Chapter 9 Who Is It?

"Don't move, I'm contacting the FBI, and I have to get the stolen information back." The white officer commanded angrily, then turned around and pulled out his cell phone and began to call.

"Hey, Emily, it's me, the lab was hacked just now, Dodge didn't take precautions, the other party copied all the top secret information in the database, help me find out who is attacking us, you know how important the information in the lab is, and it must not be leaked."

"Cohen, we're tracking him, it's not just your base, this guy has already attacked the servers of thirteen secret bases, and even the Thales guy didn't hold the line, and he was breached after ten minutes."

"Thales didn't hold on either? Where did this monster come from? Cohen, a white officer, looked incredulous.

Cohen's voice was not small, and the base personnel standing beside him all heard the news, and couldn't help but discuss in a whisper: "Thales also failed to hold it?" That guy just won the World Hacker Championship this year! Impossible. ”

Emily on the other end of the phone continued: "Although Thales didn't hold it, he planted a location virus in the copied files, and now we are using a supercomputer to track the other party's retreat route, maybe there will be news later, you wait for my call." ”

Hanging up Emily's phone, Cohen let out a long sigh, since even Thales couldn't hold it, it was obvious that the opponent of this attack was very strong, and there was no way to defend it by relying on the network security force of their base alone, so they could only rely on Emily and them.

At this time, the FBI was already in a mess, and the top hackers in all M were basically gathered here, staring closely at the data stream of the electronic screen, apparently cracking the retreating IP address of the attacking enemy.

"Bain, all IP addresses in Iran have been cleaned up, they are all springboard IPs, and there is no real address."

"Turkey's IP addresses are also a springboard, Bain."

"Iraq too..."

Bane didn't say a word with the headphones, his ten fingers tapped quickly on the computer, and all the summarized information was recorded on the electronic screen of the smaller one, and when all the subordinates finished reporting, Bane let out a long sigh, turned on the headset and said: "Thales, there is no real IP address in Central Asia, it is all a springboard." ”

At this time, Thales, who was sitting in the middle seat in front of the electronic screen, had a gloomy face, this attack made him lose face, in the face of the enemy's attack, he couldn't even defend for ten minutes, ten minutes was too short, the opponent attacked dozens of targets in an instant, and he didn't even give him the opportunity to call the supercomputer, he was crushed before he even came to his senses.

"These bastards..."

The attack came too quickly, and the opponent was very good at camouflage, the first attack was just enough to get their attention, but it was deliberately intercepted by the hidden firewall, and Thales thought in the first five minutes of the attack that it was just some blind little guy ready to find a sense of existence.

After all, the whole United States has to suffer so many hacker attacks every day, and it is impossible for Thales to do every attack himself, until the deputy is instantly breached, he reacts that the other party has hidden his strength, but time is too late.

Thales ten fingers on the keyboard quickly tapped, the supercomputing center this time mobilized more than 70% of the computing power to cooperate with him, if necessary, he can even mobilize multiple supercomputers to cooperate with him, as long as he can intercept the stolen top-secret data back, there are too many shady things in those data, even if only 1KB is lost, it will set off huge waves in international public opinion.

"Do you think you can get rid of me this way? You dark bastards. Thales looked at the electronic data stream on the screen and muttered to himself in disgruntment.

The other party obviously does not have supercomputer support, but their methods are very clever, controlling a huge number of enterprise-level servers around the world, and at the same time launching attacks on a large number of secret military bases in country M, stealing top-secret information and going through multiple rounds of conversion, and finally transmitting the files through some subtle channels.

But Thales is a top hacker after all, when he realized that it was impossible to stop being breached, he instantly implanted a script he wrote himself in a sub-file of a top-secret document, the function of this script is very simple, that is, every time the file jumps, the IP address will be recorded, and at the same time, the IP address will be sent to Thales' personal mailbox through encrypted channels.

Looking at the IP addresses he kept receiving on his mailbox, Thales' brow became more and more condensed.

IP addresses are so scattered that they are scattered almost everywhere in the world, and even if it only takes 10 seconds to crack each address, it is a huge amount of work to crack them all.

"Hmph, don't underestimate the power of supercomputers." Thales dismantled the supercomputer computing power authority in his hand into dozens of sub-items, and everyone in the security center was responsible for cracking an area one by one, and as long as he found the script he implanted, then this IP address must be the final terminal.

Listening to the results reported by his colleagues in the Security Center, Thales removed all the IP addresses of all springboards, and finally left three IP addresses: the University of Tokyo, Ivy League University, and Waseda University.

