Chapter 1058: The Great Scuffle
"Huaxia Kingdom?" Becker and the others looked sideways, this damn Indian was still a little useful, "Hurry up and dig him out for me!" I guessed... Damn the Chinese... Stealing all over the world. ”
But before he could finish speaking, Gupeta shouted again.
"Oh... No, no... I found another IP, no, this IP is from Southampton, hey, this is from Duisburg, hell, I can't understand it... Damn, this is from Detroit..."Gupeta was dumbfounded, "Is this the whole world coming to besiege us?" ”
"But trust me, Mr. Smith, I have a way to get them." Gupeta stared at the computer screen, sweating profusely, crackling as she typed out string after string of instructions, "Yes, I'm confident... Yes... This..."
Gupeta stared at the computer screen when she suddenly petrified, her fingers frozen on the keyboard and unable to move.
"Oh Maiga, Mr. Gupeta... Can you be reliable? Becker was dumbfounded when he saw it, because at this time, in addition to the words of the bounty, the background picture of the company's homepage has also been changed, and it has been changed to a high-definition AV actress background picture.
This picture is simply too high-definition, and the straight line of the pink ears is presented in everyone's eyes, and almost even the pores can be seen.
"Tsk, I bet this woman can score eights..."Gupeta said subconsciously.
"Hell, when has this been." Becker was furious, and his eyes couldn't help but glance a few times, "At most, it's seven points... Oops, I said damn it. Can't you stop the other person yet? Aren't you a genius? ”
Gupeta was silent, as if she had been slapped in the face. Shrugging his head, after trying for a while, he suddenly jumped up: "Oh hell, he forcibly started our server, what is this bastard doing?" It can't be, hell, hell... He counted jù before downloading us. Oh my God... Unplug the network cable..."
Gupeta shouted as she hurriedly reached out and ripped off the network cable.
Becker was dumbfounded, his face became more and more ugly, but he surprisingly did not scold Gupeta again, but stared at the technical director, and said coldly: "Svensson, I don't care what method you use. You have to find me the one that is enough for my mother. ”
After saying that, he hurriedly walked out, then took out the phone and quickly dialed a number.
rang for a long time, and the other party finally picked it up, and it was obvious that the other party's good dream was shattered by him. The tone was impatient.
"Becker, you'd better give me a suitable reason..."
"Mr. Spencon, I have bad news." Becker pursed his lips and spoke hesitantly.
"Huh?"
"Our company's server has been compromised, and a large number of jù have been lost..."Becker reached out and wiped a cold sweat. But don't worry, there's no code for us. Those things make no sense. ”
In the villa, Zhang Yang stretched out his hand and subconsciously grabbed the cup beside him, and then tilted his head, only to find that the boiling water in the cup had been drunk.
He didn't bother to pour any more water, and as soon as he put the cup down, his ten fingers crackling on the mechanical keyboard, and strings of command characters flashed on the screen.
At the same time, he also has a pair of headsets hanging on his head, and the headsets are connected to another computer, which has the Penguin on it, and is connected to Xu Danying.
"Brother-in-law, another company with an A2-level security firewall..."Xu Danying frowned slightly, and said, "Well, ENC Technology Company, specializing in the sale of chemical raw materials..."
"As usual, break it, download the data, get the IP address, and report it to me..."Zhang Yang replied immediately without thinking.
"Okay!" Xu Danying's pretty face was with a hint of excitement, "The virtual IP is ready, the link is successful... Scan Ports... The password is cracked, and the other party's IP address is, located in the xxx area... Number jù downloading... Brother-in-law, they turned off the power, but the number of jù has been transferred by my mirror. ”
"Okay, put it in the shadow system to share the cloud disk." Zhang Yang entered the IP address reported by Xu Danying, and used the ghost system to virtualize the host of this IP address, and hung up a number of jù packets.
Their strategy is very simple, Yao Yun and the others led the group of hackers to indiscriminately attack the hundreds of suspected international intermediary websites that Xu Danlu and the others obtained, and tried to invade the other party's server to download the other party's information.
But soon, they found that there are many URLs on this side with very high security levels, and some are even above the military level, according to their network security level division standards, they belong to SABCD, 5 and other 11 levels of A1 or even A2 level of prevention.
Yao Yun and the others are more difficult to face the network security above A1, and they are also afraid of being tracked by the other party, so they all lose this kind of hard bones to Zhang Yang and Xu Danying.
Zhang Yang and Xu Danying used the ghost system to quickly crack and ravage, forcing the text to download until the other party had to turn off the power, they obtained the other party's IP address, and used the ghost system to virtualize the other party's host and occupy each other's network resources.
In just over two hours, Zhang Yang and Xu Danying have hunted down the servers of at least 14 companies with network security levels above A1.
Although their level of protection is already so high, it is a pity that they are completely scum in front of the supercomputer with tens of billions of computing power in the Phantom system.
