Centennial operation | Why do Internet cafe computers grow slowly?Because Trojan is "mining"!

Author:Pu'er Network Police Inspecti Time:2022.09.13

I am XX online Internet cafe owner

My Internet cafe

Convenient transportation and luxurious decoration

Computer configuration is superior

Give every customer to fly a general network speed

Home -like care

Somehow

My Internet cafe has always received customers' complaints recently

Team battle must be card, repeatedly send "head"

The customer was scolded as a "pig" teammate

Obviously the top computer

No effect on restarting, reinstallation, no effect

It's better to call the police

Let's reveal the mystery together

According to the "Hundred Days Action" work deployment in accordance with the summer public security blows, recently, Yancheng.com successfully destroyed a hacker gang of illegal control of computer information systems led by Zhang Moutang, seized 475 custom Trojan U disks, hackers, and hackers 1 set of program source code.

Suspicious point: Internet cafe computer collective poisoning

In July of this year, the owner of a Internet cafe in Yancheng, Jiangsu, said: Internet cafe computers are very abnormal and suspected to have been implanted with viruses -the operation speed of the computer becomes very slow, let alone run online games, even normal Internet search is very stuck. Essence

Even more bizarre is that as long as the computer is turned on, even if it does not run any program, the share of computer system resources has reached more than 70%. After self -examination, it was found that the computer host in the Internet cafe was inserted into an unknown U disk.

Shooting: The net police found out the "cause"

After receiving the alarm, the Yancheng Network Security Department launched an investigation immediately.

After the police found that these suspicious U disks were inserted into the host, the computer would be identified as the keyboard by default. It has extremely high concealment and camouflage, and it is difficult for general users to notice it.

Subsequently, the program in the U disk began to automatically conceal the mining program.

Net Police Class: What is mining?

The "mining" on the Internet refers to the "miner" based on the open source software provided by the designer, providing a certain computer computing power. Through complex mathematical operations, the process of finding the equation special solution, and the "miner" who solves the special solution You can get a certain number of virtual currency rewards such as Bitcoin.

The required "shovel" is a computer with high configuration and fast operation speed. "Miner" is also a user who manipulates the computer.

Liang Jian: The police attacked the "black hand"

After the in -depth investigation, the police found out that since June 2022, the suspects of Huai'an criminals Zhang Mantang, Liu Moubo, and Dai Mouxin began to discuss how to use Internet cafes to make money to make money. Hacker Wei, Cao Mou, customized 475 Trojan U disks with a value of 38800 yuan.

The U disk is only the size of the nail cap, which can be disguised as keyboards, mouse and other peripherals, and automatically silently silently customize the operation. It runs high concealment. In order to facilitate the timely grasp of the mining mining of the mining pool through the background, the main criminal Zhang Mantang also requested that Cao was numbered for each U disk when he wrote the program.

After receiving the U disk, three people including Zhang Moutang drove to Yangzhou, Yancheng, Huai'an and other places to find 35 e -sports hotels, chain Internet cafes, and stole 188 U disks to implement illegal control computers for mining.

In just over half a month, the three of them were illegally profitable for more than 40,000 yuan. In Zhang's view, the big buying and selling of chicken eggs has just begun, and it is unknown that a lot of Tianluo Di.com has begun slowly behind him.

After fully grasping the facts of the crime of the hacker gang, Yancheng.com immediately launched a centralized network collection operation and successfully captured five criminal suspects.

The five are currently being detained for suspected illegal control of computer information systems.

Illegal control of computer information systems: violating national regulations, invading national affairs, defense construction, and computer information systems outside the field of cutting -edge science and technology or adopting other technical means to obtain data stored, processed or transmitted in the computer information system, or to the computer If the information system is implemented illegally, the circumstances are severely imprisoned or detained for less than three years, and the fines are ordered or single; if the circumstances are particularly serious, they will be imprisoned for three years and seven years, and the fines will be punished.

- END -

When virtual human rendering only takes a few minutes, the era of industrialization of the universe is coming?

The biggest air outlet in the science and technology circle in 2021 is the Yuan Un...

Zhangjiakou Huailai: Create a big data industry highland

Ji Shi client reports (Hebei Tai Yin Yantao Zhang Long Guo Li is super high) to co...