Chapter 220: Virus Outbreak

When Peng Huading's serpentine was forcibly monopolized by the relevant state departments, mainly the military, he sent signals from the servers he set up on several broilers, and the group called Vampire sent viral fragments to these servers.

Peng Huading was naturally not polite, and immediately added something to these new virus fragments that others could not discover, and still let these virus fragments lurk in these servers.

However, Peng Huading also did some other things, that is, he hacked into the servers of the Vampire organization, hacked into the personal computers and mobile phones of the Vampire organization's members, and filmed all the text and video materials about their process of spreading the virus, and even found a very secret document from the U.S. government.

This document does not directly order the Vampire organization to spread the virus, but orders them to find a way to distract the attention of the leaders of various countries, divert the attention of the leaders of various countries from the surveillance incident some time ago, dilute the attention of world public opinion to the United States monitoring the leaders and enterprises of various countries, and let the United States escape from the moral vortex.

The Vampire organization's approach is very simple, that is, to spread viruses that can invade many computers, and then publish the internal information of many servers on the Internet, so as to show that even if there is no official organization in the United States to monitor the leaders and enterprises of various countries, their data is not safe, and it is also necessary to greatly increase the vigilance of network security.

In this way, the guilt of the United States has been alleviated in a certain way. U.S. cybersecurity companies are also receiving more additional orders because of this, and companies that detect viruses also receive a lot of revenue from the sale of antivirus software.

In order to avoid suspicion, Vampire deliberately left a handle for the spread of the virus this time, pointing the virus sown at Russia, and in the virus program, words such as "Ukraine", "Crimea", "Western control-cut" and other easily conjuring people appeared.

Virus clips were also distributed from servers in Ukraine, Lithuania and other countries, and there was no connection with the United States at all. In addition, Peng Huading also learned from the relevant documents obtained that the company that sells antivirus software in the future has also been quietly arranged by the US government to a third country.

Peng Huading wanted to know who this third country was, but he spent a lot of time and energy not being able to find out the exact location. Neither the Vampire server, nor the computers, mobile phones, or the companies and people associated with these people can find out the relevant information, let alone which company sells the antivirus software.

Apparently. The Vampire group was also deliberately kept in the dark by the government. Their task is to create a virus and spread it, point the source of the virus to Russia, and other things are beyond their control.

Peng Huading even thought about invading the relevant departments of the US government, but he did not know what the highest level of the US government was on computers. I don't know if the level of computers in the military and government far exceeds the level of computers on the market. is not more than the level of Vampire tissue. So he didn't dare to make a mistake, let alone startle the snake.

Anyway, now I can play a game of cat and mouse, and there is no need to alarm the US government. If you attract the top computer experts who can't be killed in seconds, and you know your clues, how can you have to pay for the loss? Let's wait until this virus crisis is over.

After doing this, he stepped out and began to write a drug detection and anti-virus program. In order not to let others see the flaws, Peng Huading spent a lot of time researching domestic anti-virus software, so that his programs have the style of these software. Of course, he was not stupid enough to let his software program kill it at once, he decided to classify these anti-virus software, and at the beginning only release programs that could find the virus and use a trap in the virus program to suppress the virus program for three to four days.

The second batch of upgraded anti-virus software is based on the anti-virus software of cyber security companies secretly designated by the U.S. government, and strives to match the capabilities of their anti-virus software.

It was not until the third batch of software upgrades came out that the virus could be completely killed, and the anti-virus software produced by other countries, including companies secretly designated in the United States, could not do this. The reason why they can't do this is because Peng Huading has added a little material to these viruses, adding a little bit of material that others don't know.

Even if a computer expert finally finds out that this virus program has been modified, it is difficult to think that Peng Huading did it, and it is difficult to see anything from the three batches of anti-virus software he compiled before and after.

More than ten days passed unconsciously, and Peng Huading finally waited for the Vampire organization to send the third and last fragment of the virus to the broiler chickens they controlled.

Peng Huading not only analyzed this as the last fragment from these programs, but also learned the time of the first batch of virus attacks: September 30!

