Mar 05 2008

Horton hears a (Chinese hacker) Hu

Published by at 12:25 am under Chinese Malware,Hackers Talking,Hacking for money


Yeah, sorry about the title…

This story comes via the and is an inteview with a Chinese hacker named Hu.  The good news is that it is one of the most candid interviews I have ever read. The bad news is that it is very long and has a lot of technical language that I constantly struggle with.  So, it will be at least a three-part post (if not more) and will be heavily edited in some places. I also may call on one or two of you to lend a hand in coming up with the exact technical jargon. Our hacker Hu gives a very detailed look inside the economy of the underground world of Chinese hackers.

The article begins with a story about a Miss Liu, who returns home, turns on her computer and as she is skimming through webpages, a Word document suddenly opens.  At the top of the document, it begins to automatically write, “I have seen your picture, you are certainly very pretty!”

Due to her job at a large website portal, she immediately realizes this as a Trojan sequence and shuts off the power to the computer. (Miss Liu) “I didn’t expect that my computer could be hit by the Gray Pigeon (Trojan) and turned into a meat chicken (肉鸡). If I hadn’t turned off the computer, the hacker would still be controlling my computer and would also be able to send out data packets giving away all my computers secrets.

The term Rouji (肉鸡), Meat Chicken, I believe is slang for a compromised/infected computer. (a little help!)

It is reported that Gray Pigeon is one of the most virulent viruses in the last several years. The 2007 China Computer Virus Epidemic Network Security Report classified it as the 3rd largest virus.  After infection, the computer can be completely controlled through long-distance attack. The hacker can easily copy, delete or download documents on the computer. Through long-distance attack (the hacker) can also record every keystroke, the users QQ number and online game user information. Furthermore, after infection, the computer that the hacker has invaded is called meat chicken.

In fact, in China, there are several million users just like Miss Liu who are unaware that they are contributing to the strength of this network underground industrial chain.  According to statistics from the Kingsoft Global Anti-Virus Monitoring Center, in 2007, the nation (China) had over 50 million infected computers; an 18.15 percent increase over the same time last year with 90.56 percent of internet users suffering a virus attack. Among those, over 5 million of the infected computers were in Guangdong.

End Part I…tomorrow we will actually get into the interview with hacker Hu.

Horton hears a (Chinese hacker) Hu…Part II
Horton hears a (Chinese hacker) Hu…Part III
Horton hears a (Chinese hacker) Hu…Part IV

9 responses so far

9 Responses to “Horton hears a (Chinese hacker) Hu”

  1. BennyKon 05 Mar 2008 at 6:28 pm

    Is this “2007 China Computer Virus Epidemic Network Security Report” available online? I will be looking forward to part 2 & 3.

  2. Heikeon 05 Mar 2008 at 7:43 pm


    I will look to see if I can fiind it for you, the article did not provide a direct link. Working on the remaining portions on the story as we speak.

  3. [...] of Horton hears a (Chinese hacker) Hu… The article next asks the question, what is the nature of the Chinese hacker [...]

  4. Heikeon 05 Mar 2008 at 9:44 pm


    Once more a good news, bad news kinda thing…

    Located a ton of repeats for the report you wanted but they are all in Chinese. Wish I had the time to xlate them for you but I am already backed up on a lot of articles. You might be able to find someone who has the time, wish I did! Sorry!

    The string of articles located here

  5. BennyKon 06 Mar 2008 at 6:34 am

    That’s fine. I will manage. Thank you for looking it up. Just keep writing those articles! :-)

  6. [...] Horton hears a (Chinese hacker) Hu…Part I Horton hears a (Chinese hacker) Hu…Part II [...]

  7. [...]  Horton hears a (Chinese hacker) Hu…Part I Horton hears a (Chinese hacker) Hu…Part II Horton hears a (Chinese hacker) Hu…Part III [...]

  8. [...] continuation of Horton hears a (Chinese hacker) Hu… [...]

  9. [...] Horton hears a (Chinese hacker) Hu…Part I Horton hears a (Chinese hacker) Hu…Part II Horton hears a (Chinese hacker) Hu…Part III [...]