The richest man starts with a blind box

Chapter 1399: Three Days of Terror

Chapter 1399

When the whole world fell into chaos due to the lock-up of network data, some blackmailers either found out with conscience, or worried that they would bear unimaginable criminal responsibility after being found, so they didn't want the money, and directly threw the key to It was given to the company that was extorted, and then all traces of its own existence were erased on the Internet, and it disappeared without a trace.

But there are also some blackmailers who will not give the key if they can't get the money.

There are also some blackmailers, probably because they are afraid that contacting again will produce clues to find themselves, so even if the other party is willing to give money, these blackmailers will completely disappear without a trace, and the key will naturally be nowhere to be found. Those companies that are in a hurry are about to tear their hair out.

In the end, the impact this time was extremely terrifying and far-reaching. A large number of companies declared bankruptcy after struggling for several months due to operational difficulties due to data loss, and some companies failed to recover and declared bankruptcy after a few years of delay.

The closure of these companies also brought a large number of employees out of work.

The most terrible thing is that the data of many government functional departments have been locked, making many daily data related to people's lives unusable, life has been seriously affected, and many people cannot even receive social security Jin, eventually died in poverty.

But it is not without luck. For example, there are a group of criminals in the Netherlands. These criminals will be tried in the future, and evidence is being collected from them now.

As a result, all the collected evidence was locked up. As a result, when many criminals were damaged, the public prosecutor could not produce any evidence to prove the guilt of the other party. In the end, the court could only acquit these criminals. This is probably the most grateful of a blackmailer.

After such chaos, the tortured people naturally want to ask why, what is the reason that caused such a tragic situation, and why there are so many computer systems of companies in the world that are directly hacked and then sealed all the data in the computer.

The answer is not difficult to find, because there are too many companies that have been victimized, and there are naturally many extortionists, so there are always some unlucky people who are caught by the police and arrested directly.

The Times was the first to reveal the truth. On the 1th day after the resumption of business, they published an exclusive report in a newspaper that exudes the fragrance of ink.

This exclusive report comes from the police. It describes how the police cracked a case of cyber extortion and captured two suspects of cyber extortion at the same time.

Of course, these contents are not the key point, the key point is the self-reports of the two suspects.

According to the two suspects, they were originally just two unemployed people. Because of their love for computers and the Internet, they often hang out in various computer technology professional forums. At the same time, they also have a certain related technical foundation. There is a considerable distance, after all, they don't even know how to break through the opponent's firewall.

But opportunities always come inadvertently, and this opportunity is the detailed information of LJ gate announced by SN Deng.

As I said before, this detailed information contains a backdoor specially designed by Microsoft for the security department, so that the security department can directly control any computer they want to control through this backdoor, and at the same time, they can remotely package and encrypt the files. All the data in the computer.

And all the technical information and codes of this backdoor are directly published in this information.

These data and technical representatives are naturally extremely boring to ordinary people, and they are not even interested in glancing at them.But for those professionals, this is the best research material in the world.

So in the major network technology forums, almost everyone is talking about this document and all the relevant technical details disclosed in it, especially this backdoor carefully designed by Microsoft.

After studying this backdoor, many technicians said that the design of this backdoor program is too delicate.

First of all, this backdoor program is deeply hidden. If there is no information directly pointing out the existence of this backdoor program, then none of them, the world's top computer programmers, will be able to discover the existence of this backdoor program.

Because this backdoor is related to the entire infrastructure, it must be added when the most basic part of the entire computer system is written. This is definitely a backdoor that Microsoft internal personnel have the ability to create, and it cannot be added casually later. a back door.

The second is that the design of this back door is very user-friendly. As long as they have the corresponding software, even the bosses of the security department who are not very good at using computers can remotely control any computer they want to control through a program that is almost foolish. Computer.

In the data and information provided by SN Deng, these things were also handed over without reservation.

Most of the programmers on the forum are just studying these things with a curious attitude, and they don't have any malicious intentions themselves.But there are always some people in this world whose ideas are very against the sky. For example, a certain programmer posted a post on the forum and proposed an idea.

That is, if they use this set of tools to hack into any company's server, can they easily seize control of the other company's server, and then lock and encrypt all the data in the server?
Because these servers all use Windows systems, no matter how powerful their defense systems are, they don’t exist in front of the backdoor program officially provided by Windows. In theory, they should be able to capture them very easily. The control of these servers is extremely high level of defense.

Such a conjecture immediately received responses from countless people, and then someone tried to use this software to hack into their company's server.

Because this set of software only needs to know the IP address of the server, or know the hardware code of the company's server, then it can directly invade the other party.

So as long as these two data can be mastered, hacking into the server is something that elementary school students can do.

Facts have proved that there are not many problems with the data provided by SL Deng. Many funds who are just curious and want to have a try have successfully entered the company's server.

And up to this point, the attitude of most people doing this is still just curiosity.

There are always smart people who can find incredible business opportunities, so just 20 minutes later, someone posted on the forum, saying that he had successfully used this set of tools to hack into one of his most hated companies, and then put this All internal data of this company is locked, which guarantees that this company will fall into complete chaos tomorrow.

This guy just wanted revenge on the guy he hated.

But soon a reply completely ignited the crime. A first-class trumpet replied below, "You can sell the key to them, and the price will be set at 10 US dollars. Wouldn't that be a fortune?"

This comment triggered a series of replies from 66666, and at the same time, it completely opened up the dark night of the Internet. Countless hackers saw this and suddenly realized.

Yes, I can use these tools to blackmail those big companies.

Lock their data and demand a ransom, or they'll never get it.

So that night, many hackers took action immediately and began to attack some companies.And because of the existence of the backdoor program, these attacks have almost no difficulty, and they just broke in and seized the opponent's data.

But at this time, this kind of behavior is still relatively small, and there are very few companies affected, but many news media have reported the situation of these companies, and some hackers are showing off on the forum that they have obtained thousands to dozens of hackers. A huge ransom ranging from tens of thousands of dollars, and then the entire network can no longer restrain everyone's desire to get rich overnight.

Because this set of tools is quite convenient, and there is almost no technical threshold, as long as you can master the company's IP address or hardware code, it is not difficult to invade.

This leads to the fact that anyone who sees the relevant news can immediately start practicing on their own.Unlike normal hacking, even if you are interested in this technology, you still have to spend months or even years learning the corresponding technology.

This leads to the ability of all malicious people to become hackers, and they all simultaneously launch an intrusion into at least one company, and then carry out blackmail.

In the end, within three days, the entire world's network was paralyzed, and a large number of social functions were lost, and the entire world fell into a chaotic, almost doomsday disaster.

When the Times Daily announced the final truth, people who suffered a lot in those days, without exception, directed their anger at Microsoft.

Feelings All this is a good thing that Microsoft did. They left this back door, which eventually led to those damn guys being able to invade the databases of various companies without difficulty. It turned out that Microsoft was the culprit.

Before, because only personal privacy data was violated, the majority of users didn't think there was anything, and there were not even many people who demonstrated.

But when the real damage happened around him, and many people suffered unimaginable actual losses, Microsoft felt indescribable pressure.

In particular, most of the victims are still companies and enterprises, and when these companies and enterprises find that all the losses they have suffered come from Microsoft, the lawsuit letters and lawyer letters are naturally unavoidable. Within half a month, more than 32 companies and individuals sued Microsoft, demanding that Microsoft compensate them for their losses.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like