In accordance with the "100-day Action" for the crackdown on and rectification of summer public security, Yancheng Network Security has recently successfully destroyed a hacker gang headed by Zhang Moutang that uses hacker technology to illegally control computer information syst

2025/04/1621:55:36 hotcomm 1304

I am the owner of XX online cafe

My Internet cafe

Convenient transportation, luxury decoration

Computer configuration is superior

HD2

HD2

HD2

HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1HD1 l1 Fly the average internet speed for every customer

home general care

In accordance with the

But somehow

My Internet cafe has always received complaints from customers recently

must-have cards for team battles, repeatedly sending "heads"

caused customers to be called "pig" teammates

In accordance with the

obviously is the top-end computer

reboot, reinstalling has no effect

0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 is better to call the alarm

Let’s reveal the answer to the mystery

In accordance with the

In accordance with the "100-day action" work deployment of the "100-day action" for the crackdown and rectification of summer security, recently, Yancheng Network Security successfully destroyed a hacker gang headed by Zhang Moutang that used hacker technology to implement illegal control of computer information systems, seized 475 customized Trojan USB flash drives and 1 set of hacker program source code.

In accordance with the

In accordance with the

sk points: Internet cafe computers were collectively poisoned

In July this year, an Internet cafe owner in Yancheng, Jiangsu reported to the police that the Internet cafe computer was very abnormal and suspected to have been implanted with a virus - the computer's running speed became extremely slow. Not to mention running online games, even normal searches for the Internet are very stuck.

What's more bizarre is that as soon as the computer is turned on, even if no programs are run, the computer system resource share will reach more than 70%. Later, after self-inspection, it was found that all computer hosts in the Internet cafe had USB flash drives of unknown origin plugged in.

In accordance with the

In accordance with the

take action: net police Detailed investigation and found the "cause"

Yancheng network security department immediately launched an investigation after receiving the alarm.

After the police found that these suspicious USB drives were inserted into the host, the computer would recognize them as a keyboard by default, which was extremely concealed and disguised, which was difficult for ordinary users to detect.

Then, the program on the USB flash drive starts to automatically run the mining program hidden.

In accordance with the

Internet Police Classroom: What is mining?

"mining" on the Internet refers to the process of "miners" providing certain computer computing power based on the open source software provided by the designer. Through complex mathematical operations, the process of obtaining the special solution of the equation can obtain a specific number of virtual currency such as Bitcoin and other rewards. The "shovel" required is a computer with a high configuration and a fast enough computing speed, and the "miner" is the user who operates the computer.

In accordance with the

日本1: Police attacked to find out the "black hand"

After in-depth investigation, the police found out that since June 2022, Huai'an suspects Zhang Moutang, Liu Moubo, and Dai Mouxin began to discuss how to use Internet cafe high-end computer mining to make money. Later, they connected with Hebei hackers Wei Mou and Cao Mou through overseas communication tools, and customized 475 Trojan USB flash drives at a value of 38,800 yuan.

This USB disk is only the size of a fingernail, can be disguised as peripherals such as keyboards and mouses, and automatically silent various customized programs, which are highly concealed in operation. In order to facilitate timely grasping the mining situation of mining pool through the backend, the main culprit Zhang Moutang also specifically asked Cao Mou to number each USB flash drive when writing the program.

In accordance with the

In accordance with the

After receiving the USB flash drive, Zhang Moutang and three others drove to Yangzhou , Yancheng , Huaian and other places to find e-sports hotel , 35 chain Internet cafes, and secretly installed 188 USB flash drives and implemented illegal control of computers for mining.

In just over half a month, the three of them made illegal profits of more than 40,000 yuan. In Zhang Moutang's view, the big deal of laying eggs with chickens has just begun, but he didn't know that a net of heaven and earth has slowly unfolded behind him.

In accordance with the

After fully grasping the criminal facts of the hacker gang, the Yancheng network security department immediately launched a centralized network closing operation and successfully arrested 5 criminal suspects.

Currently, all five people are criminally detained for suspected illegally controlling computer information systems .

Illegal control of computer information systems: Violate national regulations, invade computer information systems outside the fields of state affairs, national defense construction, cutting-edge science and technology, or use other technical means to obtain data stored, processed or transmitted in the computer information system, or implement illegal control of the computer information system, and the circumstances are serious, they shall be sentenced to fixed-term imprisonment of not more than three years or detention, and shall be fined alone; if the circumstances are particularly serious, they shall be sentenced to fixed-term imprisonment of not more than three years but not more than seven years, and shall be fined.

In accordance with the

picture | Internet screenshot

material | Jiangsu Internet Police

Edit | Han Zhihua

hotcomm Category Latest News