Urban Mad Scientist
Page 255
The next day is not destined to be peaceful. , , .
Chapter [-]: Spread the virus
Microsoft's chief technology officer Rick DeVinutti moved quickly. After the meeting, he immediately went to prepare related matters.
CEO Ballmer demanded that no one be reminded that the information security crisis was theirs to let out.
There are dozens of ways Microsoft CTO Rick DeVinutti can do this.
As Microsoft's chief technology officer, Rick DeVinutti knows exactly how many vulnerabilities their own systems have.
Some of these loopholes were deliberately left by them, and some were discovered later.
After vulnerabilities are discovered, they don't immediately update those vulnerabilities.Only after those bugs are discovered and made public by outsiders, they will fix those bugs.
For old systems, except for Windows 7 system, Windows XP system and systems before XP system, Microsoft has stopped the service of updating patches.
That is, even if someone finds bugs in those systems, they won't fix those bugs.
Although Microsoft is still providing patch update services for Windows 7 systems, they have now mastered a large number of Windows 7 vulnerabilities, and have not updated the patches to fix the vulnerabilities.
And many of the vulnerabilities in these systems are the same.
As long as those same vulnerabilities are created and some targeted viruses are created, huge information security incidents can be caused around the world.
At that time, as long as their latest Windows 10 system from Microsoft has not been attacked, they can tell the world in disguise that only using Windows 10 is the safest system.
Then they have achieved the purpose of Microsoft.
Of course, this kind of thing is definitely impossible to do by yourself.
Rick DeVinutti knows a lot of hackers because of his work.
Of course, those hackers didn't know the real identity of Rick DeVinutti.They just had some communication online using fake identities.
In the past, Rick DeVinutti has worked with hackers on the Internet.Anything that is not suitable for Rick Devinut to do by himself, he will anonymously hand it over to some hackers he knows on the Internet to do it.
And this time, it was no exception.
Soon, Rick DeVinutti connected through the multi-layer springboard with the 'shadow middleman' who had worked with him many times.
Then tell the 'shadow man in the middle' about a port vulnerability within Microsoft.
And assign a task to the 'shadow middleman' to pass that loophole in Microsoft's system.Launch a virus attack on all Microsoft systems around the world.
Rick DeVinutti didn't say that the vulnerability didn't work on Windows 10. He deliberately disguised his identity to make himself look like Microsoft's business opponents were suppressing Microsoft.
'Shadow Man' is a very bold hacker.He has also done twice before the Internet virus incident that shocked the world.
Therefore, this time, the 'Shadow Middleman' also took over the task without hesitation.
As for the purpose of the person who issued the task, he never cared about it.
When there is no mission, he himself will look for loopholes in major systems, and then will do all kinds of infiltration, poisoning, backdoors, and attacks.
Now someone gives their own system's vulnerability interface for free, and also pays him, this kind of task is rare.Zero One Reading Network www.01dsw.cc
Most importantly, he can also increase his own income by exploiting the loophole.
For example, asking someone infected with the virus to pay a ransom to themselves.Then, let the people who have the virus keep getting infected.
'Shadow middlemen' will never do such a thing as antivirus for the infected.
'Shadow Man in the Middle' holds a lot of hacking tools and viruses.
Even the 'shadow middleman' once hacked into the Mijian National Security Agency's cyber arsenal and stole all kinds of hacking weapons in the arsenal.
This time, the 'shadow man in the middle' intends to use the hacking tool 'EternalBlue' obtained from the NSA's cyber arsenal to create virus software.
As a seasoned hacker, who has a thorough understanding of various viruses, and also has very powerful hacking tools, the 'shadow man in the middle' quickly produced the virus he wanted.
The task issuer, Rick DeVinutti, demanded to destroy all files on all computers using Microsoft systems.Make those files unavailable to the owner of the computer.
There are many ways to achieve this effect.
And the method used by the 'shadow man in the middle' is, encryption.
Through the vulnerability of the Microsoft system provided by Rick DeVinutti, the virus that has just been made can quickly infect all Microsoft systems with this vulnerability.
Once the system is infected with a virus, the virus will run directly without any operation, and then the system disk C drive will start to encrypt all files.
Once the virus has run, the infected computer can't do anything.Instead, only one window will be displayed on the screen.
Tell the owner of the computer that you have been infected with a virus, and all files in the computer have been encrypted by me.
If you want to unlock the files on the computer, follow the method below to trade bitcoins to the specified account.
Bitcoin is a network virtual currency and a digital currency in the form of P2P.Peer-to-peer transmission means a decentralized payment system.
Moreover, the two parties to the Bitcoin transaction are completely anonymous, which means that after the transaction is over, it is impossible to know who the trader is.
This also eliminates the possibility of the 'shadow middleman' being discovered and caught after extorting money.
After completing the virus, the 'shadow man in the middle' went through a multi-layer springboard, and then spread the virus out through the network.
Having done all this, all the 'shadow' middleman has to do is wait.Waiting for a large outbreak of the virus.
Because this virus is made for the vulnerability of the Microsoft system, that is to say, as long as the system used by the computer lock has that vulnerability, the computer will never get rid of the infected ending.
You'll Also Like
-
The transmigrated villain wants to escape Feng Aotian's hellish situation.
Chapter 365 18 hours ago -
In music anime, band girls won't be alone.
Chapter 192 18 hours ago -
No kidding, even Rocks would have to offer me a cigarette.
Chapter 137 18 hours ago -
My anime-style card deck is fine!
Chapter 304 18 hours ago -
Practical teaching, all I want is your reward.
Chapter 251 18 hours ago -
I'm on the Ark, and I start out as Gretchen.
Chapter 272 18 hours ago -
If you're going on a blind date, do it properly, don't confiscate my property!
Chapter 43 18 hours ago -
Surviving in the chaos of battle, I'm grinding for proficiency.
Chapter 105 18 hours ago -
Reborn in 2000, starting from the university website
Chapter 118 18 hours ago -
Li Zhuiyuan, a corpse retriever, travels through a mysterious resurrection.
Chapter 83 18 hours ago