In accordance with the "100-day Action" for the crackdown on and rectification of summer public security, Yancheng Network Security has recently successfully destroyed a hacker gang headed by Zhang Moutang that uses hacker technology to illegally control computer information syst

I am the owner of XX online cafe

My Internet cafe

Convenient transportation, luxurious decoration, superior computer configuration

Give every customer a normal network speed

home general care

But somehow

My Internet cafe has always received complaints from customers recently

team battles must card, repeatedly sending "heads"

causing customers to be Teammates of "pig"

is obviously the top-end computer

Restart and reinstalling has no curative effect

Why not call the police?

Let's reveal the answer to the mystery

In accordance with the "100-day action" work deployment of the "100-day action" for the summer public security crackdown and rectification, recently, Yancheng Network Security successfully destroyed a hacker gang headed by Zhang Moutang that used hacker technology to implement illegal control of computer information systems, seized 475 customized Trojan USB flash drives and 1 set of hacker program source code.

Question: Internet cafe computers are collectively poisoned

In July this year, an Internet cafe owner in Yancheng, Jiangsu reported to the police that the Internet cafe computer is very abnormal and is suspected to have been implanted with a virus - the computer's running speed has become extremely slow. Not to mention running online games, even normal searches on the Internet are very stuck.

What's more bizarre is that as soon as the computer is turned on, even if no programs are run, the computer system resource share will reach more than 70%. Later, after self-inspection, it was found that all computer hosts in the Internet cafe had USB flash drives of unknown origin plugged in.

take action: network police detailed investigation and found the "cause"

Yancheng network security department immediately launched an investigation after receiving the alarm.

After the police found that these suspicious USB flash drives were inserted into the host, the computer would recognize them as a keyboard by default, which was extremely concealed and disguised, which was difficult for ordinary users to detect.

Then, the program on the USB flash drive starts to automatically run mining programs hiddenly.

Internet Police Class: What is mining?

"mining" on the Internet refers to the process of "miners" providing certain computer computing power based on the open source software provided by the designer. Through complex mathematical operations, the process of obtaining the special solution of the equation can obtain a specific number of virtual currency such as Bitcoin and other rewards. The "shovel" required is a computer with a high configuration and fast enough computing speed, and the "miner" is the user who operates the computer.

draws the sword: the police attacked and found out the "black hand"

After in-depth investigation, the police found out that since June 2022, the suspects Zhang Moutang, Liu Moubo and Dai Mouxin have begun to discuss how to use high-end computers for Internet cafes to make money. Later, they contacted Hebei hackers Wei Mou and Cao Mou through overseas communication tools, and customized 475 Trojan USB flash drives at a value of 38,800 yuan.

This USB flash drive is only the size of a fingernail, can be disguised as peripherals such as keyboards and mouses, and automatically silent various customized programs, which are highly concealed in operation. In order to facilitate timely grasping the mining situation of mining pool through the backend, the main culprit Zhang Moutang also specifically asked Cao Mou to number each USB flash drive when writing the program.

After receiving the USB flash drive, Zhang Moutang and three others drove to Yangzhou , Yancheng , Huaian and other places to find 35 e-sports hotels and chain Internet cafes, and secretly installed 188 USB flash drives and implemented illegal control of computers for mining.

In just over half a month, the three of them made illegal profits of more than 40,000 yuan. In Zhang Moutang's view, the big deal of laying eggs with chickens has just begun, but he didn't know that a net of heaven and earth has slowly unfolded behind him.

After fully grasping the criminal facts of the hacker gang, the Yancheng cybersecurity department immediately launched a centralized network closing operation and successfully arrested 5 criminal suspects.

Currently, all five people are criminally detained for suspected illegally controlling computer information systems .

Illegal control of computer information systems: Violating national regulations, invading computer information systems outside the fields of state affairs, national defense construction, cutting-edge science and technology, or using other technical means to obtain data stored, processed or transmitted in the computer information system, or implementing illegal control of the computer information system, and the circumstances are serious, they shall be sentenced to fixed-term imprisonment of not more than three years or detention, and shall be fined or single; if the circumstances are particularly serious, they shall be sentenced to fixed-term imprisonment of not more than three years but not more than seven years, and shall be fined.

pictures | Internet screenshot

material | Jiangsu Internet Police

Source: Ministry of Public Security Network Security Bureau