Chapter 1059: Lying Down Again
After asking for instructions, Lieutenant Colonel Miller immediately informed Loma, and Loma's security director, Tuba, immediately responded by telling Lt. Colonel Sù Miller that they knew that their system was under attack.
At the same time, he also confidently replied to Lieutenant Colonel Miller, the other party obviously could not break through the protective wall of Loma Company, which was at least S-class, etc., and with the lesson of the last time, Loma Company immediately updated all the original network security systems.
And the more complex text Jiàn digital information encryption technology has been reset.
For example, the sensitive data storage method, because some confidential information was previously protected by ordinary symmetric algorithm encryption methods, such as 3DES or even DES-56, and after this round of updates, all of them use AES-256 or even AES-512 high-digit advanced encryption techniques to protect the text.
For those hackers who want to try to break it with brute force, it is completely possible to zero them down with such encryption technology.
For some confidential information transmission with relatively small capacity, they also use more advanced asymmetric encryption algorithms, such as updating the original traditional RSA-1024-bit encryption algorithm, which is difficult to crack, to 210 or even 384, and then combining with more advanced digital signature verification technology to improve the security of information transmission to the extreme.
For civil hackers, their tools for committing crimes are computers with more advanced performance plus some cracking software, and the computing power of computers is at most hundreds of millions of times per second. And with these latest encryption technologies, those computers want to use brute force methods. Basically, you have to wait for a few lifetimes.
Moreover, even professional hackers equipped with computers with high-speed computing power to carry out attacks on the Loma system have set an overflow limit, and if the number of requests from the other party is significantly abnormal and exceeds the upper limit, the system will start to lock automatically, and even change the key or activate the network barrier to cut the network by itself.
So for Loma. After a lesson, it can be regarded as a wisdom, and in terms of the updated security level, even if you start it yourself, it may not be a problem.
After receiving feedback from the Loma Information Security Center, Lieutenant Colonel Miller felt still uneasy, and also asked the Loma Information Security Center to open up the authority for them to assist.
But it was quickly rejected.
"Lieutenant Colonel, obviously. We're 100% sure that if you're too idle, maybe you can look up the source address of the scum and give them some color to see, we're actually digging a hole waiting for them to come. Tubba, chief security officer at the Loma Center for Information Security, replied.
Open permission to u? They're not brain-dead, unless they've discovered a massive network intrusion and the system is about to crash. This will be done as a last resort.
At the moment, this wave of attacks is nothing to Loma, because there are even boring things in these attacks that are not good enough to simply attack with a few jù packets.
This whole looks more like a prank, of course. He also found that there were quite a few attacks trying to do cracking attacks, of course. There is no threat at the moment.
Lieutenant Colonel Miller had long expected that his proposal would be rejected, but he did not get angry, indeed as the other party's security officer said, although the current attack, although it seems to be menacing, but the other party's impact is obviously not powerful.
However, if Loma Company does not open up the permission to him, all he can do is to watch from the sidelines, stare dryly, and track these IPs? He is not a fool, these IPs must be virtual, more of the so-called broilers, it is useless for him to follow, if you really want to find out the identity of the other party, you must fully understand the other party's attack methods, IP address sources, and traces of attack, so that you can have a chance to fight back.
However, after observing for about ten minutes, it was found that Loma's defense line was still impregnable, and Lieutenant Colonel Miller was happy to relax, and after leaving the contact information for the other party, he turned on the computer on the side, thinking about how to make this report tomorrow.
The other party's attack was obviously improvised, and they did not plant a Trojan horse in advance to obtain some of the encryption private keys of Loma Company, so what they were able to do was to constantly try to break the various obstacles set up by Loma Company, and such an attack was actually a bit like a boot itch, and it would not lead to anything.
But as soon as he sat down, the phone rang.
Tubba, Loma's head of cybersecurity, shouted on the phone, "Oh my God, I can't believe it, I bet one of them must have used a computer with at least over 100 billion computing power... This is no ordinary hacker. ”
"What's going on? So is it dangerous? Lieutenant Colonel Miller tensed and stood up.
"That's not true, we're tracking down a few key suspect IPs." "The other party is falling into our trap and trying to brute-force a cryptographic document that we deliberately put there as bait, and based on the feedback, we estimate that the other party's capacity is about 100 billion times per second. ”
"Hundreds of billions?" Lieutenant Colonel Miller frowned slightly, "So your guys are tracking this guy?" ”
"Yes, not only this person, but also a few IPs with substantial threats, as for the others, there is no threat at all, and I can bet that this guy's methods are very similar to the hacker who attacked Loma last time... Okay, see how I catch him..."