After thinking about it, he still reported the relevant situation to Deng Guohong, reminding the relevant domestic departments to physically separate the particularly important servers from the public Internet network, but in order to avoid suspicion, all the servers could not be separated, leaving the relatively important servers to continue to connect with the public network, waiting for the outbreak of the virus.

In fact, the relevant state departments have even asked Peng Huading to kill these viruses in advance (if he can kill them), and strangle the conspiracy of the Vampire organization and the US government in the cradle, but unfortunately Peng Huading is unwilling to be such five heroes, claiming that he has not yet written software that can kill this virus, so he can only sit and watch the virus break out.

However, even a blind man knows that Peng Huading is not unable to kill the virus, but wants to take the opportunity to make a big profit, and he wants to take advantage of this opportunity to make a lot of money.

In fact, what they don't know is that Peng Huading also has a little Jiujiu of his own, that is, he collects another kind of achievement while waiting for the outbreak of this virus. After studying the characteristics of this virus, he found that in addition to destroying the invaded computers and servers, it also has a function of disclosing the data in the servers and computers to the public.

The reason why it has this function is obviously to show that the United States is spying on the behavior of leaders, government agencies, and enterprises of other countries, and it is not very strict to steal confidential materials from other countries, anyway, these viruses can also be, and if you don't strengthen network security, these materials will be exposed sooner or later.

The reason why Peng Huading wants these materials is also to cover himself, and to cover that when he produces jaw-dropping new products in the future, he can proudly say that he got the information from the Internet, from the Ministry of Defense and military research institutes of a certain country, and these materials have benefited from the outbreak of the virus.

On the morning of September 30, a virus called "Brilliant Sun" broke out on a large scale around the world, first affecting Japan and China, followed by South Asia. In just two hours, more than 5 million computers and more than 20 million mobile phones were affected by the virus.

The most severe influence is Japan, South Korea, China, and Singapore, which are the most technologically advanced, while other technologically underdeveloped countries have little impact.

Computers poisoned by the "brilliant sun" are either sent to other computers for no reason, or a lot of commonly used software is deleted, and data belonging to other computers is presented on this computer, and the entire network is extremely busy, and countless computers are using the maximum traffic to receive or send a few jù.

It can be said that there are no secrets in the computer, and even the encrypted number is shared by other computers.

The mobile phone poisoned by the "brilliant sun" is even more troublesome, the phone is automatically dialed out, and after being connected, a number of jù, videos, images, some private phone numbers and stored pictures have also become public information, so that many people are almost embarrassed, many couples turn their faces, and many families break out into war.

This is true for computers, mobile phones, and servers, and the information of many servers with confidential information has also been made public, such as maps of Japan's military bases, parameters of various advanced weapons, and the use of various military funds.

Similarly, the number of missiles in South Korea, the location of missile installation, the contact information of military leaders in important positions, and the formula and processing process of high-grade composite materials developed by a company that spent hundreds of millions of yuan can all be found online.

As for China's information, there are more, military, political, economic, scientific and technological, many, many, many FC-2 fighters, J-22 fighters, new aircraft carriers and other very confidential technical information has become a big road goods, they are actively transmitted to the computer of an Internet café, and are seen by a college student who is surfing the Internet, but it is considered that others are joking, laughing and deleting them, and playing his online game with peace of mind, but it didn't take a few minutes to find that this online game crashed, The computer he was using was in the process of formatting the hard drive......

When countless people were panicked or surprised, Peng Huading was laughing, because he had built a huge LAN in the past few days, and many servers were installed in it, and the capacity of each server was particularly huge, and many large-capacity hard disks were installed.

Thanks to the efforts of the military and relevant departments, this local area network has set up ten optical fiber entrances to the public Internet, and these entrances correspond to different servers, some of which are directly connected to the telecommunications network of the provincial capital, some are connected to the mobile network of the provincial capital of other provinces, and some are directly connected to the Unicom network of the capital......

Naturally, Peng Huading installed a special firewall on this local area network, which can prevent any virus from invading, and only accept useful information from coming in, especially the inflow of scientific and technological data from internationally renowned large enterprises.

It's like a black hole, soaking up useful information. (To be continued......)