Chapter 60: Hacking (Part II)

After the hacker attack decreased, Zhou Yu and Zhang Yunqiang led the backbone team to the Yanjing data center together to cooperate with the data center's network security experts to defend the server.

Zhou Yu encouraged the cybersecurity team: "We have determined that the other party does not have a supercomputer by analyzing the other party's attack methods.

If you want to conquer a supercomputer with a laptop, this will only happen if the king hits the bronze, and the gap between us and hackers is not so big.

Your task now is to teach hackers a lesson and let them know that we are not easy to mess with.

Let future hackers hide when they see our company, otherwise they will stick to us like kraft candy, and it will also involve our energy. ”

"Everyone understands what Mr. Zhou means, I will lead you to block hackers together, and our team will work more efficiently.

Artificial intelligence Xiaomi can also develop corresponding tools to help us according to the real-time situation of the online battlefield, and the final victory will definitely belong to us. Zhang Yunqiang said confidently.

The security experts of the data center issue instructions according to the situation, and Xiaomi constantly mobilizes the supercomputer to perform corresponding actions or write programs.

While Zhang Yunqiang manages the security team, he also reports on the situation on the cyber battlefield like Zhou Yu.

"There were two hackers attacking us, their skills were much higher than mine, they should be internationally famous hackers, one hacker was mainly responsible for defense, and the other hacker was mainly responsible for attacking."

"We've dragged down the hacker in charge of the attack and are tracking down his IP address."

"It's not good, the server is experiencing an increase in attacks, it's not a regular broiler attack, there are thousands of hackers trying to attack our server, and the number is still growing."

At this time, Xiaomi also informed: [Searching for dark web information, someone offered a reward of $500 million for our company's artificial intelligence source code. 】

Zhou Yu's expression was dazed, and he said in his heart: "Sure enough, they are not afraid of hackers, Xiaomi and Pangu-1 supercomputer can stop them, but this $500 million reward, some employees of the company will definitely be tempted."

Fortunately, he is not sure of people's hearts, and he never tries to test people's hearts, the source code of artificial intelligence is only known to him and Xiaomi, and Xiaomi itself is artificial intelligence and will never leak secrets. ”

Zhang Yunqiang smiled bitterly: "I didn't expect the source code of artificial intelligence to be so valuable, 500 million US dollars is a huge amount, enough to make all hackers rush to it."

Mr. Zhou, I applied for the data center to activate the Level A defense plan, suspend all artificial intelligence services, and concentrate all resources to survive this wave of fierce attacks. ”

Zhou Yu nodded and agreed: "In this situation, we can only try to ensure the security of our data, and I agree to start the Class A defense plan."

"Xiaomi, the data center has launched a Level A defense solution to push messages to all smart devices, 'Due to a large number of hacker attacks, in order to protect the security of your data, Xinghuo Technology has temporarily stopped network services for you and has stored your ongoing processes'."

Xiaomi: [To enable the super permission function, please verify the permission.] 】

Zhou Yu verified the biological data of the iris and the human electromagnetic field through the Xingling bracelet.

Xiaomi: [Verification passed, the data center Grade A defense plan is being activated.] 】

Take over all computing resources and use them to write programs to deal with invasions.] 】

A gathering place for dark web hackers.

"More than 3,600 hackers have attacked Xinghuo Technology, but the Xinghuo Technology server has not moved at all, artificial intelligence is really so advanced."

"It is worthy of being a company that can get a bounty of 500 million, and just by virtue of its ability to survive the attacks of most hackers in the world, it is enough to say the strength of Star Fire Technology."

[Holy Bear]: "I conquered the intranet of the Ministry of Science and Technology of Huaxia and found an interesting information, how could we, the stragglers, conquer Spark Technology."

He immediately released the stolen data, which showed the performance of the Pangu-1 supercomputer and the number of supercomputers in each of Xinghuo Technology's data centers.

"Damn, how can we fight against so many supercomputers with laptops, and the computing resources are not in the same order of magnitude, no wonder Xinghuo Technology has defeated us."

[Dark Snake]: "Baga, so many of us have been blocked by the company Xinghuo Technology, even Google can't stop our attack, this is really embarrassing, you are too wasteful, here is the moment of my performance."

