Chapter 45 Accidental Case Solving
It is not appropriate for Chen Yi to go back now. Although nothing has happened, it is not good to be maliciously exploited.
He thought for a while and volunteered:
"Or what if I help you solve the case of bear burning incense in Jiangcheng?"
"What did you say?" Zhang Heng suspected that he had heard it wrong.
Chen Yi said again: "I want to help you solve the case of bear burning incense in Jiangcheng."
Now Zhang Heng finally heard it clearly, and he knew that this matter should not be underestimated.
What is bear burning incense?
The first computer crime case in China.
This unknown criminal gang, or perhaps an individual, spreads a virus on the Internet that has strong transmission capabilities, infection of hard drive capabilities and powerful destructive capabilities.
At present, nearly 100,000 computers have been infected in Jiangcheng, among which many small and medium-sized companies and state institutions have suffered severe damage, and the impact has been severe, and netizens have suffered.
This virus seriously affects network security and is extremely infectious.
It's December 22 now.
It is expected that more and more computers will be infected by the bear burning virus in the future. It is estimated that it will grow to a million, and Jiangcheng has no idea yet.
This case will definitely not be done by Chen Yi, because his Spark Computer Manager has a total of 25 million users according to the investigation.
The number of infections of the bear burning incense virus is simply a terrible thing compared to his software.
In other words, if Chen Yi really wants to release computer viruses, domestic computers will basically collapse.
However, there is no benefit or meaning in doing so.
Now he has taken the initiative to assist the police in solving the case. If it were really done by him, it would cause trouble.
Most of the articles on the Internet now seem to be nonsense.
Now Shen Yi actually took the initiative to ask for assistance from the police in solving this case?
The key is that he seems to be very good at programming. As for other things, how much does he know?
Could it be more knowledgeable than their task force specializing in various fields of computer science?
Could he decide the case?
"But I have a condition." Chen Yi did not leave Zhang Heng too much time to fantasize.
"Once I solve this case, you must make it public."
"Yes, if you solve this case, it will protect the public interest of society. We will give you a reward for bravery."
"The most important thing is to let all kinds of news media report on this matter."
"Even if you don't need to say, the media will rush to interview and report."
"Then I can try it."
Zhang Heng said: "Of course, you can try it."
Chen Yi nodded.
"Do you have any clues about the bear burning incense case in Jiangcheng?" Zhang Heng asked him.
After all, it was a case that broke out in Jiangcheng. Chen Yi wanted to solve the case across provinces, and what he wanted to solve was a computer crime case.
If he can really succeed, he can definitely learn and learn some experience, which can also be useful in future computer crime cases.
It can even be an example of how to solve a case.
In short, if Chen Yi successfully solves the case, there are many benefits.
"Let me get started first, this shouldn't be difficult."
Chen Yi stared at the computer screen and started his performance.
I saw him open the vc and write another program, and then he went to the infected website to download a bear burning virus.
He first ran the program he wrote before, and then turned on the bear to burn incense.
The computer has not changed much in a short period of time.
The bear burning virus is very low-key, and it will slowly infect all infected files on the computer.
It is not as exaggerated as those videos on the Internet, so many pop-ups pop up at once.
Nothing has changed for a long time.
Because Chenyi wrote the program to limit the virus.
His program prevents the bear from burning incense from infecting other files.
However, the characteristic of the bear burning incense will automatically click on the web page.
Chen Yi observed this web page pointed to by panda burning incense.
"There are ghosts on this page, and virus makers may use poisoned computers to click on this website to make a profit."
"ICP is also fake. If you trace it back to the real one, you can find clues related to them."
Chen Yi made another operation and found out the icp that the website had used before.
"The registration information of this icp is very important, and it is related to the criminal's accomplice or himself."
Zhang Heng immediately recorded this and then went to check the icp.
Continue to the next step of work.
Extract the virus's signature code.
The characteristic code is a type of scanning method among virus diagnosis methods.
Each specific virus has its own unique characteristic code.
Just like everyone has their own unique face.
If you make a metaphor, viruses and feature codes, you can compare them to the faces of fugitives and fugitives.
Then the technology of scanning feature codes is a camera with a database.
If the camera scans the fugitive's face and looks similar to someone in the wanted criminal's database, it will call the police.
However, some good people may be in trouble. They look very similar to this fugitive and the camera will also call the police.
This kind of situation where a good person is called a false alarm by a camera.
The metaphor mentioned above is the scanning of the virus's characteristic code, which belongs to the active defense and anti-virus technology.
The method of downturn is equivalent to extracting the "face photos" of the virus.
He soon found clues in the virus code.
“jcboy,xboy.”
Chen Yi repeatedly muttered this string of codes.
Ordinary criminals will not use their information as feature codes, but this criminal seems a bit arrogant because these two English words are not common in programming, and they are obviously deliberately added.
He knew that this was the important information for criminals.
This criminal is too rampant, as if he had committed such a case and felt very accomplished.
However, it is this guy who regards information as a feature code that can help him find him faster.
Otherwise, he would have to use various means to search for IP.
, search for netizens called "jcboy" on cc.
Then he wrote another program to lock in the keyword "virus", the space and personal profile of the number.
Finally, number.
When I opened the space, it was written: "Selling account robbery horses."
OK, it must be this guy!
Viruses are sold on the account?
There is no real-name authentication and telephone authentication yet, so there is basically no one to find.
These alone are not enough to prove that this person is a criminal, Chen Yi has started the next step of work: tracing the source of the virus.
However, the results of the virus tracing are not satisfactory because the source of this virus is very complex and is available in various areas in Jiangcheng and other places.
This can prove that the virus has been trafficked several times.
Number, and then sent him a message:
"Is gg here? Buy the account burglary virus."
Not long after, the man finally returned.
"Okay, you pay first. Bank card number: xxxxx..."
Chen Yi's ID card, bank card, mobile phone, etc. have returned to the original owner.
For 100 yuan, I directly transferred it to this netizen.
The other party was also very honest and sent the virus over.
Then he deciphered the virus again and found the words jcboy and xboy in it.
It is exactly the same as the characteristic code of the bear burning incense virus!
This can prove that this jcboy is the seller of these two viruses.
Since it can be sold, it means that he has a connection with the developer, and maybe he is the developer.
As long as you catch him and follow the clues, the case will be solved directly.
At this time, Zhang Heng finally completed what he wanted to do: "I have found the registrant of that icp!"
He pondered for a while, then pointed to the screen and said:
Chapter completed!