Chapter 901: Hackers Attack

Lu Shaohua's perfect strategy is the extermination trilogy, it seems that the trilogy is very simple, but who can be as closely linked as Lu Shaohua thought! In addition, Lu Shaohua still relies on the strength of the Tiger Roar Base, for example, to hunt down and kill other strongholds of those terrorist organizations, Lu Shaohua uses the strength of the Tiger Roar Base as a benchmark.

Just imagine, if Lu Shaohua didn't have a Tiger Roar base, would Lu Shaohua still be able to come up with such a plan? The answer is very clear, the strength is gone, and Lu Shaohua naturally won't think about it in this regard.

But then again, if Lu Shaohua didn't have the support of the Tiger Roar Base, he wouldn't have been able to come up with such a foolproof strategy, because without the strength of the Tiger Roar Base, it wouldn't be called a foolproof strategy, and there would be no such extermination trilogy.

The problem arises here, it is precisely because Lu Shaohua has this strength that Lu Shaohua successfully came up with a plan, and instructed Qian Qian to cooperate with the second prince, and the two sides will take joint action to try to eliminate all terrorist groups in Saudi Arabia as soon as possible.

Of course, in the operation, the necessary arrangements are still required, and the arrangements will take time, and it is destined to be impossible to start the action in a short time, at least, within a week, the action will not be able to start.

But Lu Shaohua can afford to wait, he has been waiting for so many years, why bother with this time, it will pass in the blink of an eye.

Yes, time passed in the blink of an eye, Lu Shaohua really didn't need to worry, however, when Lu Shaohua thought he could be idle, the turmoil arose again, and Lu Shaohua had no choice but to be idle.

Phoenix Bank's network system has been attacked!

Yes, it was just an attack, and it was not breached, but even so, it was enough for Lu Shaohua not to be dignified. Phoenix Bank has been established for more than ten years, and there was no network system in the past, but with the development of the network, the network system of Phoenix Bank has also been established.

But after being established for so long, the network system of Phoenix Bank has not been attacked, oh! No, it's not that I haven't been attacked, it's just that the intensity of the previous attack was not large, unlike this time, which was attacked by a large margin.

What does it mean for a bank's network system to be attacked? It means that if it is breached, then the user information in Phoenix Bank may be funded, and the money in the account may also be transferred casually.

Fortunately, by the time Lu Shaohua received the news, the bank's network had not been breached, and it was still desperately defending.

couldn't help but say, Lu Shaohua took out his mobile phone and made two calls respectively, and then he couldn't care about being idle, so he asked Li Shangkui to prepare the car and quickly rushed to the headquarters of Phoenix Bank, Lu Shaohua wanted to see what was going on in person.

In his previous life, Lu Shaohua mixed into the technical director of an Internet café, although he was self-taught, but it does not mean that Lu Shaohua will not know anything, you must know that a regular and large Internet café has competitors, and competitors attack each other through various means, so that the other party's Internet café cannot operate, which is a normal thing.

And invasion and sabotage are often encountered, and Lu Shaohua, the technical director of the Internet café, naturally has to deal with and defend, so Lu Shaohua still understands the hacker more or less.

Soon, Lu Shaohua came to the scene in person, asked the staff to switch the bank's host display to the big screen, and watched the data streams continue to impact the defense line of the Phoenix Bank system, Lu Shaohua couldn't help but feel angry.

"Follow me, track down the real IP of this guy." Lu Shaohua ordered fiercely.

That's right, Lu Shaohua is talking about tracking 'this group', not tracking this person, judging from the attack intensity of the data stream, Lu Shaohua quickly determined that the person involved in the attack was not one person, but a large group of people.

Dare to blatantly attack the network system of the Bank of Phoenix, Lu Shaohua knows that the strength of this group of people is very strong, but if they underestimate the security department of the Bank of Phoenix, then they are wrong, as a staff member of the bank's network security department, how can they be incompetent!

What's more, Lu Shaohua is a person who has traveled from the afterlife, so he naturally knows that the profession of 'hacker' is powerful, how can Lu Shaohua be defenseless. Therefore, when the network system of Phoenix Bank was opened, Lu Shaohua had already gathered many strong technical backbones to enter the network department, in order to prevent the bank's network system from being attacked.

In addition, the Phoenix Bank network system is installed with the latest firewall of Phoenix Security Company, which is a very strong firewall, and if you want to enter the internal network system of Phoenix Bank, you must break through this layer of firewall.

However, judging from the current situation, the defense line named Phoenix Firewall is still very strong, still as stable as Mount Tai, and has not been breached in the slightest. However, Lu Shaohua knew that if he was still attacked by such a strong data stream, it would only be a matter of time before he was breached.

