Nantong, Jiangsu Province cracked a Bitcoin network extortion case and the creator of the ransomware virus was arrested

Nantong, Jiangsu Province cracked a Bitcoin network extortion case and the creator of the ransomware virus was arrested

The reporter learned from the Nantong Public Security Bureau of Jiangsu Province that the local police successfully cracked a major case of creating and using ransomware to carry out cyber extortion supervised by the Ministry of Public Security during the "Net Clean 2020" special operation, and three criminal suspects including Ju were arrested. As of the time of the incident, Ju, as the creator of multiple Bitcoin ransomware viruses, had successfully committed more than 100 crimes and illegally obtained Bitcoins equivalent to more than 5 million yuan.

In April this year, the cash register system of a large supermarket in Nantong was attacked and the system was paralyzed and could not operate normally. "Through data investigation, we found an English message asking for 1 Bitcoin as the decryption fee." Xu Pingnan, deputy captain of the Third Brigade of the Cyber ​​Security Brigade of the Nantong Public Security Bureau, said that since Bitcoin is traded through overseas websites, it is difficult to track down, and the identity of the initiator of the attack is often a mystery.

During the investigation, the supermarket manager said that the locked server had been unlocked by a data recovery company from another place. "When a ransomware virus invades a file or system, each decryptor is newly generated based on the characteristics of the encrypted computer. It is impossible to decrypt without the virus creator's decryption tool," said Xu Pingnan.

Nantong police followed the clues and successfully locked the suspect Ju. The police found relevant email records, Bitcoin transaction records and the source code of related ransomware tools in his computer. Ju confessed that he developed a website vulnerability scanning software, and after obtaining relevant control permissions, he implanted the ransomware in a targeted manner. In order to avoid cracking and evading the investigation of the public security organs, Ju successively developed and upgraded 4 types of ransomware. In addition to demanding Bitcoin that is difficult to trace as ransom, he used overseas network disks and emails.

The police found out that Ju had implanted extortion viruses into more than 400 websites and computer systems. The victims involved businesses, medical care, finance and other industries. For example, a listed company in Suzhou had its system implanted with a virus, causing it to stop production and work for three days, resulting in huge losses.

During this period, several data recovery companies took the initiative to contact Ju to seek cooperation. In the end, Ju and a data recovery company run by Xie and Tan reached an agreement that Ju would program, the company would find targets to implant viruses, and the ransom would be divided according to the proportion after it was received.

At present, the three suspects involved in the case have been arrested on suspicion of extortion. (Xinhuanet)

<<:  What are the cost, circulation and price of FIL? Fundraising data is released for the first time

>>:  Elon Musk is skeptical of Bitcoin ATM at Tesla Gigafactory in Nevada

Recommend

Using "falsifiable" thinking to discuss whether the Bitcoin block is blocked

Chapter 0 Introduction Is the Bitcoin blockchain ...

How Filecoin supports BSN's "cloud storage"

This article was originally written by Tony from ...

What does sunken temple mean? Good fortune in this life

Most people have the habit of looking in the mirr...

Judging from your appearance, when did you become rich?

Judging from your appearance, when did you become...

What are the personality traits of girls with protruding ears?

When we watch TV, we see the characters "Cla...

Analysis of the face of a woman with upturned eyes and good luck

What does a woman with upturned eyes look like? I...

Divergence lines on the success line and defects of the success line

There is a line on the success line that rises ob...

Life line and destiny line connected_palm analysis

The lifeline can be said to be a very important l...

The face of a woman who is not suitable to be a wife

The face of a woman who is not suitable to be a w...

What does a mole on a woman’s left ear mean? - Diagram

Different moles carry different missions and have...

How can people with intermittent wealth lines save money?

How to read the fortune line on your hand? In pal...