In recent years, the safe challenge all the more that network black ash produces place to bring is austere. Use Internet technology to undertake pilfer, bilk, extortionate wait for case of of all kinds illegal crime to happen often, the black ash that derives around Internet produces an industry to spreading quickly.
Public data shows, dimensions of industry of safety of our country network was many yuan 450 2017, and black grey industry grows more cruelly than safe industry. The personage inside course of study thinks, black grey industry already amounted to one billion two hundred and fifteen million seven hundred and fifty-two thousand one hundred and ninety-two yuan of dimensions. From the point of data of each country statistic, implement pilfer, bilk, extortionate case number through the criminality such as the technology, also be in with annual of 30% increase fast growth.
Face increasingly austere network black ash to produce action, 3 kinds of when center of national Internet lash-up hits at starting a focal point 2015 black ash produce special operation, right " black produce " limits undertook limitting. Basically include 3 kinds: It is to start the hacker gang that is suspected of rejecting to serve type to atttack; The 2 pilfer date gangs that are purloin individual information and belongings Zhang date; 3 it is to be aimed at finance, government kind the copy of the website risks the gang that make.
What the common inside course of study says is black produce actual more extensive, if legal proclaimed in writing sets illicit action,can call only black produce. Common and character, "Ash is produced " be in to wander namely legal brim, did not make clear the gray industry that law regulates, although its behavior does not have specific legal regulations qualitative commit a crime to break the law, but have apparently great harm to the society.
" 2018 networks black ash produces processing to study a report " uncover secret black ash to produce link 4 big kinds: Technology kind black ash is produced, include false Zhang date to register the fountainhead sex black ash that waits inside to produce, use at undertaking trading illegally, the platform of communication kind black ash is produced, and the black ash that carries out of all kinds illegal criminality is produced.
Combine south release in A " 2018 networks black ash produces processing to study a report "Zoology peak meets the 2018 networks safety that the Ministry of Public Security, labour believes letter of ministry, net to do guidance, kick off in Beijing now, domestic and international safe domain top class expert gathers, discuss black ash to produce the topic for discussion such as processing in all. On the meeting, release south the combination in A " 2018 networks black ash produces processing to study a report " , deepness analyses new method of the new condition that black ash produces, processing.
Black ash produces a technology to aid fourdrinier wire sth resembling a net " yellow bet poison " , a variety of network crime such as bilk are caused spread, offer concealed to conceal the identity to the criminal, those who hide guilty evidence " waists-coat " and " umbrella " , derive ceaselessly new " virus " new mutation. Do not eradicate black ash to produce gang, behead to break secret of guilty link " 7 inches " , suffer from involuntary discharge of urine boundless.
Safe expert points out in A, hit black ash to produce need society to be administered jointly, hit black ash to produce like administering mist haze, the enterprise that is a delegate with Alibaba is trying to assist all circles to solve problem of this one society with the technology. 2016, many telegraphic bilk case that how Alibaba helps police uncover case of Xu jade jade to be a delegate with the technology entirely. 2017 up to now, how does Alibaba cooperate countrywide each district to execute the law entirely mechanism uncovers black ash of of all kinds experience to produce a case 8022 cases, public security mechanism seizes 1000 black ash to produce crime the gang commits a crime 6799 times in all suspect.
Technical black ash produces chain of perforative and whole industryTechnology kind black ash is produced, in basically be downstream technical not strong black ash is produced be made from personnel of course of study and offer of all kinds Wu of kimono of equipment of soft, hardware, the trojan is of all kinds and website of embedded, fishing, baleful software is black ash produces common technology.
" report " discovery, traditional trojan is main the lead plane that the intent is the person that control suffers infection, but in recent years, virus trojan intent shows more and more apparent hasten interest sex. 2016, in the trojan example of entire network popularity, coax is con kind occupy than 5% , to 2017 this scale rises to 11% .
In addition, "Hacker " risk the large website such as the bank through duplicate copy, the user that entice provides the individual such as account password sensitive information, the fishing website of asset of these information filch victim atttacks recycle, risk shift of each big bank, China to wait with copy in recent years be in the majority, disturbed badly platform order, make platform user is in a risk in, also make platform fame is affected.
2017 second half of the year, alibaba turns over fishing group to undertake to known venture block is broken be preventinged in time accusing greatly each, 2018 each fishing risk shows downtrend first half of the year, electric business kind drop false 94% , public security organs drops false 48.9% . Current, alibaba angles piscine website testing system already covered the zoology professional work of the whole in A.
