"China?" Becker and others all looked sideways. This damn Indian guy is still useful. "Hurry up and dig him out! I just guessed... damn Chinese people... are stealing things all over the world..."
But before he finished speaking, Gupeta shouted again.
"Oh...no, no...I found another IP. No, this IP is from Southampton. Hey, this is from Duisburg, Germany. Damn it, I can't understand...what the heck, this is from Detroit.
"..." Gupta was suddenly dumbfounded, "Is the whole world coming to besiege us?"
"But Mr. Smith, please believe me, I have a way to deal with them." Gupta stared at the computer screen, sweating profusely, and typed out a series of instructions, "Yes, I am very capable.
Confidence...ah...this..."
Gupta stared at the computer screen and suddenly became petrified. Her fingers were frozen on the keyboard and could not move.
"Oh, Mr. Gupta...can you be more reliable?" Becker was dumbfounded when he saw it, because at this moment, in addition to the reward sentence, the background image of the company's homepage had also been changed.
, changed to a high-definition fucking* background picture.
This picture is so high-definition that the pink ears are clearly visible in everyone's eyes, and even the pores can be seen.
"Tsk, tsk, I bet this woman can score eight points..." Gupta said subconsciously.
"Damn it, how long has it been?" Becker was furious and couldn't help but glance at him a few times. "It's only seven points at most... Oh, damn it, can't you stop the other party? Aren't you a genius?
?”
Gupta was silent, as if he had been slapped hard, and shook his head. After trying hard for a while, he suddenly jumped up: "Oh, hell, he forcibly started our server, this bastard is here
What? This is impossible, damn, damn...he is downloading our previous data, oh my god...the network cable...unplug the network cable..."
While shouting, Gupta hurriedly reached out and pulled off the network cable.
Becker was dumbfounded, and while his face became more and more ugly, he surprisingly did not scold Gupta again. Instead, he stared at the technical director and said coldly: "Swenson, I don't care what method you use, you must give it to me."
Find the one who's a bitch."
After saying that, he hurriedly walked out, then took out his phone and quickly dialed a number.
After ringing for a long time, the other party finally picked up. It was obvious that the other party's dream had been shattered by him, and his tone sounded very impatient.
"Becker, you'd better give me a suitable reason..."
"Mr. Spencer, I have some bad news." Becker pursed his lips and said hesitantly.
"Um?"
"Our company's server has been hacked, and a large amount of data has been lost..." Becker reached out and wiped his cold sweat, "But don't worry, without our code, those things are meaningless."
In the villa, Zhang Yang reached out and subconsciously grabbed the cup next to him. Then he looked up and found that the boiling water in the cup had been drained.
He didn't care to pour any more water. He put the cup down and tapped on the mechanical keyboard with his fingers, and strings of command characters flashed on the screen.
At the same time, there was a pair of headphones hanging on his head, which was connected to another computer. That computer was running Penguin and was connected to Xu Danying.
"Brother-in-law, another company that has installed an A2 level security firewall..." Xu Danying frowned slightly and said, "Well, Enc Technology Company specializes in the sales of chemical raw materials..."
"As usual, break it, download the data, get the IP address, and report it to me..." Zhang Yang replied immediately without thinking.
"Okay!" Xu Danying's pretty face showed a hint of excitement, "Virtual IP prepared, link successful...scan port...password cracked, successful entry, the other party's IP address is, located in the xxx area...data downloading...Brother-in-law, they turned off the power
, but the data has been transferred by my mirror."
"Okay, put it in the shared cloud disk of the shadow system." Zhang Yang entered the IP address reported by Xu Danying, and used the shadow system to virtualize the host with this IP address and attach the data package.
Their strategy is very simple. Yao Yun and others led a group of hackers to indiscriminately attack the hundreds of suspected international intermediary websites obtained by Xu Danlu and others, and tried to invade the other party's server to download the other party's information.
But soon, they discovered that there were many websites here with very high security levels, some even military-grade or above. According to their network security level classification standards, they were classified as s\a\**\c\d, 5, etc.
Level A1 or even Level A2 among the 11 levels of protection.
Yao Yun and the others found it difficult to deal with network security above A1 level, and they were also afraid of being counter-tracked by the other party, so they left all the tough problems to Zhang Yang and Xu Danying.
Zhang Yang and Xu Danying used the Shadow System to quickly crack and ravage, forcing the other party to download files until the other party had to turn off the power. Then they obtained the other party's IP address, and used the Shadow System to virtualize the other party's host and occupy the other party's network.
resource.
In just over two hours, Zhang Yang and Xu Danying had acquired servers from at least fourteen companies with A1 or above network security standards.
