When the elderly use mobile phones, they generally pay little attention to the deduction of mobile phone value-added services, while criminal gangs take advantage of this loophole to make profits crazily.
It is reported that recently, the Public Security Bureau of Panzhihua City, Sichuan Province announced a case of illegal control of computer information systems, which is still under investigation.
According to reports, some users found that the telephone charges of the elderly in their families were increasing every month. They went to the business hall to find out that the phone had ordered a number of value-added services, such as ldquo; Mobile News & rdquo;“ safe Weather & rdquo;“ boot reminder & rdquo;, but there were no SMS orders on his phone.
The user suspected that there was something wrong with it, so they called the police to deal with it.After investigation, the local police found that 89 mobile phones in the area had 2G network traffic consumption, similar to the experience of alarm users, suspected mobile phones were remotely manipulated.
Further investigation found that many elderly machines in & ldquo; automatic ordering-rdquo; value-added services, the monthly deduction of related value-added service fees range from 1 yuan to 10 yuan. And these mobile network data are linked to the server of the same domain name.
It is later determined that the server is the Trojan server used by criminals to commit crimes.Through data tracking, it is found that more than 1400 million mobile phones across the country are controlled by the Trojan server.
After a large number of transfers to collect evidence, the police locked the identity of Kong, the suspect who rented the server, and dug up the criminal gang.
According to their confession, they implanted Trojans into the mobile motherboard in the process of working with a number of mobile motherboard manufacturers. After the mobile phone equipped with the above motherboard is sold, the criminal gang uses the Trojan horse program implanted before to control the mobile phone to return data, obtain the user's mobile phone number, text message content and other information, and send it back to the backstage database of Chen's gang.
After that, the gang, ldquo; Operations Commissioner & rdquo;, uses the mobile Trojan program to send text messages confirming the opening of value-added ordering services to mobile phone users, while controlling the mobile terminal to automatically reply & ldquo;Y” to open, and then delete the SMS records after a series of operations, so that mobile phone users can't notice.
Using such covert modus operandi, the four criminal gangs in the case made illegal profits of more than 100 million yuan. At present, the case has been transferred to 12 people for prosecution and 11 people have been released on bail pending trial, and the case is still under investigation.