Chapter 319: Zombie Puppet

readx;

The trading of the stock market is becoming more and more automated, and professional exchanges and large institutions have spent a lot of time and energy studying this kind of procedure, in order to avoid the interference of human emotions on trading, as well as to monitor market fluctuations in a timely manner, and be able to buy or sell at the first time when there is an abnormality. Pen @ fun @ pavilion wWw. biqUgE怂 ļ½‰ļ½Žļ½†ļ½

There are a number of specialized companies in the world that study automated trading programs, and they preach the benefits of automated trading programs, which are rational and accurate, and monitor them at all times.

However, this time, they did not expect that because of a "wrong" operation, the automated trading robots were also deceived, and they all participated in this operation, and the entire market was affected as a result.

Tuttle was fired for this, and he caused immeasurable damage to Citibank, which he could not afford to pay for personally. However, fortunately, Citibank has a lot of money and has made a lot of profits in this change, and under neutralization, the loss is relatively acceptable.

Tuttle became a "finger of God" and left the industry with such a very disgraceful ending, which was a big blow to him.

He has repeatedly insisted that he will not make such a mistake, and the exchange itself has a mechanism to prevent it, after all, such mistakes have occurred before, although the amount is not large, after all, it will also cause losses. As a result, early warning measures are implanted in the trading program, and in case of anomalies, there is usually a second confirmation. When it comes to placing such a large amount of orders, there should have been an early warning message, but Tuttle didn't see it at all.

The letters "m" and "b", although they are very close to each other, is unlikely to have been entered by an experienced Tattle, who has never entered the word "billion" in his career.

Despite his repeated explanations and the fact that the investigators were a little surprised, the final findings showed that there was nothing out of the ordinary, and only such an explanation was plausible.

Moreover, they have conducted a detailed investigation into Tuttle's own account and the changes in the accounts of his relatives, and if it were not found that they were profit-making as a result, Tuttle might have to suffer a lawsuit.

It's not that no one believes Cartel's words, at least Cartel's wife and a few of his close friends believe him, and they all know who he is.

Lin Hong also believed in Cartel, not because he believed in Carter's character, but because he found something unusual in Carter's trading computer.

Through the super worm, Lin Hong learned that there is a very small worm program hidden in the cartel's trading computer, and its function is very, very simple, that is, to replace the data m in memory with b

Moreover, this worm is based on the IRC protocol, that is, it can accept instructions from the IRC server and thus complete the corresponding actions.

It's like a faithful sentinel, controllable. It will only produce action when it receives a command, and in normal times, it is just a piece of information fragmentation, hidden in a sea of information fragments, without any abnormality at all.

"Finally appeared!"

Lin Hong saw a familiar shadow from this worm, back then, his super worm inadvertently killed another worm named Tree, which became a lifesaver for NASA's space physics analysis network.

And now, on this little worm, Lin Hong saw the shadow of the tree worm.

Although this worm has changed greatly, it has not escaped Lin Hong's eyes, he specially captured the sample of this worm for analysis, it is obvious that many of its structures are similar to the previous worm, and it is very likely that it is from the same person.

The answer is imminent, this "oolong finger" incident is not an accident at all, nor is it the poor trader's operational error.

In order to find this mysterious hacker organization, Lin Hong spent a lot of effort, he gave a lot of filters to the super worm, but still did not collect any suspicious information. And this time, they finally showed their feet.

Before, it was like looking for a needle in a haystack, and whether or not you could meet it was completely dependent on luck, but this time with a specific goal, it is much easier.

Lin Hong began to transform the super worm to form a new variant, which was specially attached to their worm, closely monitoring the information flow of this NREE worm variant, and then followed the vine to find their base camp.

Of course, this process is not an easy task.

Hacking technology has developed to this stage, especially after Lin Hong opened up the source code of Bit Messenger, and network hackers have made great progress in hiding their whereabouts.

If the technology is a little worse, he doesn't care about this step at all, and directly relies on the bit messenger and acts as an agent, which is very safe and the probability of exposure is very small.

The more skilled ones absorb the anonymity principle of the bit messenger for their own use, and develop corresponding software to hide their whereabouts.

