typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

The first thousand and fifty-ninth chapters lie down again

After asking for instructions, Lieutenant Colonel Miller immediately notified Lockheed Martin, and Lockheed Martin's security director Tuba immediately gave feedback. They told Lieutenant Colonel Miller that they knew for the first time that their system was under attack.

At the same time, he also confidently replied to Lieutenant Colonel Miller that the other party was obviously unable to break through Lockheed Martin's at least S-level protective wall. Based on the lessons learned last time, Lockheed Martin immediately updated all its original network security systems.

And reset the more complex file digital information encryption technology.

For example, sensitive data information storage methods, because some confidential information were previously protected by ordinary symmetric algorithm encryption methods, such as 3des or even des-56, which are outdated methods, but after this round of updates, all

All use aes-256 or even aes-512 high-digit advanced encryption to protect files.

For those hackers who want to try to use brute force to crack, using this encryption technology, they can be completely blocked.

For the transmission of some confidential information with relatively small capacity, they also use more advanced asymmetric encryption algorithm encryption methods, such as updating the original traditional rsa-1024-bit encryption algorithm that is difficult to crack to ecc210 (

Equivalent to rsa-2048) or even ecc384, and then combined with more advanced digital signature verification technology to improve the security of information transmission to the extreme.

For civilian hackers, their crime-killing tools are relatively advanced computers plus some cracking software. The computer's computing power is at most a few hundred million operations per second. Using these latest encryption technologies,

If those computers want to use brute force cracking, they basically have to wait several lifetimes.

Moreover, even if professional hackers are equipped with computers with high-speed computing capabilities, if they want to attack the Lockheed Martin system, they have set an overflow upper limit. If the other party's data request is significantly abnormal and exceeds the upper limit,

, the system will also start to automatically lock, or even change the key or start the network isolation wall to cut the network by itself.

Therefore, for Lockheed Martin, after a lesson, it can be regarded as a lesson learned. With the updated safety level, even if the USCC personally takes action, it may not be the same.

After receiving feedback from the Lockheed Martin Information Security Center, Lieutenant Colonel Miller still felt uneasy and asked the Lockheed Martin Information Security Center to open up their authority for their assistance.

But it was quickly rejected.

"Lieutenant Colonel, obviously, we are 100% sure. If you are really too free, maybe you can find the source address of those scum and then give them some color to see. In fact, we are digging it.

Wait for them to come over." Tuba, chief security officer of Lockheed Martin Information Security Center, replied.

Open permissions to uscc? They are not stupid. Unless they discover a large-scale network intrusion and the system is about to collapse, they will do this as a last resort.

The current wave of attacks is simply insignificant to Lockheed Martin, because these attacks even include boring things that simply use data packets to attack.

This whole thing looked more like a prank. Of course, he also found that there were many attacks trying to crack the attack. Of course, there was no threat at the moment.

Lieutenant Colonel Miller had long expected that his suggestion would be rejected, but he did not get angry. Indeed, as the other party's security officer said, although the current attack seemed menacing, the other party's impact was obviously not

What power.

But if Lockheed Martin doesn't give him access, all he can do is watch, stare, and track these IPs? He's not a fool. These IPs must be virtual, and more of them are so-called broilers.

, it’s useless for him to follow. If you really want to find out the other party’s identity, you must fully understand the other party’s attack methods, IP address source, and traces of the attack, so that you can have a chance to fight back.

However, after observing for about ten minutes, he found that Lockheed Martin's defense line was still impregnable. Lieutenant Colonel Miller was happy to relax. After leaving his contact information with the other party, he turned on the computer and thought about how to make this report tomorrow.

The other party's attack was obviously impromptu, and they did not plant a Trojan horse in advance to obtain some of Lockheed Martin's encryption private keys, so what they can do is to constantly try to break through the various obstacles set up by Lockheed Martin, and such an attack is actually a bit like a quarry.

There will be no results if you itch your boots.

But just as he sat down, the phone rang.

Tuba, Lockheed Martin's cybersecurity director, screamed on the phone: "Oh my god, I can't believe it. I bet one of them must be using a computer with at least a hundred billion operations... This is not ordinary."

hacker."

"What's going on? Is there danger then?" Lieutenant Colonel Miller tensed up and stood up.

"That's not true. We are tracking several key suspected IP addresses." Tuba replied, "The other party is falling into our trap and trying to use brute force to crack an encryption technology file that we deliberately placed there as a bait. According to the data

Judging from the feedback, we estimate that the other party’s ability is about 100 billion calculations per second.”

"One hundred billion times?" Lieutenant Colonel Miller frowned slightly, "So your people are tracking this person?"

