Current location - Recipe Complete Network - Catering industry - Cases on computer crimes at home and abroad, and their related situation analysis
Cases on computer crimes at home and abroad, and their related situation analysis
1. Typical cases of financial computer network crimes in 2003 - People's Daily (Dec. 8, 2003)

[People's Daily]

An ordinary system maintainer easily cracked several passwords, entered the postal savings network and stole 83.5 million yuan. This case of using the network to carry out financial theft crimes was not long ago solved by the public security organs of Dingxi District, Gansu Province ---

November 14, 2003, Gansu Province solved the first case of using the special network of postal savings to carry out remote financial theft cases. This hacking case, which took place in a township in Dingxi, deserves our attention on many fronts.

He aimed his crime at the postal savings, using the network to steal more than 830,000 yuan, and ultimately could not escape the net of justice ......

October 5, 13:12, Lintao County, Dingxi District, Tai Shi Township, Postal Savings Office of the business computer a black screen, and then died. The salesman did not know why, rushed just off work has not yet gone far from the director called back. The director thought the computer malfunctioned, reported to the higher-ups, not too much attention. 17, the computer was repaired and reinstalled, the staff found that the printout of the statement of the savings balance does not match the actual. After reconciliation found that the 5th 13:00 occurred 11 transactions, a total amount of 83.5 million yuan off-site account is false savings (transaction records but no actual cash). When the savings after a few days to further contact with the account bank, found that the deposits have been 6, 11 were taken from Lanzhou, Xi'an, 37.81 million yuan, they realized the seriousness of the problem, on October 28 to the Lintao County Public Security Bureau reported the case.

County Public Security Bureau after a preliminary investigation, basically recognized that this is a huge amount of financial theft, and then immediately reported to the Dingxi Public Security Office. The Public Security Office attaches great importance to the immediate development of a detailed investigation plan, the formation of a special task force to investigate the case, and reported to the Provincial Public Security Bureau.

In the face of special detection tasks, the task force divided into two ways, on the one hand, in the provincial and municipal postal service business leaders and computer experts with the assistance of the technical point of view to analyze the hacker's means of operation and invasion of the path; on the other hand, the use of traditional methods of criminal investigation, wide-ranging investigations and evidence collection.

The task force first investigated eight current accounts with anomalies, and found that they all belonged to fake ID depositors. At this time, the results of the technical analysis also came out, after a large number of network data analysis, found that the perpetrator is first the identity of the Huining Post Office logged on to the Yongdeng Post Office, and then logged on to the Yongdeng Post Office in the name of the Lintao Taishi Postal Savings. The task force on the Huining Post Office conducted an investigation, found that the bureau system maintenance personnel Zhang Shaoqiang recently abnormal activities. Undercover investigation found that its desk has a cable line connected to the postal savings not far from the dedicated network. The task force basically confirmed that Zhang Shaoqiang is the mastermind of this financial theft. 22:00 on November 14, Zhang Shaoqiang in his residence was arrested by the task force.

After interrogation, Zhang Shaoqiang confessed all the facts of the crime. October 5, Zhang Shaoqiang in Huining, the use of laptop computers to invade the postal savings network, illegal remote login access to the Lintao Taishi postal savings computer, decipher each other's passwords and then enter the operating system to the identity of the salesman to their own end of August pre-open in Lanzhou using a false identity card in the eight current account deposited 11 ** ** totaling 83.5 million yuan. * * * totaling 83.5 million yuan in cash, and before exiting the system, deleted the print operating system of the business computer, resulting in machine failure. The next day, he withdrew cash 5.5 million yuan in 10 savings outlets in Lanzhou, and 30.5 million yuan again transferred to the false account he opened. October 11, Zhang Shaoqiang traveled to Xi'an, the use of six savings cards and withdraw cash 1.8 million yuan.

So far, this remote financial theft case is solved, 83.5 million yuan returned to Zhao.

Why an ordinary system maintenance staff, but was able to break into the postal savings special network, from the comfort of the implementation of the crime ......

The case is over, but it left us thinking about the end.

From the 5th when the crime was committed to the public security authorities, there was a full 23 days in between, enough time for a prepared criminal to get away with it. During this time, the dedicated postal savings network remained in a wide-open state, and if Zhang Shaoqiang had been a thief again, it is likely that the losses would have been even greater.

