new York.

An apartment building in the suburbs, an opaque room with curtains, and the air-conditioning is very good. The dark shades of the room and the coldness that people can tremble can remind people of the morgue in the hospital.

If you don’t have three large screens on the table and a few cans of empty cola, and the chassis of the wu wu light sound, you can say that there is no smell in the whole room.

Taking a freshly picked pizza back from the entrance, a man with a dark expression looked back at the computer desk and held the mouse twice.

I saw the black-and-white frame on the three screens in front of him, just like a waterfall.

If the average person sees the complexity of the code, it will make the eyes dim, but for him, every string of characters on the screen is well known.

“A big fish…”

“Let me catch you! Perfect!”

He licked his tongue, and the corner of the lone wolf smirked, grabbing the pizza and taking a bite.

This time it was a “convenient network.”

Although there is no BOSS instructions, he believes that it is possible to start expanding the battlefield beyond the media.

After all, they are not an organization with strict discipline and unity of war, and he can’t think of any official website of the Chinese media that has not been hacked.

Through the line of deadly code, he seems to have seen it, those people who are tens of thousands of kilometers away from him in the server room, but they are helpless, how angry and disgusting their faces are.

However, at this time, he hanged an account on a trading forum in the dark network and suddenly received a private message.

“… Is it my delivery of ‘takeaway’?”

The takeaway here is not really a takeaway, but a broiler that is often used for DOS attacks or other bad things.

For a hacker, catching broilers can be said to be a basic skill. He also has a lot of broiler stocks, and there are many good quality items. However, he is going to do the Heaven-shaking, Earth-shattering major event. Buying a little from the dark net’s peers is far more efficient than yourself.

Looking at the mark of the unread message, the lone wolf spoke to himself, holding the mouse and clicking on the private message.

However, at this time, he saw the content of the private letter, suddenly stunned.

[That, the kind owner asked me to give you a chance to rehabilitate, or you still surrender (‘?”)]

“…pu chi.”

“Hahahahaha!”

He laughed and leaned on the computer chair. The lone wolf smirked and threw the private letter into the recycle bin. Then he dropped the vest account for trading and landed it for backup.

“It’s funny… I found the vest I used to trade and thought I could fix it? I also surrendered? Eat it!”

It is not difficult to find their trading vest, and now the entire hacker circle is paying attention to this matter. Those who choose to trade broilers at this time are not the sellers who want to give them bullets, they are members of the predatory eagle, that is, their own.

As long as you see his trading information, you can guess who the vest is with your toes.

However, he didn’t panic at all, because he wanted to find its true body from the vest on the dark network, just throwing a dart on the map to North America, it is even harder to tie his address.

However, at this time, he suddenly found out that the interface on the left screen corresponds to the address information of the official website of National Quemoy University in China, and the green mark was suddenly lit.

This means that the server that was originally implanted by the Trojan and disconnected by the administrator physics actually connected to the network. !

So not afraid of death?

“hmph ……overestimate one’s capabilities idiot.”

Gently sneer in the mouth, the lone wolf put his hand on the keyboard, ready to give a little lesson to those who overestimate one’s capabilities.

However, when he knocked on the first button, he was stunned.

I saw a dialog box that suddenly jumped out without warning, and also with a string of unclear characters.

[(*?ω?)?tひs]

Lone Wolf: “???”

……

Network supervision bureau.

2.17 Extra Large Cyber ​​Crime Crime Squad Office.

Although the wall clock on the wall has turned, the people sitting here are still working overtime.

Next to the computer desk was a bottle of air-conditioned Jianlibao, who stared at the computer manager’s screen, and suddenly said nothing.

“MMP, it’s like playing a hamster!”

Yes, it is to play the hamster.

The other side is like a group of mice that have broken into the granary and built a nest. They sip a bite and sip a bite to let them fight in the fire, but they are not cured.

Standing in the network supervision office, just asked from the Director of Science and Technology Bureau Li, who came over from the Beijing National Hotel, frowns.

“Is the security alert file sent?”

The technician sitting next to him looked at his boss and saw the boss nodded, which was looked at towards Director Li, and said with a bitter expression.

“It has already been sent, but to tell the truth, there is no use at all. For example, even if Tencent and Ashi are not informed by us, their security team can do a good job of protection. Some SMEs have received our notice. In addition to listening to the fate there is no effect… I feel that our security warning documents may spread panic.”

Director Hong whispered a remark: “It is better to be prepared than to be prepared, or is there any better way for you?”

“…no way, the best way to fight in cyber warfare is to turn defense into offense, change the offensive and defensive position, and let the other side run out.”

