Mar 05 2008

Horton hears a (Chinese hacker) Hu…Part II. Or, want to buy a gun?

Published by at 9:15 pm under Chinese Malware,Hackers Talking,Hacking for money

gun.JPG

continuation of Horton hears a (Chinese hacker) Hu

The article next asks the question, what is the nature of the Chinese hacker community? A reporter from the paper went inside serveral of the domestic (Chinese) hacker websites and forums to carry out an investigation in order to answer this question. In a network that specialized in selling online gamer information, the reporter was able to contact a hacker through his QQ number. The hacker was only willing to reveal his surname Hu.

According to hacker Hu, he was 23 years old, had just graduated from a computer vocational school and was working as a programmer for a software firm in Shenzhen. Hacker Hu’s QQ name was “Envelope Seller.” Hu explained that he provided all categories of hacker services; installing Trojans, taking control of websites and intrusion.

Hacker Hu said that currently, all the professional hacker were just like him and that most of them did not have a formal profession. They depended on their hacker business to make a living.

The article then recounts the 2007 case of Panda Burning Incense.  This was the virus unleashed by Li Jun, a 25-year-old hacker from Wuhan, who caused massive damage to domestic Chinese networks.

Hacker Hu explains that he is careful and meets his clients either through BBS or friends and afterwards they communicate through QQ.  Hu further explains that his services are specific to each customer and that he is not like Li Jun, who sold his virus to just anyone. Hu says he does this to prevent a similar wide-spread viral outbreak.

Hackers like Hu, who have the ability to program viruses, are called “Gun Sellers” and their main role is the manufacture of hacker tools. They then sell these tools to their down-line clients.  The clients pay several hundred or thousands of YUAN to “Gun Sellers” like Hu to purchase these hacker procedures, the most popular being Trojans.

The next step is to plant the Trojan on the website, this step is called “Hanging the Horse.” The Client can complete this part themself, or if they do not have the skills to do it, they can hire a specialist.  Hacker Hu will sometimes do this for his clients.

Sorry, CinC house just said, ”If you don’t get off the computer, I will kill you!”
Gotta go, more tomorrow.

Horton hears a (Chinese hacker) Hu…Part III

Horton hears a (Chinese hacker) Hu…Part IV

4 responses so far

4 Responses to “Horton hears a (Chinese hacker) Hu…Part II. Or, want to buy a gun?”

  1. Heikeon 05 Mar 2008 at 9:47 pm

    BennyK,

    Left a response to your request in the first post on this article.

  2. [...] Horton hears a (Chinese hacker) Hu…Part I Horton hears a (Chinese hacker) Hu…Part II [...]

  3. [...] Horton hears a (Chinese hacker) Hu…Part II Horton hears a (Chinese hacker) Hu…Part III Horton hears a (Chinese hacker) Hu…Part IV [...]

  4. [...] hears a (Chinese hacker) Hu…Part I Horton hears a (Chinese hacker) Hu…Part II Horton hears a (Chinese hacker) Hu…Part [...]