Shenzhen teenager hacks into government website and demands 0.5 bitcoins

Shenzhen teenager hacks into government website and demands 0.5 bitcoins

Hackers invaded government websites and openly demanded thousands of yuan worth of "Bitcoin" (a kind of online virtual currency). Although "Bitcoin" transactions are difficult to track, hackers still cannot escape the law in the end. Recently, the Jieyang police quickly took action and successfully solved a computer system sabotage case in three days, and arrested the suspect across the city.

case

Jieyang police cracked a computer system sabotage case

On February 13, the government website of a bureau in the Airport Economic Zone was hacked. All key files were locked and could not be used. The other party also proposed that 0.5 "bitcoins" (about 3,350 yuan) must be paid to unlock the relevant files. If payment is not made, the price will be increased to 1 "bitcoin" after 4 days.

After receiving the case report, the leaders of the Municipal Public Security Bureau attached great importance to it and set up a special task force composed of the Municipal Public Security Bureau Cyber ​​Police Detachment and the Airport Public Security Bureau. They rushed to the scene to conduct investigation and evidence collection as soon as possible, and carried out a full-scale online investigation. After analysis and judgment, the criminal suspect was identified on the evening of the 13th.

On the evening of February 15, the police of the special task force successfully arrested the criminal suspect Lu (male, under 16 years old, from Luohu District, Shenzhen City, Guangdong Province) in Luohu District, Shenzhen City, and seized 2 computer hosts, 1 laptop and 1 mobile phone, 1 router and 2 USB flash drives at the scene. At present, the case is under further investigation.

remind

Damaging computer systems is punishable by law

The police said that cyberspace is not a lawless place, and any illegal or criminal behavior committed through the Internet will not escape legal sanctions. The police reminded that if the computer information system functions are deleted, modified, added, or interfered with in violation of national regulations, causing the computer information system to not operate normally, according to the provisions of the Criminal Law, if the consequences are serious, they will be sentenced to fixed-term imprisonment of not more than five years or criminal detention; if the consequences are particularly serious, they will be sentenced to fixed-term imprisonment of not less than five years. In addition, if you encounter illegal attacks, you must save the relevant data and report to the police in a timely manner to minimize the losses.

Reporter Pan Binbin Correspondent Zhou Shaomin

<<:  The Netherlands holds the world's largest blockchain hackathon, attracting 500 participants, with Bitcoin as the winning reward

>>:  Multiple risks accumulate, Bitcoin must be put into a regulatory "cage"

Recommend

Judging from the face, which person has weak kinship

Judging from the face, which person has weak kins...

Can the Dencun upgrade promote the return of Ethereum?

On December 5, Ryan, the founder of Bankless , pu...

What kind of man is vicious and shameless?

In life, we often encounter people who are two-fa...

The beginning of the finger shows the character and destiny of a person

The beginning of the finger shows the character a...

What kind of nose brings fortune? How to see fortune from the nose

What kind of nose brings good fortune? As we know...

Which aspects are more important than material things?

Nowadays, there are actually quite a few people w...

Your eyes tell you how much blessing you have in your life

Your eyes tell you how much blessing you have in ...

Palmistry to judge your character and destiny

Palmistry to judge your character and destiny ① L...

Ethereum 2.0 is coming, what should other public chains do?

On December 1, the beacon chain of Ethereum 2.0 P...

Women with linked eyebrows don't live long? They are very healthy.

People with different eyebrows actually have diff...

What are the differences between good moles and bad moles?

What are the differences between good moles and b...