Shaoxing Yuecheng: 82 people were arrested for the "1.03" network "Black Production" series project.
Recently, the Yuecheng District Procuratorate of Shaoxing City, Zhejiang Province prosecuted Dong Jianwei, Wu Bo, Zhao Xueyan and Bian Chunjing for alleged fraud. This is the first batch of criminal suspects prosecuted in the "1.03" network "black production" series project supervised by the Ministry of Public Security.
Previously, the court approved the arrest of 82 suspects, including Li Qi, Yang Kequn, Zhang Xin and Zhang Mingwei, on suspicion of providing programs and tools to invade and illegally control computer information systems, illegally obtaining computer information system data, illegally invading computer information systems, and infringing citizens' personal information. At present, except for Dong Jianwei and other four people who have been prosecuted, the rest are under review and prosecution.
According to reports, the number of people involved in the "1.03" network "black production" series project is 160, and the victims are spread all over more than 20 provinces, autonomous regions and municipalities directly under the central government, involving more than 20 million yuan. In this case, there is a phenomenon of black industrial chain that steals data, uses artificial intelligence to sneak into the library, distributes data, impersonates fraud, and then launders money. Sunbathing, automatic positioning, intelligent chat. What kind of mystery is hidden behind the case?
"Friends and relatives" payment trap
The story of the case originated from the report of a Shaoxing victim. "Can you help me pay?" One night in February this year, Yu, who lives in downtown Shaoxing, was surfing the Internet when he suddenly received a message from a good friend on his QQ. My friend and Zou said that her Alipay could not be used, and she wanted Zou to pay for it, and then put the money in Zou's bank card. Because Zou and his friends have a good relationship on weekdays, they believe it without much thought. A * * * helped him pay six items worth nearly 2000 yuan. In the meantime, Zou also received a screenshot of a successful bank transfer from a friend. My friend said that because it is an inter-bank transfer, the money will be delayed. But until the next day, Zou's account did not receive the money. So Zou called a friend, who said that his QQ number had been stolen. Zou realized that he had been cheated, so he reported the case to the public security organ.
The same thing happened to Wang. He received a message from his brother on QQ and asked him if Alipay had any money to help him pay. Since it is my brother's QQ number, Wang has no doubt. After adding Alipay friends to each other, five items were paid for him, totaling 1600 yuan. The younger brother said that he would transfer the money to Wang immediately. The next morning, Wang's bank card still didn't receive the money. Wang called his younger brother again, and the younger brother said he didn't ask Wang to pay anything for him. When Wang went to QQ again, he found that the QQ number he chatted with last night had deleted him.
After accepting the case, the public security organ quickly arrested the suspect. Through further digging into the case, the public security organs found a platform called "Quick Questions and Answers", and a huge network black industrial chain gradually surfaced.
Artificial intelligence coding platform
"Hidden database" is an important link in the network black industry chain, that is, after the criminal suspect steals the website database, he correctly filters out the valuable data corresponding to the account password through verification. The core obstacle of "tanning" is the verification code security system set by Internet companies. In order to meet the needs of hundreds of millions of "drying", improve the efficiency of "drying", break through the security system of verification code set by Internet companies, and identify in batches, the professional service of "coding platform" came into being.
In the "1.03" network "Black Production" series project, the criminal suspects Li Qi and Yang Kequn set up a "quick answer" platform to provide automatic identification service for a group of database readers. The platform has a very high recognition accuracy of verification code, and the recognition accuracy of verification code is over 95%. At the same time, the suspects Zhang,, and so on. Dock the sheet drying software "Teddy" and "Little Mouse" with the "Quick Answer" platform to realize the batch sheet drying function. Zhang Mingwei and other 10 people, as "scammers", use scammer software and "quick answer" platform to automatically match a large number of accounts and passwords, break through the verification code security system of Internet companies, obtain a large number of website background data and citizens' personal information, including QQ accounts and passwords, QQ mailboxes and passwords, QQ friends' related information, etc., and sell these citizens' personal information and accounts to fraudsters.
Chat bots cheat.
According to the prosecutor handling the case, in this case, 65 suspects, including Ren Le and Pang Feng, used other methods to commit fraud besides posing as QQ friends after purchasing citizens' personal information and account numbers. "There are various forms of expression, but they are all secret and all use scientific and technological means." The prosecutor who undertook the case introduced.
Through WeChat, fraudsters use location software to modify the IP address, locate the city or even everyone, pretend to be a nearby beauty, and use the "one-night stand" in chat as a temptation to defraud the victim of red envelopes or phone bills; Or pretend to be friends, lie that people are in other places, etc. , thus helping to charge the phone bill; Or mass QQ advertisements to promote fake gambling sites and lottery websites, but the winning or losing of gambling is controlled by criminal suspects.
What is even more sensational is that the suspect even uses chat bot software. One person controls one or twenty ports at the same time, disguises himself as various beauties on WeChat and dating websites, chats with each other and makes friends, and "falls in love" in batches. Unconsciously, the victim was cheated of his money.
How to cash out the cheated phone bill? They also have an idea. The suspect bought a large number of mobile phone numbers that were stopped as a fraud tool for the victim to charge the phone bill. After the criminal suspect defrauded the phone bill, he cancelled the fraudulent mobile phone number through the insiders of the mobile company, took out the phone bill inside, or resold it by buying game coins and QQ coins.
Intervene in precision strike in advance
It is understood that this case is a series of projects of network black industry chain supervised by the Ministry of Public Security. In view of the characteristics of the case, such as many people involved, victims all over the country, novel technical means of crime, many charges involved and great social influence, Shaoxing Yuecheng District Procuratorate assigned post prosecutors to intervene in advance, efficiently examine and arrest, and put forward targeted opinions to the public security organs on issues such as fixed evidence collection and legal application, so as to further guide the direction of investigation and evidence collection. At the same time, a task force was set up to conduct a comprehensive and detailed review of the facts and evidence of more than 60 suspects involved in the case of/kloc-0, discussed and consulted with the network security personnel of relevant Internet companies on the professional and technical issues involved in the case for many times, and held three major case meetings with the public security organs to communicate on the application of the law, the collection of evidence, the determination of the crime amount and other issues, so as to accurately crack down on this highly intelligent new crime.
With the development of the Internet, it is increasingly inseparable from people's lives and work, but there are also loopholes in the network. People leave traces and personal information data on the internet, which is easy to be used by some lawless elements for fraud. Just like this series of cases reflects the problem.
How to avoid becoming their "prey" "In the final analysis, we should be cautious and keep our eyes open. Protect your personal information and don't register and log in to small websites with low security protection level at will. " The prosecutor in charge said that after all, the network is virtual, and it is best to verify things involving money in person or by phone. Don't trust others to give money to others at will. Be careful when you meet people who want to make friends. When it comes to money, cover your pockets. "In this case, a victim was cheated by the same object for seven or eight thousand yuan many times. The same trick has been tried and tested, making others dumbfounded. The unpredictable rhetoric of the liar, in the end, is to set money. " The prosecutor handling the case analyzed.