To " pull a library " , " bump into a library " wait for a variety of network criminality, " report " point out, a Lian undertook to this completely special change place troops on garrison duty and intercept daily, once happen,pull a library to bump into a library, can feel from data. Data shows Alibaba, at present its identify the machine action that give to play piece disturb rate already controlled inside extremely low limits.
DDos(is distributed decline a service) show the hacker passes control a large number of computers, adopt embedded representative program, control these computers to wait for platform server to Internet, initiate a large number of lawful requests to take up server network resource, in order to achieve the goal that the network breaks down.
Center of national Internet lash-up (the following abbreviation discovers for CNCERT) , more than 1500 punching bag inside the territory in Feburary 2018 suffer DDoS to reflex attack. These punching bag distributing by province, zhejiang province is occupied than the biggest, occupy 21.3% ; It is Jiangsu province, Guangdong province and Fujian Province next. From the point of attack discharge, reflection magnifies attack forges discharge majority mediumly to come from outside the condition.
Current, DDoS defense system already enclothed Alibaba business of zoology of the whole in A. Accumulated defence 2017 only 2400 atttack for many times. Defense ability also promotes Alibaba all the time, realized DDoS automation to deal with 2017, the fastest 1 second can complete defence action, below the setting that in attack discharge grows considerably, achieved the influence that be not had by the business when attack continuously.
2017, CNCERT monitors discovery, chinese churchyard makes an appointment with 20 thousand websites to be distorted, relatively the agreement 2016 grows 20% 17 thousand times, the governmental website that is distorted among them has 618, relatively 467 growth 2016 32.3% .
Defend in the light of what Web application atttacks the product has WAF to wait, at present WAF already enclothed Alibaba great majority server, highest everyday intercept atttacks an attempt 80 million times. From intercept attack type looks, code carries out attack to occupy 36% , attack of the script that cross a station is occupied 34% , WEBSHELL attack is occupied 17% , SQL infuse attack is occupied 8% .
Black Zhang date becomes harm sourceNetwork Zhang date is the main unit of Internet activity, but because the machine registers the Zhang date with false attestation to concealment the gender is strong, track hard, become black ash to produce the crucial segment that the get through below the line on the line commits a crime increasingly.
" network safety law " specific provision, use Internet service must have Zhang date fact renown attestation. But network black ash is produced obscure the identity to achieve, evade blow intent, use other identity information or mobile phone number to register name of a large number of false network Zhang, the health that played havoc with network zoology and Internet economy develops.
" report " point out, network Zhang date is used illegally register with ill will more, the form such as date of false attestation, pilfer comes true.
In order to seek profit, management order of disturbed society government and market is a purpose, batch founds a network to serve the behavior of account to be regarded as ill will to register. Ill will is registered regard sex of source of a kind of network as guilty activity, formed with " the network receives a platform " for intermediate agency, "Mobile phone black card blocks trade " and " date of network platform black Zhang registers mark trader " to trade bilateral network is black grey industry.
" report " discovery, at present 83% blacker-than-black block the baleful Zhang bugle call that registers generation, basically distributing to take a taxi at the network, game of business of Internet finance, perpendicular cable, network, among them the activity of baleful Zhang order of 45.5% takes a taxi at the network in, basically use at obtaining to take a taxi red bag; The do evil of baleful Zhang date of 16.6% in Internet finance, use baleful Zhang date to undertake illegal conduct financial transactions is mixed leasehold etc; The do evil of 14.5% is mixed at brand of certain and famous cake the perpendicular cable business such as certain travel brand; The do evil of 7.1% wait at platform of game of certain and famous network. Ill will registers those who cause many blame real name to register mobile phone card and network Zhang name to appear, fizzle out for network bilk, network, bet, the crime such as poison was offerred " covering waists-coat " .
False attestation, it is to show the identity information of attestation is invalid, or attributive person and actual attestation handle attestation identity information the person is different one. Through be not the false attestation that normal step undertakes, normally by sale of illegal element batch, be engaged in illegal trade. Current, appear to buy the gang that gets identity information in great quantities below the line, be like and other places of Henan, Fujian, send information of identity of citizen of gift means diddle material through sham activity businessman, collection identity information includes but not Id of be confined to is illuminated () of face of positive and negative, hold Id to illuminate, hold local newspaper was illuminated that day etc, collection channel basically reachs a plant for remote region rural area or the school.
