3.3 million old computers can’t check and verify SMS. Police investigation: What kind of black industrial chain is hidden behind it?
Beijing, China, November 28 (Reporter Li Xingjian from the Central Radio and Television Station) According to the report of China Voice "News Night", many elderly people often choose an "elderly machine" with simple function and low price when choosing a mobile phone. However, some criminals have targeted some unprotected "old-age machines" and implanted virus Trojans to achieve remote control and illegal profits. Recently, the court in Xinchang County, Shaoxing City, Zhejiang Province found that the company of the criminal suspect Wu Mou illegally controlled more than 3.3 million elderly phones, obtained more than 5 million mobile phone verification codes, and made a profit of more than 7.9 million yuan from the sale. The elderly victims were all over 31 provinces, municipalities and autonomous regions in China. The police revealed that not only old machines, but also some children’s watches with communication functions should be wary of such Trojans. What kind of black industrial chain is hidden behind this?
In August last year, in order to take care of her grandmother who is over 80 years old but lives alone, Xiao Zhu of Xinchang County, Zhejiang Province bought her a cheap functional machine online. The so-called function machine is what people often call "the aged machine", which only has basic functions such as answering phones and sending and receiving short messages.
However, when Xiao Zhu changed the package for her mobile phone, she found that the short messages sent by others could be received normally, but the verification code could not be received. Xiao Zhu put the phone card into his mobile phone, and the verification code could be received normally. He suspected that his grandmother’s old machine was equipped with a Trojan horse and immediately called the police.
Chen Yi, deputy head of the network police brigade of Xinchang County Public Security Bureau, said: "The function of inquiring telephone charges is normal, and other short messages are received normally. Once you encounter bank verification codes, including some mobile verification codes, you will not receive them. It is certain that a program in this mobile phone must have blocked the verification code. "
The police conducted an investigation on the online sales of the same brand of elderly phones. The police visited 25 people who bought the same mobile phone locally in Xinchang County and found that there were 15 mobile phones with abnormal SMS sending and receiving. At the same time, the police also conducted a judicial appraisal of the Trojan horse program in the mobile phone. Chen Yi introduced: "The appraisal opinion is that this Trojan has the function of identifying and obtaining all short messages in the mobile phone, which can be blocked according to keywords, and finally the short messages it needs can be uploaded to the server."
The public security organs at Shaoxing and Xinchang levels set up a "8.12" task force for infringing citizens’ personal information led by the network security department. After finding out the organizational structure of the whole criminal gang, they rushed to Shenzhen to control all the people involved in this technology company, and obtained a lot of background server data and contracts for trading with upstream and downstream chains. Li Yun, a policeman handling the case of the Criminal Investigation Detachment of Xinchang County Public Security Bureau, said: "Their data inventory has reached more than 5 million mobile phone numbers, and the total amount of information has reached nearly 50 million. This is a very huge amount of data."
After investigation, this company, with Wu Mou as the general manager, made a Trojan horse program that can control the mobile phone to recognize and intercept short messages, and cooperated with the motherboard manufacturer to implant the Trojan horse program into the mobile phone motherboard. These motherboards with the Trojan horse program entered the mobile phone manufacturer and were finally sold to the elderly.
According to the statistics of the background server of Wu Mou Company, there are more than 3.3 million mobile phone numbers activated by the implanted Trojan horse program, involving more than 4,500 functional model numbers, and the victims are all over 31 provinces, municipalities and autonomous regions in China. Li Yun, a policeman who handled the case, said: "Once this function machine is used by the elderly, it will actively send the mobile phone number to the Wu Mou gang, and the Wu Mou gang will input the number downstream, and then click to receive the verification code after getting the number downstream. They just go to the e-commerce platform ‘ Bonus hunter ’ Yes. "
It is understood that companies in Wu Mou not only use a small number of illegally obtained mobile phone numbers and verification codes to register their own apps and make profits by swiping them, but most of them are sold to "wholesalers" of citizens’ personal information like the "sweet potato" platform.
These platforms are an important part of this black industrial chain, and they are called "code receiving platforms" in the "industry". They buy personal information from companies like Wu Mou at a low price, and sell it to gangs and individuals in "bonus hunter" at a higher price through QQ group and WeChat group, and earn a profit from the difference. Thus, citizens’ personal information enters the "black market" and is bought and sold layer by layer, forming a huge criminal network. The criminal suspect Zou said: "A commodity gains a profit of two or three dollars. If you want to make money, you have to register so many. The model is very simple, that is, reselling and earning the difference."
The cyber security law stipulates that no individual or organization may steal or obtain personal information in other illegal ways, and may not illegally sell or illegally provide personal information to others.
Since June, 2020, Xinchang County Procuratorate has successively filed public prosecutions with Xinchang County Court for Wu Mou and other 70 people suspected of illegal control of computer information systems, infringement of citizens’ personal information and fraud. Recently, the Xinchang County Court made a judgment that Wu Mou was sentenced to four years and six months in prison for the crime of illegally controlling the computer information system, and fined 600,000 yuan, and the illegal income of 6.16 million was recovered; Tong was sentenced to three years in prison for infringing citizens’ personal information, suspended for four years, fined 80,000 yuan, and 70,000 yuan of illegal income was recovered.
The police investigating the case reminded that most smart phones are equipped with mobile phone security assistants and other software, which can identify virus Trojans for killing. However, some elderly machines or children’s smart watches produced by informal manufacturers have hidden dangers of being implanted by Trojans. Look for regular and reliable brand products when buying. "When buying this kind of electronic products for children and the elderly, we still have to choose electronic products that can be trusted by big brands, so that the quality is reliable. And in the process of use, we should pay attention to keeping our personal information, pay attention to confidentiality, and not easily disclose the information to others. "