Chapter 1061: Loma's Counterattack
Loma, also known as the "Skunk Factory", occupies 1/3 of the annual procurement budget of the Ministry of National Defense of the United States, controls 40% of the world's defense market, and almost covers the production and launch of all military satellites in the United States, and is absolutely a unique arms giant in the world.
The only two fifth-generation fighters in service in the world, the F-22 and F-35, are from this company.
But don't think that Loma is just an arms dealer, the USCC Cyber Operations Command, Microsoft and Loma are actually strategic partners.
Loma writes even more software code and programs than Microsoft, and 20,000 of its more than 100,000 employees work in IT.
In other words, when they stomp their feet, even Microsoft is afraid, oh no, the whole world is afraid.
And now their company's server has been hacked, and the network security system has been made like this, and more importantly, this is not the first time, for Tuba, this is tantamount to a hard hit on the left side of his face, and then a while on his right side also slammed into it.
I can't bear it.
Of course, the most important thing now is how to keep your position without ensuring that the company's cybersecurity system will not go wrong.
The network security system has been replaced by a backup system for the time being, and no military secrets have been leaked, and there will be no problem in a short time, so the more important thing is to track down where the stolen code has gone now, as long as it is retrieved and killed those who are raised, then he will be safe.
Through this cyber attack, he also verified that the network security system itself should be fine.
However, the other party was able to steal their employee accounts, and then stole various passwords and verification information in a strange way, and successfully entered the company, and finally forcibly copied part of the code of the network security system by brute force.
In fact, this is no longer a problem with his network security system, because there are too many opportunities for Loma's employee accounts to be obtained.
The other party got the account of an ordinary IT engineer, and it was stationed overseas, in the Eagle Country**AE company, Loma and **AE company have a deep cooperative relationship, **AE is the world's third largest defense company, second only to Loma and Boeing.
I'm afraid you have to ask the engineer how the other party got the account, after all, the other party is a system compatibility test engineer, wandering around, and there may be traces left at any time.
The key is that the engineer's account only has a certain amount of browsing permissions, so this time someone stole his account, then obtained the password, and then logged in, and then forcibly bypassed the security gateway, rushed directly into the network security system, and then began to copy things indiscriminately, which is equivalent to internal employees sabotage.
In this way, the problem arises, he calculated, although the account is not high-level, but there are strict restrictions on logging in overseas, and it must go through a lot of identity verification, such as a long password, followed by a random password sent to his mobile phone by the company, and then he has to insert the digital signature of the identification card issued to him by the company.
This digital signature is a string of ciphers composed of a mixture of ECC210 encryption algorithm and AES symmetric encryption algorithm, and theoretically to brute-force crack this digital signature, even if it is a computing rate of more than 10 billion times per second, it will take several lifetimes.
However, in a short period of time, the other party directly cracked the password, got the verification code, and the digital signature information code also deceived the system.
Tuba immediately suspected that there was a ghost in his company, especially the engineer who was the most suspicious.
Because of such a short period of time, it is clear that hackers cannot crack so many things at once.
But of course, when he retrieved the engineer's information, he ruled out this suspicion.
Because the engineer is currently returning to the United States for vacation, he is in Russia, and the account login address traced down is in the Eagle Country.
Tuba's guess is that the engineer was working in the Eagle Country when someone stole the account and password, as for the random password, the other party has a way to get the account password then obtain his mobile phone information, and it is not impossible to intercept it through the Guò telecommunications company.
In the end, the company's digitally signed information card is written in symmetrical encrypted information, which is almost impossible to crack with a tool, and it is more likely that the engineer was stolen while working.
The three conditions add up to a conclusion that this is a conspiracy that has been planned for a long time.
The other side is likely to have planned it a long time ago, including the last attack, which is obviously a series of them.
Tuba didn't think much of it, and immediately contacted his boss, and it seemed that this matter was no longer something he could handle now.
When his superiors learned about it, they immediately contacted the military, and then the CIA and NSA immediately intervened.
Tuba did not hesitate, and immediately sent the information behind the IP addresses and IP addresses he obtained to the CIA and NSA, and the network security engineers of Loma Company were not covered, they were highly skilled IT masters, and in the process of reversing the IP address of the other party, they had found out the identity of the other party.
The people of the CIA and NSA can definitely figure out some clues, if not stupid enough.
Of course, he also hinted to his boss, the CIA, and the NSA that the hacker this time was the same person as the hacker who hacked into Loma last time, so if the target is caught, all the other party's electronic equipment needs to be confiscated at the same time and handed over to Loma for investigation.
Anyway, only they know the code, but people who are not afraid of the CIA or NSA know.