Zhang Shaoqiang is 29 years old, graduated from the Institute of Posts and Telecommunications, before the crime is only Huining County Post Office system maintenance personnel, not proficient in computer and computer network technology. The postal savings network precautions can not be said to be not strict: postal savings use a dedicated network, and the Internet is physically isolated; the network uses a secure firewall system; from the front desk extension to the host, which has several password protection. What exactly is the reason, can let Zhang Shaoqiang so easily.

Analyzing the whole case, it is not difficult to see that it is the loopholes in management and the weak security awareness of the staff that caused such a serious situation. Before the case, Zhang Shaoqiang private cable, no one ever asked, and no one to stop, so that he easily put the postal savings dedicated network in their own hands. And on the other hand, Lintao County, too stone town of postal savings outlets have been using the original password, not only did not regularly change, but also between the staff to keep each other secret, so Zhang Shaoqiang easily broke through several passwords off, directly into the operating system, stole 83.5 million yuan. Moreover, when the staff found that something had gone wrong, they thought that the internal network system had failed, and did not think that there would be a cybercrime situation.

This case alerts us to the fact that staff using the network, including even professionals in certain industries, lack a basic awareness of network security precautions before allowing hackers to take advantage of the situation.

Gansu Province this year has opened 51 cases of cybercrime. Police remind: must strengthen network security awareness ......

Currently, the application of the network in social life has become pivotal. At the same time, since 1986, when China discovered the first case of using computers to commit crimes, crimes involving computer networks have risen sharply year by year.

According to the director of the network monitoring division of the Gansu Provincial Public Security Bureau, Ma Dianxing, the number of cybercrimes in Gansu Province in recent years has grown almost exponentially, with 51 related cases filed and investigated this year, and, according to his estimation, a considerable number of cases have not been reported by the parties involved.

A large portion of these cybercrime cases are caused by users' low security awareness. After Zhang Shaoqiang's case was closed, Ye Hong, deputy director of the Gansu Provincial Public Security Bureau's Network Supervision Department, once lamented, "We have a total of **** only more than 60 network police officers in charge of the province's network security, but more than half of the police force are wasted on catching some simple cases." The public lacks awareness of cybersecurity prevention, emphasizes application over management, and especially pays little attention to cybersecurity issues. This is true even for certain industries involved in people's livelihoods, where the security rules and regulations formulated are not enforced, the managers in charge have a poor sense of confidentiality, and ordinary staff members lack specialized knowledge of security precautions, so that crimes cannot be detected and stopped in time when they occur. All of these have contributed to the sharp increase in crime in the network field.

Network security experts summarize cybercrime into five characteristics: hidden, intelligent, continuous, borderless and great harm. The Zhang Shaoqiang case also tells us that the vastness of network connectivity may become its weakness once it is mismanaged, and even if that mismanagement is at an outlet in a remote village, it could become a shortcut for hackers to get to the heart of the network.

If the network is ubiquitous, then so should its security management.

The world's first documented case of computer-related crime occurred in 1958 in Silicon Valley in the United States, but it wasn't discovered until 1966.1 China's first crime involving computers (embezzlement using computers) occurred in 1986, and the first case of a purely computer-related crime to be solved (which was the creation of a computer virus) occurred in November 1996.2 From the first case of computer crime was found to date, crimes involving computers, whether from the point of view of the type of crime or the incidence rate are rising sharply year by year, the methods and types of exponential increase, and gradually began to use computers as the tools of crime to the development of computer information systems as the object of crime, and the trend is getting more and more intense, and the latter, whether in the social hazards or the seriousness of the consequences of the crime, are far greater than the former. The latter, whether in the social harm of the crime or the seriousness of the consequences of the crime, are far greater than the former. As some foreign criminologists said, "the future form of information society crime will be mainly computer crime," at the same time, computer crime "will also be the future of international terrorist activities of a major means

Other articles:/n/2005-4/ 18130017477.shtml

/slblog/ViewLog.asp?BlogID=45&LogID=943

....................................................................

Friends with you to find so much ah, looking hard ah, give points.