Sales Trojan Software Invasion Computer Systems to make a profit?Sentence!

Author:Guangzhou Daily Time:2022.09.06

It can be remotely monitoring and stealing data information ... This technology allows some people to see "business opportunities", intending to make a profit by selling homemade "black technology", but you must know that such behavior will face legal responsibility! The reporter learned from the Guangzhou Baiyun Court today that the court has concluded a criminal case of profitable invasion of computer systems due to the sales of Trojan software.

Selling Trojan Software Invasion Company's Computer Information System is sentenced to sentence

In August 2020, after Zhang produced a Trojan software, it sold Trojan software called "Killing the remote control" through the Internet. Others use the Trojan software to illegally invade and control the computer information system of an Internet company.

It has been identified that the Trojan software has the functions of remote control computer systems such as remote monitoring screens, remote record keyboards, and remote drag files.

According to statistics, Zhang's illegal profits selling Trojan software for a total of RMB 17,600.

The Baiyun Court believes that Zhang provides programs and tools that are specially used for invasion and illegal control of computer information systems. The circumstances are serious, and its behavior has constituted the crime of providing invasion and illegal control of computer information system programs and tools. After Zhang returned to the case, he truthfully confessed the facts of the crime and voluntarily pleaded guilty and confession.

To this end, the court ruled that the defendant Zhang provided invasion and illegally controlled computer information system procedures and tools. He sentenced to one year in prison, one year and six months in probation, and fined 10,000 yuan.

According to the supervisor, in the network environment, computer information system controllers often have various security measures such as password protection, firewall, identity authentication, and data encryption. Under the circumstances, ordinary people cannot avoid using ordinary technical means to avoid it. Open or breakthrough. The illegality of "procedures and tools for illegal control of computer information systems" is reflected in the use of cracking, stealing passwords, viruses or backdoor attacks, protocol vulnerabilities and other methods that can be used to avoid, bypass or break through computer information System security measures, without permission, violate the wishes of the computer information system controllers, forcibly or concealed the computer information system of others.

In this case, the Trojan software sold by Zhang is essentially "programs and tools for invasion and illegal control of computer information systems". Illegal control of computer information system programs and tools. According to the nature, circumstances, harmful consequences, and defendant Zhang's guilty attitude and regret performance, the court made the above judgment in accordance with the law.

Cyber ​​security is the people, and network security depends on the people. In the context of Internet big data, while netizens use the Internet and enjoy the convenience of life, it should be known as the prerequisites of data providers' knowledge and consent, data custodians permitted and authorized, compliance with rational and legal use, confidential use, restrictions on diffusion and other rules Below, there are restrictions and legal use. It is also reminded that related Internet companies should raise awareness of security and strengthen cybersecurity measures.

Law link

"Criminal Law of the People's Republic of China"

Article 285 A computer information system that violates national regulations and invades national affairs, national defense construction, and cutting -edge science and technology fields shall be sentenced to imprisonment or detention of less than three years.

In violation of national regulations, computer information systems other than the preceding paragraph or other technical means to obtain data stored, processed or transmitted in the computer information system, or implement illegal control to the computer information system. The following imprisonment or detention, placed or single fines; those who are particularly serious, shall be imprisoned for three years and seven years, and a fine.

Provide programs and tools specializing in invasion and illegal control of computer information systems, or knowing illegal and criminal behaviors of other people's implementation of invasion and illegal control of computer information systems, and providing programs and tools for them.

For the first three crimes of the unit, the unit is punished and the person in charge and other direct responsible persons who are directly responsible for them shall be punished in accordance with the provisions of each paragraph.

Text/Guangzhou Daily · Xinhuacheng Reporter: Articles of Association Correspondent: Yunfa Xuan Tu/Guangzhou Daily · Xinhuacheng Reporter: Articles of Association Guangzhou Daily · Xinhuacheng Editor: Lin Jing

- END -

31 provinces added 144 cases of 108 cases of local confirmed cases.

According to the website of the National Health and Health Commission, at 0-24 o'c...

Exit: Li Gang conducted research on safety production work in Hot Spring Township

On the morning of August 16th, the county chief Li Gang went deep into the hidden ...