However, Lu Shaohua was not worried at all, his order was not to defend, but to choose to track the other party's real IP and try to find out the other party's true identity.

Not defensive? Instead, track it down?

How ridiculous this order looks, but since Lu Shaohua gave such an order, it is not a joke, and it is not ridiculous, because Lu Shaohua made two phone calls as early as when he received the news, one to Shenzhen, and the other to Africa. Order the computer experts in these two places to gather and participate in the operation.

Than hacking? If you want to compare hacking technology with Lu Shaohua's Phoenix Group, it would be a big mistake, not to mention that there are many hacker masters in Shenzhen who work in Phoenix Network Company, a subsidiary of Phoenix Group, and a single hacker master of Tiger Roar Intelligence Network is a bull boom.

It's good now, Lu Shaohua ordered the two places to take action, looking at it like this, Lu Shaohua wants to make dumplings, so that the other party has no return, by the way, check the true identity of the gang, and see if the other party has any behind-the-scenes instigators.

With Lu Shaohua's order issued, the staff of the security department of Phoenix Bank worked quickly, constantly tracking the real IP of the other party.

However, the group that attacked the Phoenix Bank's network system did not stop, and continued to attack the firewall, but this time the impact could not cause any trouble for the Phoenix Firewall, no matter whether they increased the data flow or used other means.

On the contrary, with their impact, the Phoenix Firewall has become more and more consolidated, don't get me wrong, it's not that the firewall has intelligence and will evolve on its own, but the people from Shenzhen have come in and invested in the defense to strengthen the defense of the Phoenix Firewall.

"Chairman, the other party seems to realize that it can't break through our firewall, and it seems that he wants to evacuate." A young man with glasses who looked like a gentleman, but because of his messy hair, he looked a little odd.

This person is none other than the head of the security department of the Phoenix Bank, and he is also a computer master, whether it is hacking technology or red customer technology, he is very proficient.

"Bite them for me, try to delay them as long as possible, and don't let them escape." Lu Shaohua gave the order viciously, and then added one more sentence. "The person in charge of tracking me to speed things up, make sure to find them before they leave."

In Lu Shaohua's mind, if he dares to attack the network system of Phoenix Bank, that is, he is an enemy of the Phoenix Group and an enemy of Lu Shaohua. Since they are standing on the other side, there is no need for Lu Shaohua to be polite to them.

However, Lu Shaohua also knew that at this time, relying on the manpower of the security department of Phoenix Bank, it was obviously difficult to track down such a large group of people on the other side, so after Lu Shaohua gave the order, he called Li Zhijie again and asked him to order his subordinates over there to participate in the tracking.

Catch them all, that's right, what Lu Shaohua wants is to catch them all, so that none of the people involved in the attack can escape, if it is possible, they will also counterattack the opponent's computer to see if they can find something valuable, so as to find out if there is an instigator behind that group.

…… Time is passing bit by bit, and the Phoenix Firewall no longer sends out the alarm of being attacked, which means that the group that attacked has not attacked, but this does not mean that they have withdrawn.

In fact, it's not that they don't want to evacuate, but they have been entangled, and there is no other way to evacuate than to directly disconnect from the network.

As a hacker, it seems a bit unreasonable to use the network disconnection to evacuate, not to mention that they will leave some traces when they are disconnected from the network, and these traces can be traced to them, so, under normal circumstances, a hacker will not use the network disconnection to evacuate at the time of the invasion.

"Chairman, the real IP of the other party has been traced." It was the director who reported.

"Are you sure it's not a broiler?" Lu Shaohua asked rhetorically.

This sentence seems to be questioning, but it is not, but Lu Shaohua is confirming whether the traced IP is real and not the other party's springboard.

"It has been confirmed that it is a real IP, and it is an IP from New York, USA."

"Counterattack, give me counterattack, I'm going to break their computer." Lu Shaohua gave another order.

Lu Shaohua was already ruthless, after finding the other party's real IP, he couldn't care so much, the only thing he thought about was to fight back, break through their computers, and find some valuable information.

Subsequently, Lu Shaohua called Li Zhijie again and asked him what the result was?

The headquarters of Phoenix Bank has tracked the real IP of the other party, but it has only been traced to one, you must know that the other party is a group of people, if that group of people is not in the same place, but scattered, then there is only one person caught!

Therefore, Lu Shaohua asked Li Zhijie to see if he had tracked the opponent there, and if so, to see if the IP was the same, to confirm whether the group of people was in the same place.

……

(To be continued)