In the meantime, pilfer date also makes the conduct that uses network Zhang name illegally commonly. " report " point out, main component is catenary of pilfer size property 5 link: Data is offerred, link of the software platform, software that sweep bugle call, theft (use) , disposal of stolen or contraband goods. Pilfer date method is diversiform, like the entry test and verify of user of filch, diddle the code has pilfer number, after obtaining user individual information, can finish through test and verify login. Current, the majority in A logs onto an unified already entry water level, politic system is mature also and perfect, water level of whole of date of guard against theft promotes ceaselessly.
Trade illegally communication platform becomes locomotive nucleusBaleful platform, internet of it may be said is black the locomotive core of grey industry catenary, direct service commits a crime at of all kinds network activity. Network black ash produces runs of all kinds resource, tool and guilty method, experience, need to pass " baleful platform " will have communication, movement, trade.
The technical black ash that it joined network black ash produces upper reaches to be in charge of providing resource, information, tool, service directly is produced and commit a crime downstream gang. Current, baleful platform can divide it is 3 kinds: Baleful website, baleful forum and ill will group group.
" report " point out, baleful website includes empty bag to trade code of the platform, platform that brush sheet, platform that accept a code, test and verify hits platform of code, hairpin to wait, these platform become black ash to produce each other of software, information communication to know the main place of the circumstance, produce for black ash commit the crime offerred convenient tool to get channel.
Trade with empty bag platform is exemple, alleged " empty bag " it is empty express wrap up, it is to sell the home to increase shop credit, brush a hand jointly (the platform that brush sheet) when undertaking trading phonily, generation is not actual express order in great quantities.
" report " discovery, "Accept a code " platform, " make a yard " platform and the hairpin terrace that sell black card, it is important black ash produces baleful platform. "Accept a code " platform points to platform of mobile phone black card normally, basically be the blame that illegal element gets illegal channel the assemble such as card of card of real name card, content couplet net, abroad mobile phone arrives the platform that accept a code, wait for abb party use at registering of all kinds website, in order to get the mobile privilege of the website. Current, distributinging in the of all kinds platform accepting a code of operation, give priority to with Guangdong area.
In baleful forum, content promulgator is personnel of upper reaches of catenary of black grey industry commonly, have black ash to produce the resource inside circle, include technology, message to wait. Will tell from industrial catenary angle, baleful forum broke black ash to produce the strict limit between fluctuation You Zhi, novice introduction doorsill is reduced considerably.
In addition, this kind of baleful forum produces black ash technology, information to sell the home and buy the home to gather together, depositing a large number of black ash to produce the baleful forum that updates resource, become black ash to produce the breeding ground that causes all sorts of criminality.
" report " point out, main component is baleful forum two kinds, one kind is to involve blame technology kind experience communicates kind of forum and net to earn platform, another kind is to involve a technology kind technical communication and tool sell kind of terrace.
Blame technology kind experience communicates kind of forum basically is to deliver black ash to produce trends of the message inside the circle. Since 2016, before experience communicates kind of forum to had been carried, entered " knowledge pays fee " times, all wire cables can collect fees, have case story, administrator of a forum releases tutorial paying fee through forum inside a month, can seek profit illegally nearly 100 thousand yuan. And black ash produces technical sale platform, offer to regard the goods that can sell publicly as platform the technology namely.
Clear completely according to Alian lab statistic, active 2018 professional technology black ash produces platform to amount to hundreds. The service specializations make guilty technology more civilian change, low price also makes the cost that black ash produces a technology to commit a crime progressively reduce.
Black ash produces crime to contain a variety of baleful behaviorLink of the upper reaches in be based on, black ash is produced often behave in executive link wait for a form for baleful behavior, bilk, wait to cause abominable effect to individual, enterprise and society.
" report " discovery, internet industry produces action because of black ash, derive the sheet below the ill will that is a purpose with blackmail, disturbed order, baleful refund, baleful evaluation, ill will to complain travel waiting for bully bully city action.
With malic mobile phone " acting refund " for exemple, a few illegal elements are looked at accurate " business chance " , make malic mobile telephone even " acting refund " the business, they to client acceptance can recapture place charges amount, equipment already still can be bought in reservation game, but requirement user pays 34 into poundage, have shop month sales volume bigger.
Be in this to undertake the gray industry catenary of baleful refund with collection pay, also put in great and safe hidden trouble among them, somebody is divulged because of this privacy, bank card is brushed by pilfer, the mobile phone is needed to pay incomprehensible lock by Suo Bing, violated security of citizen individual information badly not only, still disturbed the brand manages square normal management order.
" report " point out, common network bilk type still includes to pretend to be refund of public security organs, leader, customer service, part-time job to brush odd, secondhand trade airline ticket of platform, airline retreats bilk changing a label to wait.