“FUCK! These dwarves! Looking at the final IP address on the screen, Thales subconsciously cursed.

Everyone at the FBI's Cyber Security Center was silent when they saw the final IP address on the electronic screen.

After hesitating for a moment, Thales still stood up and walked to the corridor of the office, and dialed the phone of Admiral Jeans: "General, find out, it's RB." ”

"I confirmed that the final Trojan virus is also on their server, I have checked the data flow sent back by the Trojan virus, the data is normal, apparently they haven't deciphered our file encryption program yet, do you want to do it?"

"Okay, I see."

After talking on the phone with Admiral Engis, Thales returned to the office with a gloomy face, looked at the eyes of his colleagues around him, and couldn't help but shout indignantly: "Let's make a memory of these dwarves!" ”

...

Inside the Cheung Chau Hotel, Mr. Lee's computer screen is still flickering.

"Drop, traversal complete, smart program strength test, test conditions equipped, start testing."

"Dr, the intelligent program has been copied to the University of Tokyo, Ivy League University, and Waseda University, and the defense level of the intelligent program has begun, the University of Tokyo has configured the general application scenario with a defense level of 0.03, Waseda University has configured the enterprise-level application scenario with a defense level of 0.03008, and the Ivy League University has configured the military-level application scenario with a defense level of 0.31."

"Drop, the source of the attack is detected, the intelligent core gives up control, and the intelligent program starts to run automatically."

...

In the Cyber Security Center of Country M, Thales launched an attack on RB's University of Tokyo, Ivy League University, and Waseda University at the same time, and he didn't even hide his IP address, and directly used a supercomputer to scare him.

As a world-class university, the University of Tokyo itself has extensive and in-depth cooperation with the government and enterprises, and the university's servers store a lot of confidential documents, and the servers themselves are also very strong in terms of defense.

But these servers were facing supercomputers, and it took Thales only three minutes to take the servers of the University of Tokyo, two and a half minutes to take the servers of Waseda University, four minutes to take the Ivy League universities, and in less than ten minutes, the servers of the three RB universities were all exposed to Thales's sight.

"Strange, how can it be so easy?" Thales watched the computer screen with great vigilance, carefully probing the contents of the three servers.

"None? Top secret files not on the server? ”

Even after checking all the files in the server dozens of times, Thales still didn't find the stolen documents, and even made him wonder if someone had tricked him, and it wasn't RB behind it.

"Do you want to withdraw, boss?" One of his subordinates cautiously asked Thales.

Thales looked at the computer screen and pondered for a few seconds, then clicked on the IP address received in his mailbox, and after confirming that the IP address was correct, Thales stretched out his hands and began to type on the keyboard, and he actually began to retrieve his own script in the server.

"Sure enough, these dwarves did it!" Thales shouted angrily.

At the same time, the department immediately surrounded him, and when he saw Thales's screen, he couldn't help but curse angrily.

Thales' script uses assembly language, very close to the machine language of a computer system, and Thales searches the entire server and finally finds a special text in a hidden folder.

Obviously, after the top-secret file was stolen, RB deeply encrypted the file for the sake of insurance, resulting in the location of the file not being found even if Thales retrieved it, but because his script used assembly language, even after the encryption of the code line, it still did not change much, relying on the powerful computing power of the supercomputer, it was finally found in the huge data stream.

Looking at this particular package, Thales used a supercomputer to try to decrypt it, but even with the help of a supercomputer, Thales was unable to change the file into a format that could be called.

"See if there are any identical text segments on the servers of the other two universities." Thales tried several times to no avail, and then said to the deputy next to him.

"Yes, two encrypted packages, too."

"Merge the three packages together and see if you can decipher them, and you send me the other two." Thales commanded.

Waiting for the deputy to send the file package, Thales continued to try to decrypt the file, waited for two minutes but still did not move, and turned his head to find that the deputy was tapping the keyboard with ten fingers rapidly.

"Thales, I can't send the file out, they're here again, and they've already snatched back access to the University of Tokyo's server."

Instead of being frustrated, Thales became excited, he had been crushed by them before, and now he had a supercomputer in his hand, just to get back the face he had just lost.

"You go look at the other two servers, I'll take care of this."

Thales invoked the computing power of the supercomputer and began to compete with this unknown opponent for the right to the servers of the University of Tokyo.

"The defense capability has been improved so much?"

