031 Needle in a haystack

"How was your first day at work?"

What Meng Fei didn't expect was that Luo An's WeChat avatar would take the initiative to light up and send greetings.

During working hours at the bank's desk, you are not allowed to turn on your mobile phone at all.

They can only contact VIP customers through the work WeChat account, operating on the computer.

But Meng Fei is not subject to this restriction. He has networking skills. The strongest bug system in the brain directly controls the mobile phone in the pocket.

"It felt ok. ”

Meng Fei was actually talking about the girls around him.

"Is the case tricky?"

Luo Ann only cares about business.

If the experts he selected can successfully solve the case, the relationship between Mantis Software and the relevant departments will be further deepened, and they will be more qualified to compete for more projects.

But on the other hand, if it is a mess, then Meng Fei's loss will be small, and the prestige of Mantis Software will be greater.

"Don't worry, big boss, I'll take care of it. ”

Luo An was stunned. I used to hear that this kid was introverted and cautious, why is he so big now?

In fact, this case is indeed tricky, even if he has a system in hand, there is still a certain amount of trouble.

But always be confident in front of the boss, unless you can't get along with the future.

The case seems very simple, that is, the money of several VIP customers was inexplicably transferred.

But it's complicated and complicated, and finding the real cause is like looking for a needle in a haystack.

In the last two weeks, hundreds of thousands of small funds have been diverted from the accounts of VIP customers of Golden Turtle Bank to an illegal account that has been monitored.

The bank did not immediately close the illegal account. It doesn't really mean much. This account is just a person behind the scenes, who is using it to collect money.

If you block this, he can go to another account. When the time comes, you may not be able to monitor it.

The VIP customers of Golden Turtle Bank are all large sums of money, and they usually don't notice this small amount of transfers.

When the bankers called to ask, they found that the money in their accounts had been transferred inexplicably, and they denied that they had ever operated it.

According to the system records, the money was transferred through legitimate operations, entering usernames and passwords.

It's just that none of these operations come from the VIP users' own computers or mobile phones.

Some people think, oh, I just need to look up the IP address of these operations, just find out where the operator is.

In fact, this meaning is just for reference.

Even if people don't deliberately hide, with NAT forwarding everywhere nowadays, and countless machines sharing IP addresses, it is difficult for you to locate the real black hand through the IP address.

If the other party sets up a proxy to move the IP overseas, or simply walks on the street and finds a random wifi hack to surf the Internet, you can easily put the black pot on the head of others.

The person in charge of this case is the Cyber Security Section of the Criminal Investigation Bureau, and they have all investigated this information and sent it directly to Meng Fei's mailbox.

He skimmed through the past, one by one. It can be seen that the machines that initiate the operation are scattered and irregular.

There are mobile phones and computers, domestic and foreign, in-house machines and private ones. There are even servers that are clearly hacked.

This is a real veteran, a veteran who doesn't leave a trace.

If it's just VIP customers who really leak their passwords, it's not a very serious problem.

Hundreds of VIP customers' accounts and passwords were leaked at the same time in two weeks, which is a bit scary. You don't even know exactly how much leaked out.

The list of accounts of VIP clients is kept only in the bank. Therefore, even if we don't talk about how the password was leaked, the account list can only be leaked from the bank.

If there is a leak, the mantis software is also inseparable. The security system of Golden Turtle Bank is developed and maintained by Mantis Software.

Because of this, the bank asked the Criminal Investigation Bureau to invite an expert familiar with the mantis software from the expert court to participate in the investigation.

This has to be Meng Fei, who has just taken office.

His mission is not to catch the people behind the illegal money transfers, but to find out how the bank accounts of VIP users leaked out.

A needle-in-a-haystack task.

But the VIP account managers are the biggest suspects.

Because there is a huge crater here, and it is also the weakest point of the whole system.

The VIP Account Manager's computer has access to the VIP client's information from the server, which is necessary for their operation.

Just to prevent account managers from leaking this information, the security system is technically shielded so that they can't see it.

If there is a way to break through the security system, it is possible for account managers to get their hands on this information and sell it to black industry organizations.

That's not to say that leaks are impossible otherwise. It's just that with Meng Fei's experience, hackers always have a high probability of choosing the easiest link to start.

He must first familiarize himself with the operation routines of the VIP account managers, and then analyze step by step whether there is a possibility of accidentally breaking through the shield at each step.

Even if it doesn't appear on the surface, if you look closely at every line of code and every instruction, the vulnerability may be hidden inside.

Maybe the normal operation can't be triggered, and some special actions can be exposed.

For example, in his previous life, there was a very funny vulnerability in Windows.

Originally, you had to enter your username and password when you logged in. Later, someone stumbled upon the fact that you can skip this step by switching the input method when entering the password.

Password restrictions have become virtual.

Maybe the source of the leak was that an account manager accidentally did an unusual operation, only to find out that he could see the list of VIP users' accounts and download them?

There was no need for Meng Fei to analyze step by step, he directly called up the BUG system.

"Scan for all vulnerabilities that could expose VIP customer accounts. ”

At this time, he could feel the countless codes and logic running through his mind like lightning.

In the first few times he used the strongest bug system, he didn't feel this way, and everything passed without realizing it.

Now he can feel that it is because as he rises in level, his control and understanding of this power from the system is getting stronger.

He could feel the powerful computing power that came from nowhere, analyzing every bit at an incredible speed.

Eventually, a series of vulnerabilities were enumerated.

Seeing that he shook his head again and again.

It's not that these vulnerabilities aren't available, it's that they're too hard to use.

If you get a development team, you might be able to use one or two of them after a few months of hard work.

It is absolutely impossible for a VIP account manager sitting here to exploit these vulnerabilities to gain access to a client's account.

But the results of his analysis this time can only confirm that there is no problem with the client in front of him and the server he connected to this time.

He didn't know if the other machines would be any different.

Theoretically, the software on these machines is the same.

But who knows if different versions of patches will be installed on different machines, or will simply be installed by internal ghosts with Trojans that directly destroy the security system?

He plans to analyze all the machines used by the VIP account manager.

It's not just a matter of installing an antivirus software and scanning it once.

Antivirus software can only recognize recognized viruses and Trojans. If you write your own program to "steal" the information you already have on your machine, you will most likely be ignored by antivirus software.

What he needs to scan is all the code on the machine that might be running, whether it's a virus or not.

He needs to know where they come from, what they are for, what they do, and whether there are any loopholes.

Equivalent to a comprehensive security test of a whole bunch of unknown software.

This probably involves more than 300 computers in the account manager's office on this floor.

In the past, even if you don't count the time to develop scanning tools, it would be good to be able to get 10 scans a day, and this job would be done for at least a month.

But now he can directly use the BUG system to scan one by one.

Of course, he doesn't walk around every computer in front of everyone and perform his "magic". And time is not so short.

He would do it again in the dead of night when everyone was off work.

So the rest of the day, just hang out on the website and tease the girl on WeChat.

Mornings always go by very quickly. Especially when there's a beautiful girl sitting next to you.

That's when he heard a cooing sound.

He lowered his head and whispered to the girl beside him:

"Your stomach is ringing. ”

Xiao Han, who had been busy with work and forgot the time, reacted.

"Ah, I'm so sorry, I almost missed the meal!"