LeTV employee implanted a Trojan horse on the company's server and filed a public prosecution

After the trial ended, the two defendants were interviewed by reporters. Intern reporter Guo Yan photo

LeTV employees collaborate inside and outside to implant Trojans

The two defendants were accused of illegally controlling the computer information system and were convicted in court

Yu Yu Guo Yan

In the company's 207 servers implanted Trojan horse virus, control computer systems for illegal profits, recently, Leshi former employee Yanmou and his superior Wu was arrested by the prosecution on suspicion of illegally controlling computer information systems. On July 26, the Haidian District Court of Beijing opened the court to hear the case.

During the trial, the defendants Ran and Wu all expressed that they did not expect that their actions would violate the law. They are willing to plead guilty and punish. Before being taken out of the court, Yanmou licked and licked the mother who had come from her hometown to pay attention to her body, and the mother in the gallery had sobbed.

207 servers were implanted with Trojan horse virus

From January to March 2017, Wu was instructed by a netizen named “Abu Group” (separate case handling) to contact Ruan, who was an engineer at Levision Cloud Computing Co., Ltd. (hereinafter referred to as LeTV), through the Internet. It provides Trojan horse programs.

After receiving the Trojan horse program provided by Wu, Ruan used the position and the work gap to log in the company's internal system and uploaded the program. The Trojan horse was installed in the company's multiple servers in the field. After investigation, Ruan has placed the Trojan horse program on Lexus's 207 servers located nationwide three times.

On March 3, 2017, three servers in Hohhot issued an automatic virus alert. After inspections by LeTV, the company discovered that multiple servers were implanted with Trojan horses. The company identified the employee as an important suspect through account number IP. After the music as the company's alarm, Ruanmou, Wu continued to be captured by the public security organs.

As a rumored family member, Wu expressed that he did not know with the “Abu Group” and only learned through QQ that the “Abu Group” was collecting traffic at a rate of 100 yuan and 1G, and provided a program. “I found Ruan through the Internet. , To make money to install a Trojan horse program on the company's server, I do not know will violate the law."

"I installed the documents sent by Wu on the company's servers. The first time only 14 were installed, and then it was installed twice. After that, more than 200 units were installed a total of three times before and after. Wu gave me 1000 yuan per day. Yuan ranged.” Ruan admits that after knowing the installer, external personnel can remotely control and use the server to initiate traffic attacks. He said that I thought it was a firewall stress test. This is a violation of professional ethics, but I did not expect it to violate the law.

At the time of the incident, Wu made a profit of 28,800 yuan, and Qian made a profit of 27,400 yuan.

Judicial appraisal shows that the Trojan horse program implanted in the LeTV company server has a DDOS attack function. This means that external personnel can remotely control these servers to perform traffic attacks, which in turn causes the attacked server to crash.

Two Defendants Suspected of Illegal Control of Computer Information System

According to a complaint by the Haidian District Procuratorate in Beijing, Wu Mou knew that his family's “Abu Group” requested that their downloaded storage be able to implement the function of controlling the server, and still provide it to Mou, and instruct him to insert a Trojan horse program into the server. The behaviors of Mou and Wu were suspected of illegally controlling the computer information system.

“Shao was a technical staff, knowing that the program provided by the previous Wu family was once implanted in the LeTV company server and would be controlled for illegal activities by others. However, there were still 306 Trojan horse programs distributed in LeTV company three times. On the server," the prosecutor said.

In conjunction with relevant laws, the public prosecutor proposed to sentence the defendants to three years or more and seven years or less and a fine. "The two pleaded guilty after the case was well-informed. According to the relevant regulations, they may be given a lighter punishment."

"The two defendants are all 'post-90' and we are very sorry to see you standing in the defendant's seat today." The prosecutor said that he hopes that the two defendants will seriously regret this serious legal education and return to society as soon as possible.

The case was not pronounced in court.

LeTV: The lack of supervision over employee data modification

"The company does not want to see this happen." Lei, deputy general manager of the company's supervision department, told reporters after the trial that after the incident, LeTV immediately went offline and formatted the server, and modified the adjustment of the relevant systems. Permissions. The purpose of the company's request for judicial intervention is to punish a very small number, alert the majority, and hope that Zhai will be treated with leniency.

In Wang Lei’s view, such new crimes that use the Internet through high-tech means have a lot of difficulties in finding responsibility. He said that employees are remotely implanting Trojans into servers. They themselves are not in the server's physical room and find it difficult to find problems.

The reporter learned that many Internet companies have had similar cases. Some companies can lock in specific accounts, but they can't be locked in to specific individuals. In addition, there is not much evidence to keep, and things are gone. Talking about the experience in assisting in handling cases, Wang Lei said that the fixed means of cybercrime is not the same as the traditional means. If the relevant evidence is not fixed in a timely manner, it is very difficult to postpone responsibility for it. “The electronic evidence is very susceptible to contamination.”

In the era of innovation, the technology has developed rapidly, but the relevant management practices have not been well designed. Some Internet practitioners are typical of the entire industry in avoiding corporate rules and evading the law through various means. Wang Lei said that some young people have a lot of data in their hands to modify their authority and they are in an unregulated state. This risk needs attention.

High Voltage Lithium Battery


outdoor solar battery cabinet , solar plus cabinet energy storage,80KWh battery cabinet, 100KWh battery cabinet,120KWh battery cabinet,high voltage battery system

Shenzhen Enershare Technology Co.,Ltd , https://www.enersharepower.com

Posted on