Although their protection level is already so high, it is a pity that in front of the supercomputer of the Shadow System and tens of billions of calculations, they are completely scum.
Soon, more than 400 websites were captured by a huge hacker organization led by Yao Yun, and most of them were destroyed in a short time. Most of the companies and servers behind these websites were located in Western Europe, North America, and the Caribbean.
After further careful analysis, they discovered more clearly that these companies are most widely distributed in the Netherlands, Delaware, Ireland, Eagle Virgin Islands, Morocco, Bahamas, Switzerland, Gaman Islands, Eagle Country, etc.
country region.
Zhang Yang arranged the list and quickly understood the secret. These countries or regions are absolutely paradises for tax evasion and money laundering, and their financial industry is extremely developed.
No wonder the headquarters of these international intermediaries are set up in these places. Firstly, it is convenient to collect money, secondly, it is convenient to launder money, and thirdly, it is possible to evade taxes. It is not too fun.
Time slowly slipped towards three o'clock in the afternoon. At this time, almost all the companies that were attacked had started working or officially operating. Soon, most of the international middlemen responded immediately, and they began to fight back and invade their companies.
URL hackers.
At the same time, some local hackers who did not know the truth also began to join in. Those who were just soy sauce at the beginning were just fishing in troubled waters. They just heard that a certain company in their country was attacked by foreign hackers, so they began to ramble on.
Unpurposefully attack the official government website or company website of the suspected country.
The political axes of those countries that were suddenly attacked responded immediately. Internet police were dispatched, and some angry youths began to call on their country's hackers to fight back.
For a time, the entire world's Internet was in chaos, but the most difficult thing was the more than 400 companies that were selected. Now they are not only being attacked by people led by Yao Yun, but also some soy sauce people who don't know the truth are also hacking.
USA, Maryland, USCC headquarters, at one o'clock at night Eastern Time, when most Americans are already asleep.
However, as the world's most powerful network operations center, USCC is busy at the moment. The officer on duty, Lieutenant Colonel Victor J. Miller, leads a group of the world's top computer network security experts and is watching what is happening before their eyes.
The storm of cyber hacker war below...
The U.S. mainland has also been attacked, but so far it is okay. In the U.S., only a few fund companies located in Delaware and some weird-looking investment companies or companies that are trying to sell people off are being hacked.
The current situation is not worthy of their intervention, but for safety reasons, they still keep a vigilant eye to prevent the opponent's attack from escalating.
Of course, it seems to have escalated now, and the current situation of Western European allies, especially those small countries, is in a mess.
One small country even started asking for help.
Based on the monitoring results, Lieutenant Colonel Miller quickly determined that many of the attacks this time came from China. They had long been accustomed to this. This was not a big deal, because such attacks were seemingly hacker behaviors.
, but in the eyes of USCC, it is purely pediatric.
These can be considered civilian hackers at best. The real military hacker masters of China do not seem to be taking any action.
So the most he could do was add one more crime against China for attacking the US network in the report the next day.
But they soon received a report from Victor that an officer on duty noticed that many IPs from Western European allies were trying to attack some American military contractors.
"These guys dare to stroke the tiger's beard..." Victor was a little confused. Logically speaking, hackers from allied countries should not attack the United States. Are they out of their minds? Of course, some fanatical angry youths are not excluded.
Dare to do anything to show your excellent hacking skills.
"Lieutenant Colonel Miller, their attack targets have begun to focus..." While Victor was still wondering, a cyberwarfare officer on duty suddenly exclaimed in a low voice.
"Find the target to be attacked immediately...Hey, damn it, wake up Ensign William and Corporal Jones, it's time to get to work." Victor was startled and hurriedly ran behind the noncommissioned officer.
"Lockheed...their target is Lockheed Martin again." Victor's face became extremely ugly. These guys...are Lockheed Martin again. Why do they use the word "you"?
Because Lockheed Martin was hacked just a few months ago, and according to credible intelligence, the design information of the F-22 was leaked. Although the NSA, CIA and USCC have spent a lot of manpower and material resources to trace it, so far they have only
Two suspected IP addresses were found, one located in Australia and one located in Chrysanthemum Country. What's even more disgusting is that CIA conducted an on-site investigation and found that these two IP addresses are serious local companies, extremely responsible, and without any background.
It was obvious that they had become a bastard, and what was even more terrifying was that the other party had erased all traces, leaving no trace at all.
Okay, damn, here comes the trouble with Lockheed Martin again. Do you dare Lockheed Martin to rob your home?
Of course, he couldn't let the other party run away this time. Those brats may not know that in order to prevent being attacked again, Loma used more complex encryption technology and set up many traps waiting for people.