Chapter 105: The Whole City is on Alert

Luckily, on Sundays, there is much less traffic in Seoul than on weekdays, so you won't be stuck in traffic on the road.

The black BMW Z4 crossed the Banpo Bridge and drove all the way from Cheongdam-dong, Gangnam-gu to Namdaemun-ro, Jung-gu, and turned off the engine in the parking lot of the headquarters of Nonghyup Bank.

Kevin Li unbuckled his seat belt and got out of the car, "I'm sorry I don't have time to accompany you today." ”

Kwon Yoo-ri curled the corners of her mouth and smiled slightly, "Work matters. ”

With a wave of his hand, Li Kaiwen trotted all the way through the main entrance of the Agricultural Cooperative Bank, if he usually teased with the two beauties at the front desk, he was not idle when the bank was attacked today, he nodded with a smile and went straight to the underground hangar.

Li Kaiwen's colorful sportswear did not attract the strange attention of the computer room staff, in fact, many technicians who took turns were similar to him, and they also rushed back to the bank as soon as they received a call from Wu Shangjiu, all dressed in casual makeup.

"How's the situation?" Li Kaiwen walked straight to Wu Shangjiu to ask about the development of the situation.

"It's not wonderful," Wu Shangjiu said, staring at the flickering screen, "the internal system, the online banking platform, and the ATM machine have been affected, and the network has been completely paralyzed. We were not the only banks that were attacked, but many banks, including Shinhan, Hana, and Kookmin Bank, were attacked, and their network services were completely shut down. ”

"Specifically targeting banks?"

Jones, an American IBM employee in charge of liaison and communication, walked over and said in a deep voice: "According to the news from IBM, major radio and television stations including KBS, MBC, YTN and other major radio and television stations have also been attacked, and the mobile operator LGUplus has also encountered similar problems, and it is initially inferred that it was an organized and premeditated hacker attack." ”

While the three of them were talking, Jin Youcheng, the head of the IT department, also arrived, also dressed in casual clothes, he made an appointment with his friends to go to Suwon Golf Course today, and just halfway through it, he received a call from Wu Shangjiu and rushed back to the bank headquarters in a hurry.

Jin Youcheng frowned and asked, "How is the situation?"

Wu Shangjiu briefly reported: "From the current situation, there are about 11 websites in China that have been attacked, and the websites of the Blue House and the Grand National Party were first attacked and paralyzed, and then the websites of the Ministry of National Defense, the Ministry of Foreign Affairs and Trade, and the National Assembly. ”

The so-called DDos attack is a distributed denial-of-service attack, and the attack is mainly to send a large number of data to the network server to be paralyzed. The attack method is that the hacker deliberately implants a malignant virus program into an unspecified large number of computers, and then remotely controls the infected computer, which is commonly known as a broiler, and manipulates these computers to visit the target website at the same time, causing the website server load to reach the limit or even overload, and the website access speed is greatly slowed down, and finally paralyzed.

It's very untechnical, but it's extremely sharp, like manipulating thousands of missiles at the same time to attack a target and detonate in an instant, and no facility can do anything in the face of a saturation attack.

"What do you think?" After a moment of silence, Jin Youcheng asked.

Although the impact of this attack was bad, almost all political and economic websites in South Korea were attacked by hacker organizations, which was a force majeure, and it was not a dereliction of duty on his part as the head of the IT department, and Kim Youcheng did not feel a burden.

"Judging from the scale and target of the attack, it is clear that this indiscriminate attack was organized and premeditated, and I personally believe that the most likely attack was carried out by our northern enemy, North Korea," Wu said. ”

Kim Youcheng nodded slightly, North Korea has a bad track record, it has always had a tradition of attacking South Korea, and there will be several large-scale attacks almost every year, Wu Shangjiu's guess is reasonable.

"What about IBM?"

Jones, with a beard, said: "We have analyzed that the attack on the Bank of Korea originated from the website of the Korea Software Intellectual Property Commission, and IBM has blocked the connection. ”

β€œKevin。 ”

"Yes, I think in order to avoid a second wave of attacks by hacker groups, it is necessary to go back and get them out. ”

"Are you sure?"

Kevin Li nodded heavily, "Do your best." ”

Kevin Li is not concerned about the attack on the bank and the losses caused, he has been working as a hacker far more than he is a bank cyber security expert, and his first reaction to an attack is to fight back and find out the source of the attack to face it head-on.

Because of its use of privately created IP addresses, Nonghyup Bank has been the first to be attacked almost every time, and it has never been spared.

It's unlucky.

But then again, it is precisely because of the unfortunate nature of Nonghyup Bank that Li Kaiwen has more opportunities to show his talents.

Wu Shangjiu is responsible for leading the IT team of Nonghyup Bank to restore the bank's network, Li Kaiwen is responsible for tracking the traces of hackers, and Jin Youcheng is responsible for overall planning and arranging for each of them to be busy.

Jin Youcheng and Wu Shangjiu stayed in the basement computer room to command, while Li Kaiwen returned to the IT department's office area on the twelfth floor, and he didn't want his tracking of the hacker organization's operations to become a live broadcast.

The attacker is a large organization and Kevin Li is alone, of course he needs a good helper, so he plans to turn to the top hackers in the "secret room".

Of course, these confidential insiders should not be known to unrelated people.

It took about ten minutes to break through the firewall of the "secret room", and Li Kaiwen issued an announcement of "playing a game", which simply and clearly stated that South Korea was attacked by an unknown hacker group, and invited the hackers of the "secret room" to track the source of the attack, and the person who first found the source of the attack won.

He wasn't sure how much interest the game would arouse from hackers, after all, there was no profit drive that depended entirely on the hacker's competitiveness, and it was better to talk than nothing.

With the announcement, Kevin Li began to probe and track the clues of the mysterious hacker organization.

At the same time, on the other side of the ocean, in a luxury villa in Orange County, Greater Los Angeles, California, USA, a fat boy with a freckled face, a floral shirt and beach pants is sitting leisurely in front of the computer with his feet crossed, casually browsing the web, and occasionally picking up a Coke can next to him and taking a big sip.

Suddenly, an announcement caught the boy's attention, and he squinted his eyes and clicked on the announcement, "Play a game, it's fun." ”

After reading the announcement, the fat boy put down the Coke can in his hand and laughed: "I am the winner, I see which of you can be faster than me." As he spoke, a pair of fat palms danced deftly on the keyboard.

South Korea's Internet intrusion incident alerts are divided into five levels: normal, concern, attention, alert, and moment, and the Korea Broadcasting and Communications Commission issued a "vigilance" level alert for the hacking incident. At the same time, computers infected with malicious code are found in Internet service providers (ISPs) and attacked websites, these IPs are cut off, and personal computer users are required to take measures such as upgrading anti-virus software.

South Korean authorities urgently began to investigate the source of the attack, and preliminary statistics showed that about 12,000 computers in South Korea and 8,000 computers outside South Korea were infected by the virus and used in the hacking attack.

Kevin Lee also only tracked the addresses of three CC servers, which belonged to Thailand, Poland and Italy, and it was very difficult to trace them further.

"Ding-dong. A crisp chime reminded Kevin that he had a new email.

Kevin Li came back to his senses, clicked on the email, and saw that there were two sets of IP addresses: 203.131.222.102, 88.53.215.64.

Kevin Li quickly replied: The source of the attack?

The other party only replied with one word: Sure

I1153