"Yes, not only this person, but also several IPs that pose real threats. As for the others, they don't pose any threat at all. And I can bet that this guy's methods are very similar to the hacker who attacked Lockheed Martin last time...

Okay, let's see how I catch him..."

It was so embarrassing last time. The entire Lockheed Martin defense system was hacked into and the most confidential information was easily stolen. Fortunately, neither the CIA nor the NSA nor the FBI found any valuable clues.

, failed to bring the super hacker to justice.

In other words, the opponent's ability is beyond his ability to resist.

It is precisely because of this that his boss did not put all the responsibilities on him, but trusted him and allowed him to continue to serve as the director of the network security center.

Having learned his lesson, the first thing Tuba did was to immediately update all the company's security systems, and also set up many small traps to catch the attacker's traces. He believed that since the other party had done something before

, it is not surprising that there is a second time.

I didn't expect that whatever I was afraid of would come true, and I would be lying on my back again.

"One hundred billion times, with all due respect, such a computer may have been considered a supercomputer in the past, but now, even an ordinary computer can reach three to four billion operations per second. This should be some outdated

I think the old supercomputer is more likely to come from Japan or Iran..." Lieutenant Colonel Miller reasoned.

But he was quickly denied by Tuba: "Oh, no, it looks more like our allies, well, let me see, most of the IPs reported now are from the Netherlands, Ireland, Morocco, Bahamas, Switzerland,

And this person who is suspected to have hundreds of billions of computing power is extremely likely to come from our dear ally Eagle Country... What is going on? I think you can help me check it out."

Tubal reported part of his IP address to Lieutenant Colonel Miller.

"What the hell..." Lieutenant Colonel Miller yelled after hearing this.

"Lieutenant Colonel?" Tubal's voice was a little unhappy. In fact, he was enjoying his late night snack.

"You were fooled. Damn it. These addresses were attacked just an hour or less than half an hour ago..." Lieutenant Colonel Miller was furious. "They have now become the opponent's puppet machine, and the opponent is using these puppets."

The machine is pretending to be attacking, Mr. Tuba, I suggest you take the highest level of precautions as soon as possible... With all due respect, cutting off all external connections and unplugging the power supply is the best option."

"Are you kidding me, Lieutenant Colonel? Although it's very late now, there are still colleagues in many departments doing some testing work. An emergency power outage will make everything they do fail."

"Hell, you'd better listen to me..." Lieutenant Colonel Miller ignored the advice and turned around and shouted, "Emergency alert, fully monitor Lockheed Martin. They are under the highest level of attack. These bastards,

How bold, we must do something..."

You must know that the bosses of the USCC US Cyber ​​Operations Command and the NSA US National Security Agency are the same person. As long as they catch each other, I don't believe they can kill each other.

villa

Zhang Yang stared at the computer calmly. At the moment, he and Xu Danying were rolling at least tens of thousands of broilers, and the flames of war were all igniting towards Lockheed Martin.

Of course, the war in other parts of the world has just started, and hackers from various countries are constantly being involved, and more and more are involved. But of course, hackers from almost every country are passively involved, so the attacks are random.

Purpose: some attack domestic targets and some attack foreign targets.

So it looks like a world war, but in fact, it's like a hodgepodge of thunder and light rain.

However, Zhang Yang and Xu Danying had different goals. Their goal was very simple, which was Lockheed Martin. Their division of labor was different. Xu Danying was responsible for tens of thousands of broilers and blindly bombarded Lockheed Martin with data streams in a simple and crude way.

Zhang Yang, on the other hand, coerced the puppet machines of international middlemen and used IP addresses simulated by the Shadow System to purposefully crack and destroy Lockheed Martin's network firewall.

To put it simply, Xu Danying's attack was purely teasing, simply bombarding with data streams, with the purpose of paralyzing the other party's network. For Lockheed Martin, it was annoying but not considered the most dangerous.

But Zhang Yang's attack method is different. He constantly tries to use intelligent cracking methods to break through the other party's firewall, and then intends to steal the secrets inside.

This kind of behavior is the most extreme malicious attack, and Lockheed Martin is naturally the most wary of Zhang Yang's behavior.

But of course, they believe that their network security level is impregnable and they don’t care much about it.

So more time is spent tracking and locating the hundreds of IP addresses that Zhang Yang has simulated and hijacked by the Shadow System.

"Brother-in-law, I don't have many meat machines hijacked anymore. The speed of new meat machines can't match the loss rate. The other party is constantly filtering and screening. It seems that the other party is investing more and more manpower... At this current speed, it is impossible to win.

There are still thirty more... Oh, no, it may only take twenty minutes for them to track my IP. How is the situation at your end?" Xu Danying frowned slightly and said with some worry. (To be continued.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next