Tag

cybercrime

1 views collected around this technical thread.

Architecture Digest
Architecture Digest
Jul 25, 2024 · Information Security

Investigation of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps

The article analyzes how shady mobile applications exploit phone‑credit and electricity‑bill recharge interfaces to funnel user payments through complex, hidden channels, describing the laundering chain, various payment methods, server tracing details, and the broader security implications for the black‑gray market.

black marketcybercrimeinformation security
0 likes · 8 min read
Investigation of Phone and Electricity Recharge Money‑Laundering Schemes in Illicit Apps
IT Services Circle
IT Services Circle
Jun 17, 2024 · Information Security

Disgruntled Former Employee Hacks Singapore IT Firm, Deletes 180 Virtual Servers, Highlighting Human Factors in Enterprise Security

A former NCS QA engineer in Singapore, feeling wronged after his dismissal, illegally accessed the company's internal systems, wrote malicious scripts, and deleted 180 virtual servers, causing $678,000 in losses and prompting security experts to stress the importance of account deactivation, continuous monitoring, and the impact of employee emotions on corporate security.

authenticationcybercrimeemployee monitoring
0 likes · 7 min read
Disgruntled Former Employee Hacks Singapore IT Firm, Deletes 180 Virtual Servers, Highlighting Human Factors in Enterprise Security
Efficient Ops
Efficient Ops
Jun 16, 2024 · Information Security

How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison

A Singapore court sentenced former NCS employee Kandula Nagaraju to over two years in prison after he illegally accessed his ex‑employer’s QA system, deleted 180 virtual servers, and caused more than $670,000 in damages, highlighting serious cybersecurity and legal repercussions.

Data LossUnauthorized Accesscybercrime
0 likes · 6 min read
How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison
Java Architect Essentials
Java Architect Essentials
Feb 22, 2024 · Information Security

Analysis of Recharge‑Based Money Laundering Schemes in Illicit Apps

The article examines how certain shady applications use phone‑bill and electricity‑bill recharge interfaces as covert channels to launder money, detailing the multi‑step chain from unsuspecting consumers through small merchants and QR‑code transfers to black‑market accounts, and warns readers of the hidden risks.

Payment Channelsblack marketcybercrime
0 likes · 7 min read
Analysis of Recharge‑Based Money Laundering Schemes in Illicit Apps
Java Architect Essentials
Java Architect Essentials
Jun 12, 2021 · Information Security

China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software

In September 2022, Nantong police uncovered China's first nationwide case of illegal WeChat user data harvesting using a "clean fan" application, leading to the arrest of eight suspects who were convicted for illegally obtaining computer system data and controlling systems, highlighting severe information security risks.

ChinaWeChatcybercrime
0 likes · 7 min read
China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
Efficient Ops
Efficient Ops
Oct 30, 2018 · Information Security

How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan

In a 2018 Beijing police operation, a former operations supervisor illegally raised his system permissions, downloaded three proprietary project source codes from a tech company, and sold them for nearly eight million yuan, leading to the arrest of two suspects after extensive digital forensic investigation.

ChinaPrivilege Escalationcase study
0 likes · 4 min read
How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Dec 6, 2016 · Information Security

Seminar on Building a Secure Internet Ecosystem Highlights Policy, Legal, and Technical Challenges

A recent seminar in Beijing gathered government, academic, and industry representatives to discuss the rapid growth of the internet, the rising threats of black‑gray markets, gaps in legislation, the need for unified standards, and collaborative measures to strengthen the overall cybersecurity ecosystem.

Internet securityLegal FrameworkStandardization
0 likes · 6 min read
Seminar on Building a Secure Internet Ecosystem Highlights Policy, Legal, and Technical Challenges