Chapter 254: A Mega Event

A infection of these computers is not the goal, these infected computers are accessed

VPN network, the program will use these people's permissions in the network to start downloading the code base

source code, and wait for the opportunity to deliver the stolen code. [Full text reading]

The target of the teleportation, Hu Yifei has also set, it is Conley's computer.

Hu Yifei basically doesn't have to worry about the rest of the matter, just like the situation when Kang Li stole the Golden Dragon prescription at that time, the program will automatically perform all the steps and choose a suitable time

machine, and send the stolen code uniformly.

When he was about to get off work in the evening, Hu Yifei received a message that the video conferencing tool was successfully implemented

Finish.

Hu Yifei began to remove traces related to himself on all computers, especially the three computers that he infected with fake prescriptions, he had to clear his own future door program, as for the rest of the matter, Google will do it for himself, what Hu Yifei has to do is to let Conley and his generation

I can't figure out how I got this done.

At the same time, Spark's side had no choice but to find Mei who was in charge of the operation

A few people sat in the room and discussed what to do next.

"The underground trading network is probably not going to work!" Sparker explained that he had changed his line

The reason for the plan, "The list we put out is frequently maliciously snapped up by anonymous people, and it is impossible to attract Zm = miscellaneous hair."

Conley testified for Spark, "It's true, anonymous people are very interested in Jinlong Pharmaceutical's prescription. ”

The official in charge of the operation, an assistant to the White House cyber official, listened to Spark's nagging and said, "Do you have any backup plans now?" can't make a big impact,

And it is necessary to elicit Zm = stray hair! ”

"Our previous actions to steal prescriptions, including the pending orders of the underground trading network, have not been noticed by the other party so far, so it can be seen that Sun Zamao is not responsible for the network security of Jinlong Pharmaceutical

Business! Sparker paused, "Since the secret action has no effect, then we might as well put things on the table, we can launch some destructive attacks against the network of King Long Pharmaceutical, which will definitely attract the attention of the other party, and at the same time, we will leave some insignificant flaws in the attack, and guide Zm=miscellaneous hair into the trap we have set!" ”

"Is there a specific plan?" The assistant official asked.

"Yes!" Sparky looked at Conley, "Let Conley introduce you, he is still the executor of this operation!" ”

Conley shrugged helplessly, he was very depressed in his heart, and said that he would just get the Golden Dragon Medicine

If you have a prescription for the industry, you can revoke your criminal record, regain your freedom, and even join the cyber security of the United States

The whole department, but now he is asking himself to attack the network of Jinlong Pharmaceutical again, and let himself do it twice in one trip, but the benefits have not doubled, can you not be depressed?

"Here's the plan!" Conley opened a simple sketch in his hand, "First, we threw viruses into the other party's network, causing the other party's intranet to be paralyzed, and at the same time, we attacked the other party's customer management system server to make them ......."

"Is this kind of action too big for not moving?" The assistant officer was hesitant.

"This time the movement is going to be big, but we need the cooperation of the intelligence department to try to make friction between a pharmaceutical company and Jinlong Pharmaceutical, the greater the friction, the better, preferably the irreconcilable kind of contradiction. In this way, our attack will be misjudged as a hacker revenge incident caused by a dispute between two pharmaceutical companies. At the same time, we are preparing for a two-pronged approach, leaving loopholes in the hacking and on the other hand, on the network of the disputed pharmaceutical company

Trapping preparation, no matter where Zm = miscellaneous hair starts, we can wait for the rabbit! ”

The assistant official nodded, "There is no problem with the train of thought, you can continue to talk about the detailed plan!" ”

Conley continued what he had just said, and as several people sat around the table, no one noticed that there was something unusual about Conley's computer.

More than an hour passed, and these people finally decided on a comprehensive plan of action.

The assistant officer looked at the final plan of action and nodded, "I'll do it as soon as possible."

Talk to the intelligence services, and when they confirm the plan of action, you can start the operation! ”

"Be quick!" Sparker advised, "The fewer people you do, the better!" ”

"I'll communicate directly with the top of the intelligence department who have decision-making power!" The assistant official also understood the meaning of this, and after speaking, he closed the plan and stuffed it into his handbag, "Okay, then I'll say goodbye first!" ”

"I'll send you!" Sparky stood up, ready to see him off.