"Idol, the second ranked Dark Snake God on the Hacker Supreme List."

"The Dark Snake God is the best at attacking from the side roads, taking the power network, creating fires, and releasing lethal network viruses, doing everything."

Xinghuo Technology Data Center.

Xiaomi: [Alert, found that the attacker was attacking through the wire editing weak current signal, has intercepted, suspects that the other party has invaded the national grid system, and is alert to the power supply. 】

Zhou Yu immediately ordered: "Contact the State Grid immediately, their system has been attacked, and ask if they need technical support."

Engineers are ready for emergency backup power and must ensure the safety of data. ”

Xiaomi: [Through the traces of the network, the broiler who has been caught by the hacker has been captured, and his IP address is being searched.] 】

In Seoul, South Korea, a balding middle-aged man with glasses saw the information displayed on the computer that his broiler was about to be attacked.

"Force me to zoom in on Smecta."

Put your right index finger on the enter key and press it down heavily.

"Alarm, Yanjing data center lost power supply, activated emergency power supply to maintain the operation of the storage matrix, supercomputer minimum power standby, is using the Shanghai data center and Bayu data center to resist."

"We have received feedback from the State Grid that the system was cracked, resulting in damage to the transformer in the Daxing District Hi-Tech Park, and they have activated the backup emergency system, and it will take five minutes for the repair team to restore the power supply."

Xiaomi: [Discover the entry of supercomputers, through network packet analysis, supercomputers are located in New York and Tokyo. 】

Zhang Yunqiang said anxiously: "The number of hackers has reached 13,000, the number of broilers has reached 500,000, and supercomputers have joined.

With only the remaining supercomputers, we have already reached a 30% risk of being compromised, and hackers have begun to attack government and major company websites, national grid systems, telecommunications network systems.

When the national grid was breached, it immediately disconnected the network interface with the outside world, and they now have no problem, and companies such as Pinduoduo and Weibo can no longer provide services. ”

Zhou Yu's eyes became sharp, and he made up his mind: "We can't let these hackers run rampant and release the smart virus broom star."

Zhang Yunqiang said unwillingly: "Mr. Zhou, the broom star is too powerful, and the impact of releasing it is not good, wait for the Yanjing data center to restore the power supply, give me a while, and we will definitely be able to determine their identity."

"We can afford to wait, others can't afford to wait, and when hackers break into the national grid system, the losses will be terrible." Zhou Yu waved his hand.

"Xiaomi, release the smart virus broom star." Zhou Yu issued an order.

Xiaomi: [Releasing a smart virus broom star.] 】

A gathering place for dark web hackers.

"It's a feast for the hacker community, how long has it been since we've been acting together."

"It's not good, why are there fewer and fewer people attacking Xinghuo Technology."

"Oh my God, there's a stream of data tracking me, I'm poisoned on my computer, I'm done."

[Dark Snake] "How is this possible, someone actually broke into the firewall of my laptop, oh my God, why are there so many sick ......"

Zhang Yunqiang saw that the hackers who attacked the server disappeared one after another, and he sighed: "The broom star is worthy of being a smart virus, and its actions on the network will inevitably leave traces, and it can track all data flows."

Whether it's a disguised broiler or a real hacker, attack all devices without distinction.

Broom Star can automatically analyze software and hardware vulnerabilities, and now there is no means to protect it.

It corrupts all the data of the hard drive in an instant through software vulnerabilities and generates junk data to interfere with the data recovery of the hard drive.

If someone prevents the broom star from executing this program, it will directly start generating all kinds of viruses to attack the device, and hundreds of new computer viruses can be generated in a second.

The CPU and hard disk are directly scrapped through hardware viruses, and the data in the hard disk is also sent out.

No matter how skilled a hacker is, the computer will not be able to play a role. ”

Zhou Yu Zhizhu said: "Killed by the broom star in seconds, that's just a small fish and a small shrimp, and the hacker who can temporarily block the invasion of the broom star is a big fish."

Xiaomi, sort out the data transmitted back by the broom star, and publish the information of those well-known hackers.

Exposing all these people who wander in the black zone to the sun, I want to make hackers palpitate when they hear the name Spark Technology in the future. ”