After the sentence was exported, the office suddenly quieted down, leaving only the sound of typing on the keyboard.

Director Hong snorted softly.

“Okay, don’t say this again. Proactively attacking this will definitely not be approved. Once we take the initiative to attack, it means that the official power of the Chinese state has participated in the attack on the overseas server, no matter who is the first to do it, the loss is all We… What we have to do now is to find enough evidence to let the IP’s country cooperate with us to arrest people, rather than expanding the major event.”

Not to mention where the other server does not know, once the Huaguo cyber war force took the initiative to attack, the diplomatic losses caused by it are far less than a few websites.

What’s more, the International Lunar Hadron Collider Workshop is currently underway. If the diplomatic wave caused by the conference has affected the progress of the conference, it will be in the middle of the other side.

After clearing the scorpion, Director Hong continued to ask, “How is the website recovery?”

The information security engineer sitting in front of the computer pushed the glasses on the bridge of the nose and said with a tired voice.

“The headline news domain hijacking has been restored… I have recovered at least ten websites by now, but it is not the way to do so.”

At this time, the technician sitting in front of the computer desk and wearing the army clothes suddenly said Hongling.

“After receiving the alarm, a new website found traffic anomaly. After checking, the domain name was hijacked.”

Director Hong of the network supervision office has not yet opened, and Director Li will rush to ask the doctor: “Where is this?”

“Convenient network.”

I heard that another website had fallen, and Hong’s temper slammed the table.

“What’s so special!”

The war has already burned outside the news media and began to spread to the government department’s website.

Director Hong’s forehead slipped through a drop of cold sweat.

Although the websites of several major government departments have been defensively reinforced, the area of ​​China is so large that there are places in the central government, and there are places in the center, that many websites, they can’t afford to take care of them, and they can only rely on the strength of the local network department to start their own defense. At that time, they had to fall into a new round of firefighting, and they were exhausted in this.

And he is not worried about this.

If the other party further expands the battlefield, the target of the attack will be expanded from the website server to the medical, electric power, logistics, and transportation systems everywhere, causing greater harm…

In that case, the loss may be a little unbearable.

But at this time, the information security engineer sitting at the computer desk suddenly frowns close to the screen.

“Wait, the situation seems to be something wrong.”

Director Hong was shivered and asked quickly, “What happened?”

“Several traffic data we are tracking has suddenly been interrupted…”

Upon hearing this sentence, Director Hong suddenly complexion sank.

“Is it discovered by the other party?”

The information security expert shook his head. “I can be sure that the other party did not find us… but they are inexplicably suddenly retreating one by one.”

Director Hong was frowned and just wanted to ask what was going on. A Hongling voice suddenly came from the side.

“The hijacking of the domain name has been lifted!” A man in a military uniform and sitting in front of the computer suddenly stood up and said with excitement, “They seem to have really retreated!”

Director Hong frowned and bit his teeth staring at the screen in front of him, thinking carefully.

“…but why did they suddenly retreat?”

The information security expert sitting next to him shook his head.

“do not know……”

With his professional ability, he can be sure that 1% is sure that the traffic data he tracks is absolutely impossible to detect his own surveillance.

However, the other party is so inexplicably closed, there is no omen.

This is fortunate for the websites that are being attacked. But for the task force of the cyber supervision bureau, this is definitely not a happy thing.

If you can’t catch people, that means they can come back at any time.

If you don’t know why the lawless elements have retreated, I am afraid that they still can’t sleep well this evening.

Looking around at everyone in the office, Director Hong said in a firm tone.

“Continue to investigate, no matter what reason they are closing their hands, no matter if they hide in the ends of the earth, they must find them out!”

“Yes!”

Although it is not a victory, it can be a staged result if the enemy can be resigned.

The soldiers in the office are fighting high and continue to struggle in their posts.

Director Hong was nodded and was about to sit back in the office chair, but at this time, outside the office was a knock on the door.

“Please come in.”

The door pushed open, and a person who looked like a thin person walked in quickly.

“Director!”

Director Hong: “What is it?”

“The mailbox of our department just received a…some special alarm email.”

“What email?”

“The text of the mail has only a strange code, and then the account is still written…” The member’s hesitant expression, hesitated and continued, “The murderer’s IP found… and so on.”

Did the murderer’s IP find it?

When I heard this sentence, Director Hong was first stunned, and then there was a ecstasy on his face.

Realizing a possibility, he immediately asked: “Who sent the mail? Does the policeman have contact information?”

“No…” was chased by the chief of the flood, and the staff shook his head with trembling and fear. “…mail only left a name in the deposit.”

“Who?”

“Dr. Z…”

Director Hong: “…?”

Director Li: “???”


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like