typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 1061 Loma's counterattack

Lockheed Martin, also known as the "Skunk Works", occupies 1/3 of the annual procurement budget of the United States Department of Defense, controls 40% of the world's defense market, and almost takes over the production and launch business of all military satellites in the United States. It is absolutely

The world's unique arms giant.

The only two fifth-generation fighter jets currently in service in the world, the F-22 and F-35, are both produced by this company.

But don’t think that Lockheed Martin is just an arms dealer. The USCC Cyber ​​Combat Command, Microsoft and Lockheed Martin are actually strategic partners.

Lockheed Martin has written even more software codes and programs than Microsoft, and 20,000 of their hundreds of thousands of employees are engaged in IT work.

In other words, if they stamp their feet, even Microsoft will be afraid, oh, no, the whole world will be afraid.

But now their company's server has been invaded, and the network security system has been transformed into this. More importantly, this is not the first time. For Tuba, this is like a hard slap on the left side of his face.

, and then after a while, he also came hard on his right side.

This is absolutely unbearable.

Of course, the most critical thing now is how to keep one's position while ensuring that there will be no problems with the company's network security system.

The network security system has been replaced by a backup system for the time being, and no military secrets have been leaked. There will be no problems in the short term, so the more important thing is to trace where the stolen code has gone. As long as it is retrieved, and

Get rid of those bastards, and then he will be safe.

Through this network attack, he also verified that the network security system itself should have no problems.

However, the other party was able to steal their employee accounts, steal various passwords and verification information in strange ways, successfully enter the company, and finally use brute force to forcibly copy parts of the network security system.

code.

In fact, this can no longer be regarded as a problem with his network security system, because there are too many opportunities for people to obtain Lockheed Martin's employee accounts.

What the other party got was the account of an ordinary IT engineer, and he was stationed overseas. In the Eagle Country, **ae Company, Lockheed Martin has a deep cooperative relationship with **ae Company. **ae is the third largest defense company in the world.

, second only to Lockheed Martin and Boeing.

I'm afraid you have to ask the engineer how the other party obtained the account. After all, the other party is a system compatibility test engineer. He wanders around and may leave traces at any time.

The key is that the engineer's account only has certain browsing rights, so this time someone stole his account, obtained the password, logged in, then forcibly bypassed the security gateway, directly broke into the network security system, and then started copying things randomly.

, which is equivalent to internal employees engaging in sabotage.

As a result, a problem arises. He has calculated that although the authority level of that account is not high, there are strict restrictions on logging in overseas. It must go through multiple identity verifications, such as a long password, and then

The company sent a string of random passwords to his mobile phone, and then he had to insert the digital signature of the identification card issued to him by the company.

This digital signature is a string of passwords composed of a mixture of the ECC210 encryption algorithm and the AES symmetric encryption algorithm. In theory, to brute force crack this digital signature, even a machine with a computing speed of over 10 billion times per second would have to count several times.

Lifetime.

However, the other party directly cracked the password, obtained the verification code, and deceived the system with the digital signature information code in a short period of time.

Tuba immediately suspected that there was an insider in his company, especially the engineer who was the most suspicious.

Because in such a short period of time, it is obvious that hackers cannot crack so many things at once.

But of course, after he retrieved the engineer's information, he eliminated this suspicion.

Because the engineer is currently returning to the United States for vacation and is in Ohio, and the account login address tracked is in Eagle Country.

Tuba's guess is that the engineer's account and password were stolen while he was working in Eagle Country. As for the random password, if the other party has a way to get the account and password, it is not impossible to obtain his mobile phone information and intercept it through the telecommunications company.

.

Finally, the company's digital signature information card is written in symmetrically encrypted information. It is almost impossible to crack it with tools. It is more likely that the engineer was stolen while working.

The three conditions were added together, and finally a conclusion was formed. This was a conspiracy that had been planned for a long time.

The other party has probably planned it a long time ago, including the last attack, which is obviously a series.

Tubal didn't think much and immediately contacted his boss. It seemed that this matter was no longer something he could handle now.

After his boss learned about it, he immediately contacted the military, and then the CIA and NSA immediately intervened in full.

Tuba did not hesitate at all and immediately sent all the IP addresses and the information behind the IP addresses he had obtained to CIA and NSA. Lockheed Martin's network security engineers are not just engineers, they themselves are highly skilled IT experts.

In the process of reverse tracing the other party's IP address, the identity of the other party has been found.

If people from CIA and NSA are not stupid enough, they can definitely find some clues.

Of course, he also hinted to his bosses, CIA and NSA people that the hacker this time was the same hacker who invaded Lockheed Martin last time, so if the target is caught, all the electronic equipment of the other party needs to be confiscated at the same time

, handed over to Lockheed Martin for investigation, then there should be a major breakthrough in the last serious theft case.

Anyway, only they understand those codes, not people who are not afraid of CIA or NSA.

