Chapter Ninety-Two: All the Masters Were Played by Xiao Wu!
Nighthawk landed on the organization's network.
But the next moment he was stunned.
Because he found that the organization's network had been breached.
There were even countless people pouring in.
What's going on?
Their network is secretive.
Except for those rich circles, no one knows at all.
Nighthawk's face changed dramatically when he saw those people leaving messages.
"There really is this web page, and the news on the Internet is true. ”
"Damn, why is there such a criminal network, and the FBI hasn't found out?"
"You scumbags, you've been exposed, you're finished. ”
“......”
Nighthawk was shocked.
Their organization was exposed?
How can it be?
He immediately went online, and then his face became even more ugly.
Not just exposed, but thoroughly exposed.
Including him, the details and information of all the members were exposed.
"Damn!" Nighthawk cursed in a panic.
Which hacker did this?
Why can't you get along with them?
And, Nighthawk knew exactly what that meant.
You have to run away right away.
Otherwise, it will be over soon.
But when he looked down, he found that there was a red dot on his heart.
"No!" Nighthawk's face instantly turned terrified.
He naturally knew what it was.
Burst!~
Bloodsplatter.
Nighthawk's heart was directly pierced by a bullet, his eyes widened unwillingly, and he slowly fell.
Until he dies, he will know that this fate is just a task he has taken over to deal with Li Jue.
The turmoil continues, and the impact is great, and I don't know how many people are affected.
In addition to the Nighthawks, those who are in the bounty organization are naturally on the run, caught and killed.
And someone has to blame for the decline in the stock price of those groups, and the heads of many groups have been replaced by the board of directors.
Similarly, parliamentarians who have special deals with those groups are investigated one after another and then dismissed.
Those companies affected can only put out the fire, issuing clarifications one after another.
At the same time, they are also secretly investigating this matter.
No one can calculate whether they will be able to pay the price after that.
Their company's secrets and customer information are confidential, why are they being silently exposed?
Their only guess is hacking.
And it's a very powerful hacker, so that they can do it silently, so that their company's network technicians don't find out.
So, even if they are implicated by the bounty organization, they will take revenge.
Apple's Technology Center.
Beside Cook were already members of the board of directors.
Their faces were all gloomy and angry.
Cook yelled at the network technicians, "Who can tell me? What the hell is going on? Why is that information being exposed?"
The technicians didn't look good.
"Mr. Cook, we don't know, we haven't been attacked at all. ”
"That's right, the defense network doesn't alert you to a breach. ”
"If the other side attacks the firewall, we'll know. ”
"So many of us work in three shifts, and it is impossible to give the other side a chance to invade silently. ”
“......”
Cook said viciously: "Check it for me, the data and information can't be exposed silently, there must be a problem." ”
Those technicians did not dare to hesitate, and immediately took action and began to check the entire company's network one by one.
Soon, the faces of these technicians were extremely invisible, and there was an expression of disbelief, as if they had seen a ghost.
"What? What the hell is this?"
"How so?"
"It's really been invaded silently, is there such a terrifying hacker?"
“......”
They found traces of hackers in the depths of the company's network.
That's a middle finger gesture made up of code.
Seeing this, these people from Apple, Cook and those sensible, a nameless anger couldn't help but rise.
This is Chi Guoguo's provocation.
Then there was a well-up of fear.
A hacker literally silently crossed their firewall, exposed their secrets, and even left this provocative trail.
The key is that none of their technical teams have found out.
How good does it take for a hacker to do this?
You know, their cyber defense capabilities are among the best in the world.
This is the case with them, but what about other companies, and even the official secret bases?
In the face of this kind of hacking, I'm afraid I can't resist it at all, right?
And the middle finger gesture composed of the code was naturally deliberately left by Li Jue for Xiao Wu.
It's a provocation, and it's a kind of play.
Moreover, there is no cover-up, as long as you investigate, you will find that you deliberately give clues, and there will be a good show to watch later.
Naturally, after the investigation of other implicated companies, they also found the middle finger gesture composed of the code left by Xiao Wu.
At that moment, the person who saw the middle finger gesture composed of the code was also shocked by the strength of the hacker.
Apple companies are provoked, and it is naturally impossible to stop there.
If this revenge is not avenged, how can they swallow this breath?
They organized technicians, and even invited all the hackers who were internationally famous, trying to find out the hacker by following the traces of the middle finger gesture.
Even well-known computer experts in the United States are involved.
With such a lineup, I believe that no hacker in the world can resist and not be caught by them.
Isn't that the world's number one hacker like that? Now that guy has lost his freedom and is working as a tool man somewhere in the United States, right?
This kind of horrible hacking is either used by them or completely eliminated.
Soon.
Cook met five master hackers at the tech center.
These 5 hackers are all well-known masters on the world's hacker network, and all of them are in the top 20, and two are in the top five.
By cooperating with the company's network technology master, they will definitely be able to find out the hacker master.
Cook invited these people, and naturally paid a lot of price.
Soon, these hackers and Apple's cyber gurus were on the move.
They started tracking along the middle finger gesture of the code.
As a hacker, silence is the king, so leave a clue to provoke, that is to take death to know.
"A clue has been found. ”
"Caught the little tail, follow the trail. ”
When Cook heard the news, a smile finally appeared on his gloomy face.
That damn guy, it's going to be finished.
At this time.
Huaxia is already in the night.
Li Jue was summoned by Xiao Wu and entered the laboratory.
"Sir, the people of those groups have discovered the clues I left behind. Xiao Wu said invitingly: "Apple is indeed powerful, they found it faster than others, and they have begun to follow the clues, but the final place they enter will be Google's defense network." ”
Li Jue smiled and asked, "Apple's people won't find out, right?"
Xiao Wu smiled: "No, if I do it, they will soon have a fierce collision, until both sides are completely dumbfounded, and the other companies I selected will also do the same." ”
Apple.
One hacker said, "The other party's network has been discovered." ”
Another hacker said: "Before I snooped, I knew that this network defense was very strong, and it deserved to be a super master, and this degree of defense was comparable to the network defense power of the previous large group company, right?"
Hearing this, Cook did not hesitate at all, and directly ordered: "No matter how strong the defense is, give me to attack the other party, and then call up the other party's information to me, I will make the other party pay." ”