Thales exclaimed while attacking, seeing that the opponent's computing power level was obviously not using a supercomputer, although the opponent was losing and retreating, it still failed to give Thales much advantage.

Thales, who continued to attack without success, was obviously a little annoyed, and directly increased the computing power of the supercomputer to 80%, and under the powerful data flow, the server of the University of Tokyo was finally unable to resist, and Thales once again held the highest authority of the server in his hands.

Carefully moving the compressed files back to China and erasing all traces on the server, Thales set his sights on the other two universities again.

Using the same powerful computing power of a supercomputer, Thales took full control of the other two universities and transferred the encrypted files back to China again, and finally confirmed that nothing was missing.

What is under him is decryption and restoration.,Fortunately, he cleverly inserted a positioning Trojan into the project at that time.,If you really let those dwarves get the files away silently.,The network security forces of the entire M country will become a laughing stock.。 However, while rejoicing, Thales couldn't help but marvel at the strength of the opponent's defense, without using a supercomputer, he could defend against a supercomputer for so long, and when attacking the server of Waseda University, he could still be crushed by only 100% of the computing power of a supercomputer, but when attacking the server of Ivy League University, it was necessary to add nearly 75% of the computing power of a second supercomputer to break through.

This means that the opponent can only rely on enterprise-level servers to attack a supercomputer on his own, which is a terrifying strength.

Of course, there are also reasons for their own eagerness to recover the stolen top-secret information, only a supercomputer can actually brute-force the opponent's defenses, but it will undoubtedly take a lot longer, which is unacceptable to Thales, and the loss of these materials will increase the risk of being deciphered for every second.

took out his mobile phone and dialed Admiral Jeans's number, Thales sorted out his emotions a little, and opened his mouth to report: "General, all the documents have been recovered, and just now the supercomputer has deciphered the encryption program and confirmed that it is the stolen documents from several bases." ”

"Yes, I've erased all traces of it, but when using a supercomputer, I didn't hide my IP address, do you need us to fight back?"

"Okay, I understand, I'll check the traces left over again, and I won't give them a second chance."

Hanging up Admiral Jeans' phone, Thales let out a long sigh of relief, and then continued to manipulate the supercomputer to begin to clean up the traces left on the Ivy League server, he now controls the supreme authority of the school's server, and can even control the server hardware to self-destruct, but the general does not intend to let him retaliate, perhaps out of political considerations.

"Huh?"

As Thales was cleaning up the traces, he noticed a brief system record.

"It's... What programs are running when the system program is cleared? Time is just the time to break the server and get permissions? ”

"Bain, can you check if this program is running on the other two university servers? Is the time in the moment when the server's privileges are breached? Thales immediately said to his colleague as he manipulated the supercomputer and began to browse through the underlying code running on the Ivy League server.

"This program only ran once, apparently the computer deleted some program before, this program was enabled as a subsystem, but I didn't find the deleted record in the server's records, could it be that the other party cleared the traces?"

Thales continued to look at the underlying code, and the more he looked, the more he was shocked, the entire server did not have any software deletion records of the underlying code, but the running records of this program did exist.

The computer will not lie, the only explanation is that the other party is too strong, and all traces have been removed, and even the other party is not using the Ivy League server to attack at all, and the Ivy League server is still just a springboard.

Thinking of this, a terrifying chill rose in Thales's whole body.

"Thales, there is also this record on the other two servers, and both servers are executed at the moment they are breached." Bane's voice sounded in Thales' headphones, further confirming Thales's guess, who could actually manipulate the server to fight against the supercomputer?

Thales retrieved all the access records of the Ivy League University in a whole day, and the access data of the Ivy League University was tens of millions of pieces every day, and he could only mobilize the supercomputer to access them one by one and obtain the real IP address to traverse.

Suddenly, a stream of pale blue particles suddenly appeared on the computer screen connected to the supercomputer, and the entire computer instantly went black and restarted, and everyone in the office lost their connection to the supercomputer.

After a dozen seconds, the computer rebooted and the link to the supercomputer was restored, and Thales went crazy and searched for the IP address on the Ivy League server again, only to find that all records had been emptied.

"The supercomputing center said that the Thor had just been attacked, and it was not known which supercomputer it was attacked." Emily's voice rang out, breaking the brief silence in the office.

The only thing that can attack a supercomputer is not detected is a supercomputer, but all supercomputers in the world are famous, and it is impossible for an unknown supercomputer to attack them.

Unless, this supercomputer has just been put into use...

Who is it?