It should be said that CIA people are still very efficient. Of course, perhaps Lockheed Martin's influence is too great. After receiving the news, although it was already past four in the morning, CIA, NSA and FBI still

At the same time, CIA intelligence personnel stationed at the location of the exposed IP address also took action immediately.

In particular, the list of companies specifically pointed out by Tubal received special care.

Of course, CIA and NSA are not fools. They must conduct investigations before taking action.

The full name of NSA is the United States National Security Agency. It is responsible for monitoring radio broadcasts, communications, the Internet, especially military and diplomatic secret communications. It is affiliated with the Pentagon and even controls more funds than the CIA, which is the United States Central Intelligence Agency. USCC US Network

The immediate boss of the combat command is also the head of the NSA.

Therefore, their ability to obtain network intelligence is definitely the best in the world. When the hacker attacked, USCC was already tracking it, and NSA was also monitoring it. However, USCC has not notified NSA yet, and now NSA is asking USCC to help investigate those IP addresses.

.

The problem is that Lieutenant Colonel Miller, who was on duty, still didn’t have much clue after receiving the order from his superiors. The information he obtained was similar to Tuba, but he was different from Tuba, although he also found out the IP addresses of companies such as NRD.

He had it, but his intuition told him that there was someone behind the scenes.

He spent a lot of effort, but what was puzzling was that no trace was found, so he thought, if there is someone behind the scenes, there is no doubt that the opponent is very terrifying, so terrifying that even USCC and NSA can't do anything about it.

.

USCC has no solution, so I’m afraid no one in the world will have a solution, because he is completely confident that USCC’s network security experts are definitely the strongest in the world, no one.

A hacker who could make even the world's strongest professionals... He couldn't even imagine it. Could it be an alien? Anyway, he must be a genius among geniuses.

Of course, he does not deny the existence of such genius.

Therefore, the advice he gave when reporting to his superiors was to investigate clearly before taking action, because it would be too early to act now and it would be easy to alert the enemy.

But now the NSA has asked him to provide assistance in turn, and the tone is also sarcastic, to the effect that Lockheed Martin has already found out, but you, the USCC, as the Cyber ​​Command, have not responded at all.

Although the heads of the USCC and the NSA are the same, both from the Pentagon, there are too many intelligence systems in the United States. Although the USCC is not an intelligence system, it has some business overlap with the NSA. Between the two, it is difficult to say

There is also a competitive relationship.

In fact, this hacker attack should be slapped in the face, and the NSA, which is responsible for monitoring the network, should be slapped the most, because this should be the scope of NSA supervision.

But now the NSA itself is facing a super trouble.

At the beginning of the month, the Guardian and the Washington Post published information leaked to them by former CIA employee Edward **, which exposed the NSA’s “Prism Project”. Now the Prism incident is just like

A prairie fire is spreading all over the world. The NSA itself cannot protect itself, and the people above are even planning to separate the USCC and NSA to reduce the impact.

The NSA obviously does not have much energy to deal with this temporary outbreak of hackers.

Of course, USCC doesn't want to take on such a thankless job, but there is no way. NSA is the big brother. Although USCC and NSA are on the same level and have the same head, it is normal to meet NSA's requirements.

of.

To put it bluntly, it is actually very simple. The NSA needs to solve such a big case as soon as possible to prove the legitimacy of the NSA surveillance plan and reduce the negative impact caused by the prism door.

In the words of Lieutenant Colonel Miller's boss, the NSA is unusually enthusiastic about this case right now.

Therefore, several major intelligence agencies and USCC reached a common agreement almost at the same time.

USCC immediately classified hundreds of IP addresses, then intensively invaded and began to investigate the past black history of these companies...

NSA investigates emails, call records, etc. of these companies.

The CIA and FBI are responsible for monitoring the main persons in charge of those highlighted companies, such as NRD Company, POX Company, etc., and are ready to arrest people at any time. At the same time, the communication records and network information of these companies are also closely watched.

At 11 a.m., London time, in Stockton, Yorkshire, nrd company executives are urgently dealing with the incident where the company's website has been hacked, the homepage has been tampered with, and a large amount of information has been downloaded.

The company was facing a formidable enemy, and the security guards blocked the company's entrance and prohibited anyone from entering.

At twelve o'clock, a black bulletproof van drove into the company's gate. After about half an hour, at twelve thirty, the black bulletproof van slowly drove out of the company's gate.

Bald Smith breathed a sigh of relief, because the car contained some of the company's confidential documents and the company's past ulterior data, and even the server had been moved.

If the police come to your door, they can only stare.

Mening, Villa, Zhang Yang, who has been fighting for several hours, is eating dinner at the moment, but his eyes are still staring at the computer screen. The computer screen is transmitting real-time images from the surveillance cameras at the entrances of several companies that he focuses on.

.

"Sure enough, the action has begun..." Zhang Yang stared at the black bulletproof van driving out of the entrance of the nrd company. He raised the corner of his mouth slightly and showed a faint smile. Next, he had to see the strength of the most powerful national intelligence agency in the world.

How powerful. (To be continued.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next