More than 3.3 million elderly machines are "poisoned"

  In August last year, Xiao Zhu from Xinchang County, Zhejiang Province bought an elderly mobile phone for his grandmother. When changing the package for the mobile phone in the online business hall, he found that he could not receive the verification code.

However, when he installed the calling card into his mobile phone, the verification code was received normally.

Therefore, he suspected that the old machine was installed with a Trojan horse, and immediately called the police.

  What Xiao Zhu Wanwan didn't expect was that his report made the police seize a black and gray industrial chain criminal gang involving more than 3.3 million elderly machines and more than 70 suspects.

The new phone does not receive the verification code

  "Zero cost, no investment, you can make pocket money while playing mobile phones at home." In QQ groups, Moments, and WeChat groups, many people have seen such an exciting advertisement.

Most people will ignore it directly, and some people will be moved and start to have a "dream of getting rich."

  Tongmou from Longyou County, Zhejiang Province is one of them.

In March 2019, when he flicked this advertisement on his mobile WeChat, he contacted Shangjia and started to work on this "part-time job."

In just 5 months, Tong used more than 6,000 pieces of citizen personal information illegally purchased to "wrap wool" and earned more than 70,000 yuan.

  What is jaw-dropping is that the personal information actually comes from the elderly machine used by groups like Xiao Zhu's grandmother.

  After receiving the report from Xiao Zhu, the Xinchang County Public Security Bureau quickly launched an investigation.

It was discovered that the elderly machine of Xiaozhu's grandmother was implanted with a Trojan horse program, and the verification code was intercepted and sent to a technology company in Shenzhen.

The public security organs also found that this is not an isolated case. After testing more than 20 elderly devices of the same model, they all found the same problem.

  In view of the seriousness of the case, the public security organs of Shaoxing and Xinchang established the "8·12" infringement of citizens' personal information task force. After finding out the organizational framework of the entire criminal gang, they rushed to Shenzhen to take all the involved personnel of a technology company into one pot.

  Wu is the person in charge of this company.

In its operations, the company found that there were a large number of elderly users of mobile phones. At the same time, it was discovered that most of the elderly are not familiar with the operation of mobile phones. It is more convenient and more secret to retrieve their personal information.

  According to Wu's confession, the company has cooperated with a number of old machine motherboard manufacturers to implant Trojan horse programs into the motherboard.

When the phone card is inserted into the old machine, the Trojan horse program can obtain the mobile phone number and other information, and can also automatically intercept the verification code and transmit it to the background database.

  In the background, there are specialized personnel to check the consistency of the mobile phone number and verification code in order to enter the next circulation link...

The verification code was secretly collected and sold

  In addition to using a small number of illegally obtained mobile phone numbers and verification codes to make illegal profits, Wu's company sold most of the illegally obtained information to online platforms that illegally sold citizens' personal information.

  These platforms are an important link in this black-and-ash industry chain. They buy personal information from companies like Wu at low prices, and sell them to gangs and individuals who increase prices through various channels to make profit from the price difference. .

  Every old phone, every mobile phone number and verification code, citizens’ personal information enters the black market, and is then traded and used for profit, forming a huge criminal network nationwide.

  The aforementioned Tong is a member of the "Wool" and belongs to the most downstream of the crime chain.

Then, how do these "wool wool" gangs and individuals use the purchased mobile phone numbers and verification codes to make money?

  In-depth investigation by the public security organs found that these groups and individuals use the e-commerce platform to issue coupons, newcomer red envelopes and other opportunities to newly registered users. After receiving them, they can cash in for money. Some people have registered a large number of accounts in the app to brush likes. , Make money by brushing traffic.

  And so on, the forms and methods of "wool wool" come in various forms and are unsurprising.

  Who can realize that behind these people making big money easily, it is the illegal acquisition, reselling, and profit of millions of citizens' personal information.

Even more frightening is that Wu mentioned in his confession that in the next step, the company is ready to "enter" children's phone watches...

Illegally obtained more than 5 million verification codes

  Through an ordinary old-age machine, the "8·12" task force has unearthed a line ranging from the "wool wool" groups and individuals at the most downstream, to intermediaries that resell citizens' personal information in the midstream, and to design and production upstream. A huge criminal network of technology companies with Trojan horse programs, motherboard manufacturers, and mobile phone manufacturers.

Millions of personal information about the elderly are "streaking" every day, and the legal rights and interests of the elderly cannot be effectively protected.

  Due to the large number of people involved in the case, the complexity of the case, and a new type of criminal case with a relatively high standard of evidence, the task force of the public security organ immediately requested the procuratorial organ to intervene in advance.

Public security and procuratorate formed a joint force to crack down, strictly control procedures, evidence, materials, and qualitative "four barriers", and jointly comprehensively sort out the case, research and qualitative the behavior of upstream, middle and downstream separately, and pay special attention to the collection of fixed transaction contracts, back-end service data, and pipeline Objective evidence such as bills and salary lists has laid a solid foundation for the prosecution’s review and prosecution and other next steps, ensuring that all persons involved in the case are “catch all”.

  Since June 2020, the Xinchang County Procuratorate has successively filed public prosecutions with the courts in accordance with the law for more than 70 people including Wu and others suspected of illegally controlling computer information systems, infringing on citizens' personal information, and fraud. The courts have opened trials and made judgments.

  On November 18, Wu was sentenced to four years and six months in prison for the crime of illegally controlling computer information systems, and was fined 600,000 yuan, and 6.16 million yuan in illegal gains were pursued; Tong Mou violated citizens’ personal information He was sentenced to three years’ imprisonment, four years of probation, and a fine of 80,000 yuan, and 70,000 yuan of illegal gains were recovered.

  So far, more than 70 people involved in the black and gray industry chain have been sentenced to penalties by the court.

The court found that through these motherboards with "trojan horses", Wu's company illegally controlled more than 3.3 million elderly phones, obtained more than 5 million mobile phone verification codes, and sold more than 7.9 million yuan in profit. The victimized elderly people across the country 31 State / Province / State.

  Fan Yuehong Yu Keer Zhang Nannan