Soon, more than 400 websites, under the capture of a huge hacker group led by Yao Yun, fell to most of them in a short time, and the companies and servers behind these websites, most of which were in Western Europe, North America, and the Caribbean.
If they look closely, they will find it even clearer that most of these companies are located in the Netherlands, Delaware, Ireland, the Eagle Virgin Islands, Morocco, the Bahamas, Switzerland, the Garman Islands, the Eagle Country, and other countries and regions.
Zhang Yang arranged it for a while, and soon understood the mystery, these countries or regions are absolutely forced to be a haven for tax evasion and money laundering, and the financial industry is extremely developed.
It is no wonder that the headquarters of these international intermediaries set up these places to facilitate the collection of money. The second is to facilitate money laundering, and the third is to evade taxes. It's just not too cool.
The clock slowly slipped into 3 p.m., when the companies that were attacked were almost all up to work or officially operating, and soon most of the international middlemen reacted immediately, and they began to fight back against the hackers who broke into their company websites.
At the same time, some local hackers who did not know the truth also began to join in, those who were all soy sauce at the beginning, but they were just fishing in troubled waters, they just heard that a certain company in their country was attacked by foreign hackers. So they began to aimlessly attack the official government websites or company websites of the suspected countries.
And the governments of those countries that were suddenly attacked also reacted immediately, with cyber police dispatched, and some angry young people began to call on their own hackers to fight back.
For a while, the Internet in the whole world was chaotic, but the most bitter thing was the more than 400 companies that were selected, and now they are not only being attacked by people led by Yao Yun. Some soy sauce players who don't know the truth are also in the dark.
United States, Maryland, U headquarters, at one o'clock in the evening Eastern time, at this time most of the people in the United States are already asleep.
However, as the most powerful cyber operations center in the world, U is busy at the moment. Lieutenant Colonel Victor J. Miller, the officer on duty, led a group of the world's top computer network security experts, were staring at the storm of cyber hacking that was taking place right under their noses.
The United States has also been attacked, but for now, it is okay, only a few fund companies in Delaware and some strange-looking investment companies or leather bag companies selling dog meat on the head of sheep have been hacked.
The current situation is not worth interfering with, but for security reasons. They were still watching vigilantly to prevent the other party's attack from escalating.
Of course. Now it looks like it has escalated, and the current situation of the Western European Union friendly countries, especially those small ones, is in shambles.
One small country even began to cry out for help.
Based on the results of the monitoring, Lieutenant Colonel Miller quickly judged that many of the attacks came from Huaxia, and they had long been accustomed to this, which was not a big deal, because such an attack was ostensibly a hacking act, but in the eyes of you, it was purely pediatric.
At most, these are civilian hackers, and the real Huaxia country's military hacker masters don't seem to have taken action.
So at most, he added fuel and vinegar to the next day's report and added another charge of Huaxia's attack on the United States network.
However, they soon received a report that some officers on duty noticed that many IPs from Western European allies were trying to attack some military contractors in the United States.
"These guys, the tiger beard dares to touch..."Victor was a little puzzled, it stands to reason that hackers from ally countries should not attack the United States, are they hot-headed, of course, it is not excluded that some fanatical indignant youths dare to do anything in order to show their excellent hacking skills.
"Lieutenant Colonel Miller, their targets are starting to concentrate...", while Victor was still wondering, a net warrior officer on duty suddenly exclaimed in a low voice.
"Find out the target immediately... Hey, damn it, call Lieutenant William and Corporal Jones to me, it's time to get to work. Victor was startled and hurried behind the non-commissioned officer.
"Loma, their target is Loma again." Victor's face became extremely ugly, these girls... It's Loma again, why use the word again.
Because a few months ago, Loma company has just been hacked, and according to credible intelligence, the design data of the F-22 has been leaked, although the NSA and CIA and U have spent a lot of manpower and material resources to track down, but so far, they have only found one in Australia and one in the chrysanthemum country of two suspected IP addresses, and what is even more odious is that the CIA went to investigate on the spot and found that these two IP addresses are serious local companies, extremely dedicated, without any background.
Obviously, they became broilers, and what is even more terrifying is that the other party erased all traces and left no traces at all.
Okay, damn it, I'm in trouble with Loma again, do you dare to rob your house from Loma?
Of course, he can't let the other party run away this time, and those little cubs may not know that in order to prevent further attacks, Loma has used more sophisticated encryption technology, and has also set up a lot of traps waiting for people to drill.
ps: Thank you for the tips from the brothers below
[**hgjx] giant [Demon Sealing Crazy Knife] giant giant
[茈玍呮為伱] giant giant [ruffian 000000] giant giant
[Beauty is a curse] giant [Kira-ZSC] giant giant
[Crow afraid of heights] giant giant [Tokyo's big Ivan] giant giant
【yangbin69】Juju【Xiongnu】Juju
Thank you for the following brothers' monthly passes, if you are left behind, please forgive me
[Cruise A] Juju [Z666] Juju
[Yimu Feiwen] huge