Is the software "Here comes the car" reliable?

But it is said on the Internet that "Here comes the car" stole the background data of "Cool Miko" ~ The company has a bad personality ~

The data of a bus software in Shenzhen was hacked by the opponent, worth 2 billion.

Dayang net

7- 12 8:27

As a product of the high-tech era, big data has increasingly affected our lives. Many technology companies base their business on big data. Recently, a theft case in the field of big data with a value of over 100 million occurred in Shenzhen, and the background data of the bus real-time software "Cool Mike" was suspected to have been stolen by competitors.

The victim "Cool Mick" is a technology company headquartered in Shenzhen. It claims that only the company directly invests, and the stolen big data is as high as nearly 100 million yuan, with a derivative value of about 2 billion yuan.

The reporter learned from the Nanshan District People's Procuratorate in Shenzhen yesterday that several people involved in the case have been arrested. At present, the case has been returned by the prosecution to the police for supplementary investigation. Nanshan police also confirmed that the case is still in the investigation stage.

This large-scale data theft case caused quite a shock in the Internet industry in Shenzhen, which sounded the alarm for industrial protection in the field of big data.

Text/Guangzhou Daily reporter Wang Na

Nowadays, the competition for big data resources in the transportation field is extremely fierce. While taxi software such as Didi taxi and Uber are madly occupying the market with the advantage of "Internet increasing data", some bus real-time software companies are also quietly fighting. Real-time bus data, such as how long it takes for a bus to arrive at the station, is the core data information of these real-time bus software enterprises. The recent data theft case in Shenzhen involved two real-time bus software.

A large amount of data was stolen by hackers.

"Cool Mike" is a real-time bus mobile phone software launched by Shenzhen Gumi Technology Co., Ltd., through which users can obtain accurate real-time information about related routes, including real-time bus traffic conditions, arrival time and distance. "Bus is coming" is a real-time bus mobile phone software developed by Wuhan Yuanguang Technology Co., Ltd. It is reported that more than a dozen companies in China are developing real-time bus software at present, and Gumi Technology Company and Wuhan Yuanguang Technology Company are the "leaders" in this industry. Their business covers dozens of cities across the country, and each city has about 4 million users.

Last year, in June+10, 5438, "Ku Miko" found that its data in Beijing was invaded and stolen by "hackers". Only one IP address of Beijing server is visited more than one million times a day, but under normal circumstances, the number of visits to an IP address of a hotspot should be below 65438+ one million times a day. Because the company's data is protected by specially designed encryption algorithm and there is a verification mechanism to verify the source of data, it is difficult for ordinary people to crack the password. By tracing the IP source, the company's data team learned that the server that carried out the invasion was in Hangzhou, Zhejiang Province.

On June 5438+ 10 this year, Gumi Technology Company officially reported the case to Gaoxin Police Station of Shengong Nanshan Branch.

The person in charge of the company involved was arrested.

The reporter learned from Gumi Technology Company that Nanshan police quickly launched an investigation after receiving the report and went to Beijing, Hangzhou and other places for on-the-spot investigation. The suspect finally locked in the competitor "Cool Mike" "The car is coming". The police found a batch of illegally obtained data in the computer of Wuhan Yuanguang Technology Company.

At the beginning of June, Shao Mou, the founder and CEO of "Car Coming", and others were criminally detained by Nanshan police for illegally obtaining computer system data.

Yesterday, the reporter confirmed from the Nanshan People's Procuratorate that many suspects in the case had been arrested. At present, the case has been returned by the prosecution to the police for supplementary investigation.

Subsequently, the reporter confirmed from the Nanshan police that the case is still in the investigation stage and the specific details will not be announced for the time being.

The stolen data is worth 2 billion yuan.

Li Liming, a partner of Gumi Technology Co., Ltd., said in an interview with Guangzhou Daily that since its establishment in 2009, the company has invested a lot in early equipment, maintenance and business, and directly invested nearly 100 million yuan.

Lily li said that "Kumike" collects about 65.438+0.5 billion pieces of data every day, but did not notice that the background encryption was cracked and the data was stolen. Later, after an industry colleague in Xiamen discovered that his data had been stolen, he alerted Ku Miko. Then, after searching, he found that since 20 14, an IP cluster has logged into the "Ku Miko" server millions of times every day, stealing data.

In Li Liming's view, the impact of this incident on Ku Miko is a matter of life and death, not just a short-term economic loss. "In the long run, this industry can only accommodate one enterprise in the end. If other peers are allowed to steal our data, the company's previous investment and efforts will be lost and the company will be unsustainable. "

In order to obtain these big data, nearly 100 million yuan has been invested, so what is the value of these big data today? Li Liming said that with reference to the financing estimates obtained by peers in the industry, the value derived from big data such as "Ku Miko" may be as high as 2 billion yuan. This case sounded in the era of big data.

Data information protection alarm bell

In recent years, cases of illegal intrusion to obtain data for reselling or commercial use have been reported frequently, but such large-scale cases of stealing competitors' data by hacking are rare in the industry. With the emergence of criminal cases of illegal access to data in emerging industries of the Internet, it has sounded the alarm of data information protection in the era of big data.

Lawyer Zhang Xingbin, a legal commentator in Shenzhen, said that in the past, people often reported that a software was downloaded through the APP Store, or misled consumers to download and use its software through website traffic and evaluation, or reached a deal with it, which was suspected of defrauding consumers. However, the parties in this case went directly to the background of another competing software and stole a lot of information and data for their own use. Obviously, it has been suspected of constituting a crime, but the precedent of such cases is still relatively rare in China.

Article 285 of China's Criminal Law stipulates that, in violation of state regulations, invading computer information systems outside the fields of state affairs, national defense construction and cutting-edge science and technology or using other technical means to obtain data stored, processed or transmitted in computer information systems constitutes the crime of illegally obtaining computer information system data; Among them, if the circumstances are serious, they shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention, and shall also or only be fined; If the circumstances are especially serious, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years and shall also be fined.

Zhang Xingbin said that at the moment when informationization is becoming more and more popular, each of us is a part of big data every day, and it is urgent to protect the security of big data; The security of information and data is not only the appeal of commercial interests, but also the protection of the legitimate rights and interests of each of our citizens. Among many means of protection, criminal punishment for offenders is particularly important. Only the deterrence is strong enough and the probability of crime is low enough.