Feeds

Cyber gang made £30 MILLION from fake gov certs

Hacked official sites to make phony qualifications

Providing a secure and efficient Helpdesk

Chinese police are celebrating the arrest of a nationwide cyber crime gang suspected of making over £30 million by selling fake professional qualifications, which they helped to produce by hacking into government web sites.

Police have arrested 165 people so far, scattered across 12 provinces. A whopping 185 government sites are thought to have been breached by the gang, according to China Daily.

The group made their money by selling fake qualifications certifying the recipient in fields such as medicine, financial services and architecture, with over 30,000 people suspected of having bought the dodgy certificates.

The gang’s USP, and the reason it could charge up to 10,000 yuan (£1,000) per certificate, was that it could hack the relevant government site and tamper with the back-end database to ensure that the fake cert’s name and registration number appeared legitimate.

Police in Jieyang, Guangdong province cracked the case when city officials raised the alarm after spotting that an illegal link had been added to one of the local government web sites.

The gang was found to be a highly organised and extensive network of individuals, each with different responsibilities – some would hack the government sites, some would manufacture the certificates and seals, others would advertise their services, and so on.

"The gang tampered with official databases or added links to external databases so that if anyone checked up on the fake certificates, the client's name would appear," said Chen Xiaoping, head of Jieyang police's cyber crime unit.

"They have a strong idea on how not to get caught. They used overseas servers and bank accounts of strangers, whose details were bought online."

Roy Ko, centre manager of the Hong Kong Computer Emergency Response Team (HKCERT), said the news was not surprising, given the huge demand for professional qualifications in China which already leads to widespread cheating at exams.

“Hacker groups will do anything to optimise their profit, by the easiest means. Obtaining personal credentials and re-selling them cannot generate quick money,” he told The Reg.

“There were already channels to get fake certificates. This is just going one step further, to ensure the fake certificates can actually be found on official web sites.” ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.