If the user happens to be a security expert or a network hacker, he is likely to monitor the data in and out of his client, and once the data happens to be exported to his client, he can directly intercept the decrypted information.

If there is only one client, this probability is indeed very small, but it does not rule out that people with ulterior motives run many clients to monitor this data.

Highly skilled people tend to be arrogant, and if they can make something like this themselves, they will rarely use someone else's software.

Therefore, when they know the specific principle, they usually do it themselves, and they firmly believe in the concept of "do it yourself, have enough food and clothing".

In the past few years, there have been many ways to hide their whereabouts, but the most basic principle is still similar to that of Bit Messenger, which is to jump through data and confuse it, so as to avoid being backtracked by others.

At present, in addition to the general-purpose proxy jump technology such as bit messenger, another commonly used technology is a technology called "bot network".

Literally, it is a "bot network", but those hackers in China have given it another more figurative name "botnet". Because infected computers can usually be remotely controlled by hackers, just like zombies controlled by humans.

The basic principle is to turn the client into a broiler, without the permission of the owner, secretly running its own Trojan horse or worm program on the other party's computer, so that the conquered computer or server becomes a zombie computer.

With the development of the Internet, more and more people began to feel the charm of the Internet and began to become its users, after all, technical personnel are only a small part of them, one hundred users, there may be only one person who understands some technology and can really be proficient, may be one percent of them.

Users who don't know the basics of technology don't know if they've fallen for a worm or a Trojan. They infected their computers for a variety of reasons and became part of the botnet.

Owning such a botnet is not difficult for technocrats, and sometimes it doesn't even involve any technical aspects to spread it, just a little bit of social engineering is all it takes. For example, pretending to be someone else to send an email to his friends, attaching these worm programs, and tricking them into executing them.

And with such a botnet black hat hacker, or hacker, a lot can be accomplished.

Jumping around as an agent and hiding your whereabouts is just one of the small applications.

The tree worm variant discovered by Lin Hong uses such a botnet for communication.

This botnet is very large, all over the world has been connected to the network, and the hiding is very good and basically does not stand on the resources of the system, it can be seen that this network is very sound, and the user has a long-term intention to use it.

He closely monitored the worm, only to find that there had been no effective data flow for several days.

Lin Hong speculated that it was very likely that this time the game was suddenly a little big, and the other party estimated that he did not expect this situation, which directly caused the entire stock market to plummet. As a result, the worm began to enter a dormant period, and it is unknown whether it will be activated or not.

After a few days of monitoring, Lin Hong abandoned the plan and began to think of a way to find a way on the hidden botnet.

There is not much time left for him, he will return to China in a few days, the domestic network is not as good as here, and the Internet speed is not good, he wants to do this well before returning to China.

He spent a night improving the super worm for the opponent's botnet program, and wrote a worm that would specifically detect this kind of botnet program, and once it was found that such a bot program existed, it would lurk in the system and monitor its input and output information channels.

In this way, it is a bit similar to the boot zone virus, in addition to building an intermediate channel at the information channel, setting up a level, and specifically monitoring the information in it, but without affecting its normal operation.

This worm is named "Zombie Shadow" by him, and ordinary computers are not infected with this worm, only after being infected with the specified zombie program, it will lurk, which is equivalent to a shadow of a zombie worm.

These days, Lin Hong has basically spent time in Internet cafes, and Lin Hong's zombie shadow program has officially spread to the outside world, and in the past few days, some data has been revealed and transmitted back, but there is no particularly useful information, mainly some data exchange, although it involves some more confidential information, but it is not what Lin Hong wants to see.

This information is the result of botnets and other worms working automatically, and there is no contact with the hacker group for the time being.

It was August 28, Lin Hong had arrived at the airport, and two hours later, he was about to board the plane and fly back to China. By this time, the school had already begun to report, but he was still stranded in the United States, and his family had called several times to urge.

However, when Lin Hong was about to go through the security check, the PDA on his body suddenly "beeped" slightly, and Lin Hong took it out and looked at it, and his eyes suddenly froze.

He glanced at the slowly advancing line in front of him, hesitated for a moment, and suddenly walked out of the line and walked briskly towards the outside of the departure hall.