Chapter 938 - Crypto Virus
"The current situation, for us, is definitely the worst, these data and information are the lifeblood of our company, if we lose it, we are finished."
"Not only that, but if these materials are stolen by hackers and used to do something bad, then we are also jointly and severally liable."
"Yes, even if the data is retrieved now, if the news of our data leakage is spread, the users we have accumulated with great difficulty will probably leave us immediately."
“……”
There are a lot of problems that travelers face.
Although there are many companies that have linked accommodation and the Internet in recent years, there are very few companies that carry out the model of homestays.
This means:
While they have more potential, it also means that the problems they have to face will be multiplied.
Especially now.
The system was paralyzed and the host computer was hijacked, which was definitely a fatal blow to the entire passenger company.
"I've taught myself a little bit about network information security before, so why don't you let me see if I can solve it?" Understand the situation clearly, and prepare for action as soon as possible.
After all.
Although this company is still very small, it is also its own company in the end, and it is impossible to watch its industry being wantonly destroyed.
But.
As soon as Gu Xiu's words came out, the others couldn't help but shake their heads:
"You?"
"I'm afraid this won't work, this time the virus is very powerful, several of us have already done it, but there is no way to solve it."
"This virus is very powerful, I don't know what mode it uses, but this virus can invade the computer at the first time, all PDFs and wo in the computer's hard disk
D, excel, ppt, compressed package and other types of files are encrypted, and there is no way to solve it now. ”
"The CPU usage of the computer has reached 100%, and it is all this ransomware virus."
"This is not something that amateurs can solve, just now someone organized a lot of people with experience in this field to try to break the virus, and as a result, the files in the computer were directly deleted and cannot be recovered."
“……”
Although Gu Xiu's genius is now well known to many people at Stanford, in the final analysis, he is still just a child after all, and perhaps he has given many people some whimsical ideas more than once.
But in terms of the professional field, most people don't want to believe how powerful Gu Xiu's child can be.
After all.
He was only ten years old, and he had already come to Stanford to study, which is outrageous in itself, and even at the age of ten, he was able to give advice and act as a consultant to many companies in the Stanford Pioneer Park, which is even more outrageous.
If you say now, maybe this kid is better than others in some professional field?
Is this possible?
I'm afraid that any normal person will shake his head at the first time and veto this possibility.
How old is he?
Ten years old, eleven years old.
At this age, even the most talented child can't do everything......
Bar???
Originally, such an idea could have been firm.
But such firmness.
Until everyone saw that Gu Xiu was already sitting in front of a computer that had been hijacked, and tapped the mouse casually.
Window.
When you switch to a system port full of code......
"This ...... Will he really? ”
"Gu, aren't you kidding, you really even know how to hack skills?"
"This seems to be the code interface of a computer system, can you see a virus in this?"
“……”
Everyone asked one after another.
Although I still don't know what Gu Xiu's skills are, at least people can easily make this interface on this computer that even ordinary people have no way to operate.
There is one thing to say.
It's still able to bluff people.
At least it proves that Gu Xiu really understands a little, which is very remarkable for most ordinary people.
For the questions of the people around him.
Gu Xiu didn't answer, at this time he was carefully examining the series of dense program codes in front of him, but in a few moments, he found the location where the virus was hiding.
But.
Instead of rushing to clean up the virus file, he began to study the code of the virus file.
Someone leaned forward to take a look, but quickly withdrew their gaze.
No way.
I don't understand.
The code in this is like a series of garbled code, even if he is a professional programmer, but in the face of the code that specializes in overcoming network services, he still feels confused.
I don't understand it at all.
However, seeing Gu Xiu's look with relish, the programmer couldn't help but ask:
"How's it going, do you see anything?"
"This is an encryption virus, with a special way of encryption, after the virus enters the computer, the automatic driver, this virus will encrypt all the files in the hard drive, only get the key to unlock." Gu Xiu replied.
As soon as these words came out, one of the people next to him nodded again and again:
"That's right, that's it, all our files are encrypted, and there are TXT files in the folder of each file, by the way, you see this, there are also files on the desktop."
As he spoke, he pointed to the TXT document on the desktop, and when he opened it, he could see that there were a few lines written in it.
"Important information!"
"All your files have been encrypted by us, and only the private locks and decryption programs on our confidential servers can decrypt your files."
"If you would like to accept your personal gold lock, please click on the link below."
“……”
This is followed by several websites, as well as detailed tutorials on how to unlock them.
There is one thing to say.
This thing is quite intimate, and even the computer novice knows exactly how to pay the ransom.
It's just that the asking price is a bit outrageous.
50,000 meters of knife!
For a start-up, this is not a small amount of money, it can be regarded as a direct stuck in the throat, although it is not so much that a company can't afford to smash the pot and sell iron.
But here's the problem.
For these start-ups, smashing the pot and selling iron may only be enough to pay the ransom, and it is basically impossible to continue to maintain the company's operation.
In this case, of course, no one will pay the ransom.
More.
I still hope to find another way to solve it.
Since the files are encrypted, there is obviously only one best way.
That's the code.
But......
Obviously, such a thing is not so easy to solve.