The last time it was too embarrassing, the entire Loma defense system was attacked, and the most confidential information was easily stolen by others, fortunately, the CIA, NSA, and FBI did not find any valuable clues later, and failed to bring the other party, a super hacker, to justice.
In other words, the other party's ability is beyond his ability to resist.
Because of this, his boss did not put all the blame on him because of this, but trusted him and let him continue to be the director of this cybersecurity center.
The first thing Tuba did when he learned his lesson was to immediately refresh the company's security system, and set up a lot of small traps. Used to catch traces of attackers, he believes. Since the other party has done one vote, it is not surprising that there is a second time.
I didn't expect that what I was afraid of would really come, and I was lying down again.
"Hundreds of billions of times, IMHO, such a computer may have been a supercomputer in the past, but now, even an ordinary computer can reach three or four hundred million operations per second. It's some old-fashioned supercomputer, I think, it's more likely from North Korea or Iran," Lieutenant Colonel Miller reasoned.
But soon, it was denied by Tubbal: "Oh no, it looks more like our ally, well." Let me see, most of the IPs reported now are from the Netherlands, Ireland, Morocco, the Bahamas, Switzerland, and this suspected 100 billion computing power is very likely from our dear ally, the Eagle State... What's going on? I guess you can help me look it up. ”
Tubal reported a portion of the IP address to Lieutenant Colonel Miller.
"Hell," Lieutenant Colonel Miller shouted.
"Lieutenant Colonel?" Tubal's voice was a little displeased, in fact he was now enjoying his supper.
"Fool, damn it, these addresses were attacked just an hour or less than half an hour ago...", Lieutenant Colonel Miller flew into a rage. They have now become the other party's puppet machines, and the other party is using these puppet machines to feign attacks, Mr. Tuba, I recommend that you quickly take the highest level of prevention... IMHO, cut off all outreach. Unplugging the power supply is the best option. ”
"Are you kidding Lieutenant Colonel, although it's late. However, there are still many colleagues in many departments who are doing some testing work, and if the power is cut off urgently, they will be able to do everything they do. ”
"Hell, you'd better listen to me..."Lieutenant Colonel Miller ignored the tutu and turned his head and yelled, "Emergency alert, full monitoring of Loma Corporation, they are under attack at the highest level, these bitches are so bold, we have to do something..."
You must know that the Cyber Operations Command of the United States and the boss of the NSA National Security Agency are the same person, as long as they catch each other, they don't believe that they can't kill each other.
villa
Zhang Yang stared at the computer calmly, and now he and Xu Danying were rolling at least tens of thousands of broiler chickens, and the flames of war had all burned to Loma Company.
Of course, the war in other parts of the world has just begun, and hackers from various countries are constantly being involved, and more and more, but of course, hackers in almost every country are passively involved, so the attacks are aimless, some attack domestic targets and some attack foreign targets.
So it looks like a world war, but in fact, the thunder is loud and the rain is small, and it is like a hodgepodge.
And Zhang Yang and Xu Danying's purpose is different, their goal is very simple, that is, Loma, the division of labor between the two is not the same, Xu Danying is responsible for tens of thousands of broilers and blindly bombards Loma with a number of jù streams in a simple and crude way.
Zhang Yang, on the other hand, is coerced by the puppet machines of those international middlemen, and uses the IP addresses simulated by the Phantom system to purposefully crack and destroy Loma's network firewall.
To put it simply, Xu Danying's attack is purely a flirtatious type, simply bombarded with a number of jù streams, the purpose is to paralyze the other party's network, for Loma Company, it is annoying but not regarded as the most dangerous.
And Zhang Yang's attack method is different, he is constantly trying to use intelligent cracking methods to break through the opponent's firewall, and then intends to steal the secrets inside.
This kind of behavior is the most extreme malicious attack, and Loma is naturally the most vigilant against this kind of behavior.
But of course, they don't really care about their cyber security skills.
Therefore, more time is spent tracking and locating these hundreds of IP addresses simulated and hijacked by the Phantom system.
"Brother-in-law, there are not many meat machines I hold hostage, the new meat machine rate is not as good as the loss rate, the other party is constantly filtering and screening, it seems that the other party is investing more and more manpower... At the current rate, there are at most thirty... Oh no, maybe it only takes twenty minutes for them to track my IP, how's it going on your side? Xu Danying's willow eyebrows frowned slightly, and said with some concern.