Among them, pretending to be bilk of public security organs is one of bilk types with the most at present abominable influence in network bilk, the criminal waits for many parts through sham bank, public security, procuratorate, be suspected of with identity of victim capital, individual " case of great and confidential criminal " for, carry out psychological bomb to the victim, transfer with passing victim property " safe account " carry out bilk for reason. Type of this one bilk still has another characteristic, the proportion that group of the old people in be aimed at namely has bilk is very high, bilk element is used in old people psychology is on guard the weakness such as recognizant difference launchs offensive to its.
Because information divulges annual pecuniary loss to exceed one billion two hundred and fifteen million seven hundred and fifty-two thousand one hundred and ninety-twoThe statistical report that issued this year in January according to center of Chinese Internet information shows, whole of Chinese network safety carried smooth state 2017, but user information is divulged, network hacker is blackmailed and the problem such as communication network bilk still appears often.
" report " point out, in the whole industry chain that in the network black ash produces, use all sorts of methods to gather up take, filch perhaps obtains individual information through the means of buying and selling, carry out the criminality such as bilk thereby, become black ash to produce accrual main kind. The safe stability that network black ash produces order of safe to citizen individual information, belongings safety, society and national infrastructure abominable effect that cause, destroyed legal policy to carry out, sincere letter system builds harm society, destroy network space order, become the cancer that erodes Internet economy to run normally.
Public data shows, come to China nearly 10 years telegraphic bilk case grows every year quickly with 20%-30% speed. According to Chinese Internet association " Chinese netizen rights and interests protects findings report 2016 " show, 688 million netizen of annual home is divulged because of information of rubbish short message, bilk, individual information wait for the pecuniary loss estimation that cause to amount to 91.5 billion yuan. 2017, mechanism of countrywide public security uncovers case of telegraphic network bilk 131 thousand cases in all, the member that investigate illegal crime person 53 thousand.
A Lian clears completely lab statistic, came in April 2017 in December in all observation arrives telegraphic bilk 432485, case hair endowment caustic 195448720 yuan, the member that involve a victim 52305 people, house of telegraphic bilk case does not fall high, dimensions is changed upgrade ceaselessly.
In the especially big case of the information of citizen of a steal and sell that the Ministry of Public Security uncovered in March 2017, information of 5 billion citizens is divulged. Police is found out, since 2015, guilty gang with " hacker " Weng Mou and Zheng of employee of safe department of some Internet firm are such-and-such prop up for the technology, through " hacker " the method inbreaks the network server of much home company, from which information of purloin citizen individual, next Han Mou is bright wait for a person to pass QQ group, the channel such as forum sells on Internet. In the meantime, guilty suspect is used from Internet filch of all kinds register information duplicate bank gets stuck, executive pilfer brushs the illegal crime activity such as bank card. Current, this case is in farther cognizance. Expert opinion says security of the data inside course of study, a case divulges information of individual of 5 billion citizens, broke a developed country two years to divulge 4 billion record partly.
Data of the Ministry of Public Security shows, accumulative total of mechanism of countrywide public security was detected 2017 encroach case of citizen individual information 4911 cases, arrest guilty suspect 15463. Among them, came in March 2017 only in July, the whole nation is detected in all encroach case of citizen individual information and hacker attack to destroy a case 1800 cases, arrest guilty suspect 4800, hunt down information of individual of of all kinds citizen 50 billion. The research organization thinks, because individual information reveals the pecuniary loss that cause,already exceeded one billion two hundred and fifteen million seven hundred and fifty-two thousand one hundred and ninety-two 2017, the loss that because the network is con,causes is close to 500 billion yuan.
" report " discovery, black ash produces behavior to often can cause malign case, illegal element is safe to including system and data inside national infrastructure has charge, affect national safety.
Black ash is produced launch DDoS attack, need to control the network equipment of a batch of units or individual above all, take up the bandwidth resource of these network equipment launchs large flow attack to punching bag, cause be broken down by the network of punching bag, resource of bandwidth of business of operation of great and wasteful nation and the network equipment data that cause unit or individual are divulged, affect network order and national infrastructure safety badly.
According to data of national Internet center, attack of sth resembling a net of every 3 hauling has the whole world 1 case to happen in China. Topological features of current network safety presents the trend that gives infrastructure to change, road of core switching equipment, core by implement, the target that DNS server became a hacker to atttack, attack method of the hacker and attack object, from the attack of the pure technology previously, pure system, change business to morely the attack of the level.
Manufacture: Big data academy carries out south: New job condition rules by law south Zhang Yating of Wang Qi of research center researcher