Mar 06 2008

Horton hears a (Chinese hacker) Hu…Part III.

Published by at 9:44 pm under Chinese Malware,Hackers Talking,Hacking for money

yuan.JPG

Horton hears a (Chinese hacker) Hu…Part I
Horton hears a (Chinese hacker) Hu…Part II

Normally, computers with known security loopholes are the targets for “Hanging the Horse.” Once these computers have been infected with a Trojan, it is very possible that someone browsing could unwittingly click on the Trojan and valuable information contained on the computer could fall into the clients hands.  Another method of “Hanging the Horse” is through junk mail or posting documents that contain Trojans on forums that encourage users to download them.  Once the attack is successful, the targeted information can be stolen using hacker tools.

In hacker circles, these packets of information are called “Envelopes” and are divided up differently depending on the type of product; there are “Equipment Envelopes,” “QQ Envelopes,”…etc. The next sentence is a little tricky but it seems to equate the sell of the “Envelopes” at this stage a wholesale market.

NOTE: From a segment that appears later in this story, I believe that an “Equipment Envelope” is referring to one that contains online game virtual property like swords, helmets, armor…etc.

From there the hackers can gather the most valuable information, like QQ numbers that are relatively short or have a higher rank. Afterwards, these filtered “Second-hand Envelopes” move into the retail market.  After the “Traders” sort the evelopes, they will use BBS and e-commerce sites to make the final sale of the stolen virtual property (Q-money, online game equipment…etc.).

The “Gun Sellers,” “Horse Hangers,” “Major Clients,” and “Traders” all make money. The economic benefits are rapidly turning the word “hacker,” which was once synonymous with “Technology Knights,” into a dirty word. However, hacker Hu says that the real money makers in this chain are the major clients (namely, the one who steals the envelopes).

If done well, it is not difficult to make several tens of thousands of YUAN a month. Some people earn over 10 million YUAN a year. With the cooperation of as few 2-3 or as many 10 people, after this valuable passes though the underground chain it is sold all around the world.

It was reported that Li Jun, the programmer who wrote “Panda Burning Incense,” deposited nearly 10,000 YUAN a day into his account. After he was arrested by police, he acknowledged that he had made over 10 milliion YUAN.

Sorry, looks like it is going to be a 4-part post. More tomorrow.

Horton hears a (Chinese hacker) Hu…Part IV

4 responses so far

4 Responses to “Horton hears a (Chinese hacker) Hu…Part III.”

  1. [...] hears a (Chinese hacker) Hu…Part I Horton hears a (Chinese hacker) Hu…Part II Horton hears a (Chinese hacker) Hu…Part III The highest earnings come from selling loopholes.  This isn’t something the normal [...]

  2. [...] hears a (Chinese hacker) Hu…Part II Horton hears a (Chinese hacker) Hu…Part III Horton hears a (Chinese hacker) Hu…Part [...]

  3. [...] Horton hears a (Chinese hacker) Hu…Part III [...]

  4. [...] Horton hears a (Chinese hacker) Hu…Part I Horton hears a (Chinese hacker) Hu…Part II Horton hears a (Chinese hacker) Hu…Part III [...]