As soon as the two of them took two steps, they heard a loud "bang", and the door of the room was suddenly blown open, and then rushed into a large number of policemen, one by one, loaded with live ammunition, and when they came in, they fell down when they saw people, and the muzzle of the gun was against the door of the head, "All hands on their heads, leave all electronic devices!" ”

Then a high commissioner came in, followed by a figure similar to an expert, and after coming in, he went directly to the front of the computer, and after a while, nodded and said, "Found it"

The commissioner then waved his hand, "Take them all away, close the team!" ”

The police dragged up the people who had fallen on the ground, handcuffed them, and prepared to take them away.

The assistant official was furious and shouted, "What are you going to do, I'm a cyber officer in the White House,

Which department are you from! As he spoke, he wanted to go and pick up his documents in his pocket.

With a "click", the muzzles of several police officers were pressed against him, making it impossible for him to take out his papers.

The commissioner looked back at the assistant officer coldly, slowly pulled out his credentials from his pocket, and looked at them

Look, he said, "I'm sorry, White House cyber officer, you have to go back with us now."

Examine! You can hire a lawyer, though! "It's over, the commissioner turns around and leaves," in this room

Everything, take it all, not a single head can be left! ”

In the middle of the night, an explosive news broke out in the United States, Google headquarters

The hackers ransacked Google's codebase, but fortunately, Google's security experts cooperated with the police and locked down the hacker's location within two hours, and the police immediately caught the hacker on the spot.

Half an hour later, another media got a message from Google, which has confirmed that the hacker who attacked was the hacker Conley.

Numerous media outlets immediately flocked to the police station where the hackers were caught, wanting more information.

A piece of inside information was disclosed:

Some media said that according to the news of Google Security, Google Security is currently under investigation

Since the network intrusion incident of the Chinese pharmaceutical company, they have preliminarily determined that the hacker who invaded the pharmaceutical company is Conley, and Conley's invasion of Google at this time is likely to be related to this business.

Subsequently, the police reported that they had found a network intrusion plan against Zhongguo Jinlong Pharmaceutical at the scene of the hacker's arrest.

But none of this information has been confirmed by Google or the police.

Later, even more shocking news came out, some media said that the cyber intrusion plan against Jinlong Pharmaceutical was found from a White House cyber official, who was at the scene of the crime.

Later, some people said that one of the people arrested by the police from the scene of the crime

The man appears to be Cybersecurity guru Spark.

The media in the United States collectively convulsed, a level hacker, a White House network official, and the world's level hunter Spark, was taken down by the police at the same time, and it was taken down in the name of hacking into Google's headquarters.

We all know that there must be something big here.

The media are like being beaten with chicken blood, and they will pounce on the smell of fish, moving all channels and informants to dig deeper insiders.

Five hours after the case, the police in the United States urgently held a press briefing, declaring the incident to be a misunderstanding, that the police had received erroneous clues and malicious reports, and that the people arrested in the previous operation had been released.

At the same time, Google also issued official information, saying that Google's headquarters had never been hacked

The intrusion, even if it had, Google did not suffer anything.

The media was discouraged and discouraged, and someone was working on it

An even more striking fact: even if the police's actions were a misunderstanding, then how could they catch Conley, a hacker who was supposed to be serving a prison sentence?

This has made the media excited again, yes, why did the hacker who is serving a prison sentence appear outside the prison, and he is also mixed with the White House cyber official and the hunter Spark, it can't be a realistic version of the prison break, right?

Some media speculated that the White House hired hackers who are serving prison sentences to do things for the government!

When the police held a press conference, they were in a hurry and didn't think about this, and now they were caught by the media, and they were dumbfounded when they were questioned, and they didn't know how this hacker, who was supposed to be in prison, could have been caught by himself.

When Hu Xianfei got up early the next morning, he saw these lively news, and he had it

I'm a little puzzled.,No.,My program was only put in yesterday afternoon.,Why did it explode last night?,It's too fast!

This is also a complaint that Hu Yifei can't figure it out, but it really happened that things came to that point, yesterday

When it was about to leave work, the security department of Dongyang Google reported to the security experts at the headquarters

The progress of the investigation of the industry. And after they finished the video conference, the security expert followed

Google's Xi architects, Xi engineers, Xi technical officers, and Xi jumpers opened once

Regular meetings, including Google's executive officers, also participated in the video conference.

It is conceivable why at the beginning of the case, some people said that Google's codebase would be looted, Hu Yifei's program accessed Google's codebase almost under the highest authority, and even the code of Google's next-generation press engine was stolen by him.

Fortunately, Hu Yifei did not go to his computer.