Text
A defendant shall be punished by imprisonment for not less than one year and six months.
The seized evidence as referred to in subparagraphs 1 through 16, and 20 through 23 shall be confiscated.
Reasons
Punishment of the crime
【2013 Highest812】
1. The Defendant: (a) obtained financial information necessary for Internet banking by infection with a malicious code on computers; (b) obtained financial information necessary for the use of computers, etc.; (c) obtained financial information; and (d) conspired in order to acquire such information by deceiving a malicious code on computers to collect financial information and transfer funds; (c) collect and manage funds transferred; (d) withdraw and withdraw funds transferred; (e) collect and withdraw funds; and (e) collect and collect the false name from a telecommunications-based financial fraud group that consists of an organization that withdraws funds from the transferred funds; and (e) collect and collect the money from the telecommunications-based financial fraud group
On April 10, 2013, at least 22:30 on April 10, 2013, a name-free person in China established a malicious code to automatically connect the victim G’s computer to the phish site at the normal website of the financial company. The victim who intends to engage in the Nonghyup Internet banking business “I shall enter personal information for security promotion because the crime of fraud, such as hacking, occurs frequently.” The victim then released the victim’s financial transaction information from the victim’s bank account from 02:02 on April 10, 2013 to 01:0:30 on April 12, 2013; and then, the Defendant withdrawn the victim’s financial transaction information from the Agricultural Cooperative’s account to 3:0 on April 23:02, 2013 to 01:57 on April 12, 2013; and then withdrawn the victim’s personal information from the victim’s bank account to 3:301 J. 216.37.
Accordingly, the defendant, in collusion with the above-mentioned person, obtained property benefits equivalent to 11,263,00 won by making data processed by inputting information without authority into a computer or any other information processing device.