It should be said that the CIA people are still very efficient, of course, or Loma's influence is too great, after receiving the news, although it was already more than four o'clock in the morning at this time, the CIA and NSA and F**i still poured out, and at the same time, the CIA's intelligence officers stationed in the location of the IP address that was exposed also acted immediately.
In particular, the list of companies specifically pointed out by Tuba has been given special care.
Of course, the CIA and NSA are not stupid, and before they act, they must be investigated.
The full name of the NSA is the ** Bureau of the United States, which is responsible for monitoring secret communications including radio broadcasting, communications, the Internet, especially military and diplomatic, and is subordinate to the Pentagon, and even holds more funds than the CIA, that is, the CIA, and the top boss of the USCC Cyber Operations Command is also the head of the NSA.
So their cyber intelligence acquisition capabilities are absolutely the best in the world, the USCC was already tracking when the hacker attacked, and the NSA was also monitoring, but the USCC had not yet reported to the NSA, and now the NSA in turn asked the USCC to assist in investigating those IP addresses.
The problem is that after Lieutenant Colonel Miller on duty received the order from his boss, he still didn't have much clue, and the information he obtained was similar to Tuba, but he was different from Tuba, although he also found out that companies such as NRD owned these IP addresses, but his intuition told him that there was a black hand behind the scenes.
He spent a lot of effort, but what made people wonder was that no trace was found, so he thought, if there is still a mastermind behind it, there is no doubt that the opponent is very terrifying, so terrifying that even USCC and NSA can't do it.
The USCC has no way, then I am afraid that no one in the world will have a way, because he is completely confident that the USCC's cybersecurity experts are definitely the strongest in the world, and there is no one.
So the hacker who can make the world's best professionals even have a rut... He couldn't imagine it, could it be an alien? Anyway, it must be a genius among geniuses.
Of course, he does not deny that such a genius exists.
Therefore, when he reported to his boss, he gave advice to investigate clearly before acting, because it is too early to act now, and it is easy to startle the snake.
But now the NSA has asked him for assistance in turn, and there is sarcasm in his tone, to the effect that Loma has already found out, and your USCC, as the Cyber Command, has not reacted at all.
Although the heads of USCC and NSA are the same, both are Pentagon people, but there are too many intelligence systems in the United States, although USCC is not an intelligence system, but there are some business crossovers with NSA, and there is still competition between the two.
In fact, in this hacker attack, if you want to say a slap in the face, the NSA, which is responsible for monitoring the network, should be hit the most, because this should be within the scope of NSA supervision.
But right now, the NSA itself is facing a super trouble.
At the beginning of the month, the Eagle Country [Guardian] and the United States [Washington Post] published the former CIA employee Edward ** to them what broke the news, and the "Prism Project" of the NSA Mi Guo ** Bureau was exposed.
The NSA apparently didn't have much energy to deal with this impromptu burst of hacking.
USCC, of course, doesn't want to take this kind of thankless song.,But there's no way.,NSA is the big brother.,Although USCC and NSA are at the same level.,And it's the same head.,But it's normal to cooperate with NSA's requirements.。
To put it bluntly, it's actually quite simple, the NSA needs to do everything possible to solve this big case to justify the NSA's surveillance program and reduce the negative impact caused by the prism gate.
In the words of Lieutenant Colonel Miller's boss, the NSA was unusually enthusiastic about the case at this time.
So several major intelligence services, as well as the USCC, reached a common agreement almost simultaneously.
USCC immediately classified hundreds of IP addresses, and then invaded intensively and began to investigate the black history of these companies...
The N.S.A. investigates the companies' emails, call logs, and more.
The CIA and F**I are responsible for monitoring the main leaders of the highlighted companies, such as NRD and POX, and are ready to arrest people at any time, and the communication records and network information of these companies are also closely monitored.
At 11 a.m. London time, in Tokton City, Yorkshire, NRD's senior management is urgently dealing with the incident of the company's website being hacked and tampering with the homepage, downloading a large amount of information.
If the company is facing a big enemy, the security guards block the entrance of the company and prohibit anyone from entering.
At twelve o'clock, a black bulletproof van drove into the gate of the company, tossed for about half an hour, and at half past twelve, the black bulletproof van slowly drove out of the company gate.
The bald Smith breathed a sigh of relief, because the car contained some confidential documents of the company and the company's previous ulterior numbers, and even the server was transferred.
If the police come to the door, they can only stare dryly.
Mei Ning, the villa, Zhang Yang, who had been fighting for hours, was eating dinner at this moment, but his eyes were still fixed on the computer screen, which was transmitting real-time footage from the surveillance cameras at the entrance of several companies he was focusing on.
"Sure enough, it's time to act..."Zhang Yang stared at the black bulletproof van that drove out of the door of the NRD company, the corners of his mouth were slightly raised, revealing a faint smile, and then we had to see how strong the world's most powerful national intelligence agency was. (To be continued.) )