100 million netizens in China have been “fished” and hacked to form an industrial chain

In the first half of this year, over 40% of Internet users in China were attacked by cyberspace. The hacking has led to the formation of an illegal industrial chain. 100 million Internet users have been “fished”

● A Trojan horse can control millions of broiler-controlled "broiler chicken" computers. ● In the first half of this year, there were 217 million Chinese Internet users attacked by viruses. ● Behind the network attacks is a black interest chain: creating viruses, spreading viruses, and stealing information. A group of illegal “knights” who are active in the Internet and sell money through attacks on private servers of online games and illegally make profits of 70 million yuan, and they are mostly “80s” of high school and junior high school culture. Recently, the case of the illegally hacked computer information system that was cracked by the Chongqing Municipal Public Security Bureau's Cyber ​​Security Supervision Corps had brought a public prosecution to the court.

This cyber attack case is only a microcosm of China’s severe Internet security situation. With the development of the Internet, especially the rapid rise of e-commerce, China's cyber security has been seriously threatened. Hackers' attacks and revenues have even formed a huge black industrial chain.

In the first half of the year, 2.18 million ultra-five phishing websites were fake banks and fake winning websites. According to the “Statistical Report on the 28th Internet Development in China” released by China Internet Network Information Center (CNNIC), in the first half of 2011, Chinese Internet users who had been attacked by viruses reached 217 million, accounting for 44.7%; Internet users who had experienced account number or password theft reached 121 million, accounting for 24.9%, which was 3.1% more than in 2010; 8% of Internet users encountered Online consumer fraud, the group reached 38.8 million.

According to the Internet security report released by Rising Co., Ltd. in the first half of 2011, the number of newly added viruses in China’s Internet in the first half of the year increased by 25.2% year-on-year, of which 4,042,499 were Trojans, accounting for 76.12%. 2.18 million phishing websites have been added, and more than 100 million Internet users have been invaded. The direct economic losses caused by this phenomenon are at least 10 billion yuan.

In addition, the data disclosed by the National Internet Emergency Response Center at the recently held “Computer Network Security Annual Meeting” showed that many of the hacking attacks on China came from abroad. In 2010, the National Internet Emergency Response Center monitored a total of nearly 480,000 Trojan-horse-controlled IPs, of which 221,000 were overseas; the monitoring found 137,82 botnet control-side IPs, and 6,531 were overseas. In addition, the data submitted by members of the Internet and Security Information Circular of the Ministry of Industry and Information Technology shows that more than half of the malicious domain names used by illegal activities such as webpage bans and phishing carried out in China in 2010 were registered overseas.

According to Hu Junqing, a network expert at Beijing Beilong Technology (Beijing) Technology Co., Ltd., the current methods of attacking the Internet by hackers are mainly through the following methods and methods.

First, phishing attacks: Obtain sensitive personal information, such as passwords, credit card details, etc., through fraudulent means (such as making false websites and tapping into website databases). It mainly focuses on three areas: online trading, instant messaging, and financial securities. Second, the Trojan virus attack: lurking client computers, stealing user passwords, credit cards and other information, which is also a phishing attack. Third, direct attacks on corporate website databases: Using corporate website database security vulnerabilities, stealing customer data and selling to website competitors.

“The data released by the China Anti-phishing Website Coalition shows that as of the end of February 2011, the League Secretariat has identified and processed 39,954 phishing websites. Phishing websites have become another major 'Internet cancer' after the virus.” Hu Junqing said. According to reports, the ranking of phishing websites was ranked as follows: fake bank websites accounted for 33%; fake winning websites accounted for 29%; fake shopping websites accounted for 19%; fake game websites accounted for 7%.

The business purpose of cyber attacks highlights the “safeguarding” of individual companies for safety. It is worth noting that in recent years, commercialized, large-scale, premeditated cyber attacks have gradually increased, and a black industrial chain has been formed: the production of viruses and the spread of viruses. , Steal information, sell money, and launder money.

"In fact, after 2000, large-scale cyber attacks have gradually increased. The commercial purpose of cyber attacks has become more and more obvious," said Liu Deliang, a professor at Beijing Normal University who has been working in the field of cyber security law for many years.

According to Rising's report, cyber attacks against companies have only increased in the first half of this year. Marriage websites, e-commerce websites, and group-buying websites have become the focus of hacking attacks. Because these websites store a large amount of user information, purchase behavior information, bank and credit card information, etc., hackers can take advantage of this. "Because the attacks are very common, individual Internet companies and many SMEs whose own defense forces are weak have to pay only 'protection fees' to avoid attacks and exchange network security," said Liu Deliang.

Hu Junqing believes that the online black industry chain with a clear division of labor is now formed on the Internet and is being developed in an organized, large-scale, and open manner. First, hackers produce Trojan horses and then sell them to criminals; criminals pass various Means to disseminate, control the user's machine, sometimes a Trojan virus can control millions of "broiler chicken" computer (referred to by hackers, Trojan virus planted computer, hackers can manipulate and use it to do anything), and then The control of the "broiler" computer is sold to people in need for attacking competitors' websites and snatching customers. In addition, criminals also use the Trojan horse to record user's login account, bank account number, and other information, transfer the user's virtual property and bank deposits.

Security legislation lags behind many illegal intrusions. In contrast to the increasingly stringent network security situation outside the criminal law system, China's cyber security legislation is lagging behind.

"At present, there are no cyber security legislations. For example, software and hardware production, procurement, market inspections, cyber security personnel awareness, and Internet specifications are all concerns that the network legislation should pay attention to." Liu Deliang believes that there are existing laws on cyber security. The importance of importance is not enough.

“For example, the criminal law’s regulations on cybercrime are mainly focused on the provisions of Articles 285, 286, and 287. Actually, judging from the expression of Article 287, it regards the Internet as a criminal tool, not as a new one. In accordance with the current criminal law, in addition to the computer information systems in the fields of illegally invading the country, national defense construction, and advanced science and technology, other illegal intrusions are basically detached from the criminal law system. The vast majority of the production, distribution and sale of dangerous or dangerous procedures cannot be applied," said Liu Deliang.

Another outstanding problem is that there are many departmental rules and opinions, such as cyber violence, market access of online entities, etc., but they have not risen to the legal level. "In the Tort Liability Act, which came into force on July 1, 2010, online infringement is basically not reflected," said Liu Deliang.

Relevant experts also pointed out that the issue of Internet security integrity requires the government's relevant management departments, Internet-related companies, and all Internet users to act together. Only by perfecting the cyber security legislation and perfecting the domain name security protection mechanism can we really establish a comprehensive prevention mechanism.

High Voltage Power Resistor

High Voltage Power Resistor are designed to withstand and dissipate large amounts of power. Usually the releated power is at least 5watts and up to 500watts. It has Excellent high-frequency characteristics and suited for Radar system and Broadcasting transmit devices, .etc.

High Voltage Polypropylene Capacitor,High Voltage Tubular Resistor,HV thick-film Resistor,Thick Film Power Resistor

XIAN STATE ELECTRONICS TECHNOLOGY CORP. , https://www.shvcomponents.com