, from Guangzhou, graduated from high school. During the trial, the court found that Lu Biwen joined China in April 1997? Hacker? Organization. Last year 10 to February, 65438 stole other people's online accounts and used illegal accounts to access the Internet, attacking the Guangzhou host of China public multimedia communication network (i.e.? Sightseeing? Hosted by Guangzhou). After the successful invasion, Lu Biwen obtained the highest authority of the host system and illegally opened two accounts with the highest authority. Since then, he has illegally invaded the host for many times, and carried out a series of illegal operations such as deleting, modifying and adding some of its files, including illegally opening four accounts for his own online use and giving them to others for use, and installing and debugging network security monitoring software (attempted). At the same time, in order to cover up his behavior, he also deleted and modified some records online. What's more, on February 25 and 26 last year, Lv Biwen changed the password of the highest authority of the host system for three times, which led to the failure of the password for three times, resulting in the serious consequences that the management of the host system was out of control 15 hours. In addition, on February 12 last year, Lu Biwen attacked the Blue Sky BBS host and illegally opened a user account with the highest authority for himself after obtaining the highest authority of the host.

After trial, Guangzhou Intermediate People's Court held that the defendant Lu Biwen had constituted the crime of destroying the computer information system.

The perpetrator is Zhao Zhe, 28 years old, who works in Hebei Securities Business Department. On April 16 this year, he fled to the business department of a securities company in Xinzha Road, Shanghai, and used the computer security loopholes of the business department to modify some stock trading data of the business department. As a result, shortly after the stock market opened in the afternoon, Xingye Real Estate and lotus gourmet powder were instantly pulled to the daily limit, and their trading volume also increased significantly. Just for an instant, the prices of these two stocks quickly fell back, causing the stock prices to fluctuate violently in a short time. After the Shanghai Stock Exchange discovered this situation, it found that a securities company in Hainan bought a large amount. Upon inquiry, it was found that the computer system was damaged. Hacker? Invasion. After the verdict was pronounced in the first instance today, Zhao Zhe said: Is the court's decision fair? . This case sounded the alarm for the securities business department that neglected to take precautions.

Domestic college students hackers? Poison? After several days of intense analysis, experts finally uncovered the virus secret of YAI, which is fiercer than CIH. The author is a college student in the computer department of Chongqing University of Posts and Telecommunications. According to Guanqun Gina Virus Monitoring Network, what is the name of this malignant viruses? Secret? . KILL98 domestic virus monitoring network has received hundreds of poisoning reports, which is the most reported this year after the outbreak of CIH virus. It is worth mentioning? Secret? Is the virus the first large-scale epidemic in China? Hacker? Viruses. The case is currently being processed. It is understood that after the computer system is infected with this virus, it can activate the virus without special signs, and then. YAI's files will appear on the computer hard disk. At this time, users should take timely measures to avoid causing greater losses. Experts remind computer users to upgrade anti-virus software online as soon as possible to kill the virus.

Curious high school student hacker punished defendant Ma Qiang is an Anhui native who lives in Zhenjiang City, Jiangsu Province. Last July, 19, 17, out of curiosity, he used his own computer at home, dialed Zhenjiang 169 network with his home phone, used an account, logged in the IP addresses of two servers in Jiangxi 169 multimedia communication network from the internet, illegally downloaded the user password files of the two servers, and used hackers. On June 2 1 day 18, Ma Qiang used the same method mentioned above to log on to the ADM server of Jiangxi 169 network, illegally operated and deleted the system command. On 23rd of the same month 17, Ma Qiang took the same measures mentioned above, resulting in the loss of user data in the hard disk of a host computer. After trial, the court held that the defendant Ma Qiang violated the relevant provisions of the state, deliberately performed improper operations three times, added and modified the data stored in Jiangxi 169 network, and formatted the disk, resulting in the loss of user data in the hard disk. ADM server was interrupted for 30 hours twice for playing computer network, which had serious consequences and bad influence, and constituted the crime of destroying computer information system. According to the provisions of the first paragraph of Article 72 and the second paragraph of Article 73 of the Criminal Law of People's Republic of China (PRC), the defendant Ma Qiang just graduated from high school and has been doing well in school. Out of curiosity and cleverness, he committed a crime carelessly, and after committing a crime, he was able to plead guilty and repent and actively assist the public security organs in obtaining evidence. Moreover, his neighborhood Committee has set up a help and education group and asked the court to give him a lighter sentence, thus forging the above judgment.

Computer Virus Crime Case 2 This year 1 month, when the police of Longhua Mountain Police Station in Xiantao City handled the second-generation ID card, they found that the computer used to handle the second-generation ID card had been poisoned. Even if it is poisoned, it will return to its original appearance. Then, some office computers of the bureau were paralyzed by the panda incense burning virus.

At the same time, the network supervision brigade of the Municipal Public Security Bureau received a report from the Jianghan Hotline Information Center of Xiantao City that a large area of panda incense burning virus appeared in the central server of the website.

This is the first time that a fierce computer virus has appeared in this city, which has caused the network supervision department of this city's public security bureau to attach great importance to relevant data. Since June 5438+February last year, more than 500,000 computers have been infected and poisoned by the panda incense burning virus, and millions of netizens have suffered greatly.

The police also found that Rising's 2006 security report listed panda burning incense as the top of 10 virus, and in the top ten viruses reported by Chinese mainland's computer virus epidemic and Internet security in 2006, the virus became the king of poison.

1October 22nd, the network supervision brigade of 65438 Municipal Public Security Bureau reported the case to the public security bureau chief Yu Pinghui, political commissar Li Peigang and deputy director Ye Tieguan. On June 24th, 65438 1, the bureau officially put on record for investigation, and named it1? 22 cases

Wuhan boy is listed as a major suspect.

Yesterday, Ye Tieguan, deputy director of Xiantao Public Security Bureau, introduced that after the city's network supervision department filed a case, it searched the Internet for relevant information and conducted an analysis and investigation on the computer virus of panda incense burning.

The results show that panda incense burning virus is an infectious worm virus, which can infect files such as execompifsrchtmlasp in the system, stop a large number of antivirus software and firewall software processes, and try to read the download file list of specific websites, and spread quickly through browsing local area network * * * and U disk and other channels.

In addition, the infected computer will restart frequently and a blue screen will appear, the data files in the system hard disk will be destroyed, and the GHO files will be deleted. All exe executable files in the infected user's system will be changed into a panda with three incense sticks.

According to the analysis of the characteristics of virus infection and transmission, the network supervision department of the bureau speculated that the author of panda incense burning virus was written by a team or someone; Or one person makes it up and many people spread it.

The National Computer Virus Emergency Response Center and related information on the Internet show that the computer virus program of Panda Burning Incense bears the signature of whboy Wuhan Boy. After the virus infects the webpage file, it will add code to redirect the webpage to a specific URL.

According to the registration information of this website, the registrant is Hu, a technician of Wuhan network supervision department. According to the analysis, the person who owns all the virus codes should be from Wuhan, which is likely to be closely related to Trojans such as the QQ tail of Wuhan boy that broke out in 2005. The network supervision department of the Municipal Public Security Bureau decided to conduct serial and parallel investigation.

During the investigation, the network supervision department of the bureau obtained relevant information. Whboy is famous for writing the legendary Trojan horse of Wuhan boy, and his works are usually signed by wh boy and Wuhan boy.

Therefore, the network supervision department of the Municipal Public Security Bureau listed Wuhan boy as a major criminal suspect and conducted targeted investigations.

draw in a net

Pretending to buy software to catch Wuhan boys

65438+1 October 3 1 day was established under the command and coordination of the Network Supervision Corps of the Provincial Public Security Department. 22 Task Force

On February 1 day, the task force found out that Wuhan boy and two other project investigators rented in Hongshan District of Wuhan pretended to buy anti-virus software in Wuhan and arrested a seller.

Project police analysis: the seller is a Wuhan guy who was later investigated. This Wuhan boy named Li Jun, male, 25 years old, from Yangluo Town, Xinzhou District, Wuhan, is quite proficient in computers.

On February 2nd, police officers Zhang, Liu Jie and others conducted 24-hour surveillance in a rented HOS house. In the afternoon, the project police studied and implemented the arrest operation, and formulated the arrest plan and interrogation plan.

On February 3, the task force analyzed various signs and found that Wuhan boys might have to flee and arrest them in advance.

At 8: 40 pm on the 3rd, the police of Xiantao City Network Supervision Brigade waiting in the rental house arrested Li Jun who had returned to the rental house to get something, and inspected the rental house.

After a surprise trial, Li Jun confessed his own panda incense burning virus, and the source code of the virus was in the hard disk of a hotel room where he and Lei Lei lived, and admitted to giving a copy of the source code to Lei Lei (male, 25 years old, from Changshan Village, Yangluo Town, Xinzhou District, Wuhan, and Li Jun's classmate).

The project police immediately attacked, captured Lei Lei who was about to escape, and seized items such as laptop hard disk. The national computer virus emergency treatment center identified the extracted source code as the source code of the panda incense burning virus.

Make money to sell and spread the virus for fun.

In September last year, when Li Jun was studying software development in a computer school in Wuhan, he began to make panda incense burning virus 10. After graduation, Li Jun rented a one-room house in Hongshan District, Wuhan, and devoted himself to making panda incense burning virus. In the process of writing, he constantly exchanged writing progress with Lei Lei.

165438+ 10, Li Jun wrote the panda incense burning virus and released the news of selling the panda incense burning virus through QQ group. About 20 sets of each virus were sold online at a price of 500 1000 yuan.

On June 24 this year, at 65438, Lei Lei found Li Jun and told him that the online hype about panda burning incense was very strong and asked him to avoid it.

On the same day, Li Junhe Lei Lei opened a room in a hotel in Wuhan to study panda incense burning together, and Lei Lei continued to sell 2,000 sets of poisonous meat machines for Li Jun online.

On February 4th, the Network Supervision Brigade of Xiantao Public Security Bureau checked the site again, and sent Li Jun Lei Lei back to Xiantao Public Security Department to organize and coordinate the network supervision departments in Shandong, Zhejiang, Yunnan, Guangdong and Guangxi to control and detain the servers of the people involved.

On the evening of 5th, Ye Tieguan, deputy director of Xiantao Public Security Bureau, captured Wang Leyan in Weihai, Shandong Province. After preliminary examination, Wang Leyan confessed that he was the person who spread the panda incense burning virus the most, with an average daily income of more than 7,000 yuan, and the income was equally divided with Li Jun.

Wang Leyan also confessed to two other correspondents, one of whom was called X Fire. With the support of the provincial network supervision corps, Xiantao police learned that it was Xiantao people who claimed to be X fire. That night, the police arrested them at X Fire's home (this person's real name is Wang Zhe). All the way to the special class, the suspect Ye Peixin was arrested in Wenzhou, Zhejiang.

At this time, Wan, the captain of the network supervision brigade who is collecting servers in Nanchang, drove to Lishui, Zhejiang after receiving the notice from the headquarters. The No.3 pursuit class met in Lishui, Zhejiang Province on the evening of the 6 th and arrested the suspect Zhang Shun

After the trial, Li Jun was the producer of the panda incense burning virus, and the other five were sales communicators, aiming at making money for fun.

Li Jun confessed that Panda Incense Burning Virus is a new virus which is a combination of several viruses. It can control computers, make Trojan horses in computers and steal QQ game equipment from other people's computers. After selling, you can still make a profit. Li Jun's maximum daily income is 1 10,000 yuan.

After six suspects were arrested, the police seized more than 654.38 million yuan of money on the spot, including Wang Leyan who bought a jeep with the money.