Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 198: House of Flying Daggers

Chapter 198: Ten-sided ambush

This incident of government-in-chief hackers escorting secrets caused by the rescue of Feng Yueying only calmed down for one night.

The next morning, Hu Yifei turned on the computer and found that the wind direction seemed to be a little wrong. The PDF vulnerability used by Hanhun Bird when attacked was suddenly detonated.

Following the little bit of vulnerability information released by Odobi, the United States suddenly announced that more than 30 high-tech companies in its territory had detected that their network was hacked, which happened a month ago. The hackers used this PDF vulnerability, and the core technical files of many companies were stolen. Among the attacked companies, Odobi actually included Odobi. Odobi said that the source code of many of his software was stolen by hackers.

"Damn!" Hu Yifei really wanted to criticize President Odobi with saliva, saying that the hacker used the vulnerability of Odobi software to steal the source code of Odobi software. Bah, you can think of it. What are the loopholes in your own software? You don't know anything about it than anyone else. He actually came out to join in the fun. You are not framed or gaining sympathy. You are cheating me as a mentally retarded!

"That's so fucking shameless!"

Hu Yifei cursed and looked at the list released by the United States. Four of the top ten independent software companies in the world are on the list. Some are oligarchs in the field of professional application software. These companies account for the majority. Among the remaining companies, some are precision original companies and some are defense industrial companies. In all fields related to high-tech, all companies are on the list, and the losses are not small, and all are core technologies stolen.

The United States only said that these companies reported losses, but did not make conclusions about the origin of the hacker. However, the United States also stated that this is the most serious technological secret espionage incident in US history, and it is not ruled out that it is an organized espionage act. The United States will launch the highest level of investigation into the matter.

When the United States shouted, other countries began to stand up and announced that some companies in its territory had been hacked by the same method. It was a month ago, but the losses were not as big as the United States.

"It won't be such a coincidence!" Hu Yifei expressed doubts about this. This is too insane. Besides, Odobe's announcement yesterday did not introduce the loophole. Why did so many accidents occur at once? Does hackers have to be investigated after the loophole is released?

Almost in a moment, Odobe's PDF vulnerability became a vulnerability that could instantly kill all cutting-edge technologies in the world. If you continue to say this, the manufacturing process of the atomic bomb was stolen by this vulnerability, and I am afraid that someone can immediately follow and offer a purchase.

Hu Yifei quickly got on the springboard and was about to find the candy and fried chestnuts to ask what was going on.

As soon as I opened the mailbox, I found that there was a letter of scrambled chestnuts inside. "Second leader, something is wrong!", "Feng Yueying is afraid it will be difficult to get it out, and things are heading in an uncontrollable direction!"

"What happened?" Hu Yifei asked.

The Han Bird quickly emerged, "The attack incident has expanded! Feng Yueying probably won't be out for a while!" The Han Bird was very depressed, and things were really twists and turns. Just after pressing a wave, the United States caused trouble again. Feng Yueying's luck was really inferior, and it was even more difficult to come out this time.

"What's going on in the United States today? Do you have any insider information?"

"Old trick!" Han Haoniao replied, "The US government has invited McAfee and VeriSin to investigate the hacking incident. If I guess it is not wrong, there will be no specific conclusions, but this shit will still be tied to the heads of Chinese hackers. Then in a few days, the US Department of Defense may ask for an increase in the budget for cybersecurity! They have done this kind of thing twice, and they always talk about the threat of Chinese hackers!"

"Fuck!" Hu Yifei cursed, "Can you be sure?"

"It's almost impossible to get along!" Hanhaoniao didn't dare to give the correct letter. "ZM is still doing a good job in this area. It's all my fault. It happened to be time to get Feng Yueying and give such a good opportunity to take advantage of the issue to the other party. The United States will definitely take the opportunity to hype the Chinese hacker threat theory. This time they are so hyping up, I think it might be a big move!"

Hu Yifei was really angry and was honest and could not avoid being beaten. The US Department of Defense wanted to increase its budget and never forgot to knock China on a slap first, and then when Congress asked Congress to pay for it, it would be more reasonable and even threw dirty water on Chinese hackers and the Chinese government, killing two birds with one stone.

"It was only after I got to ZM that I had some understanding of the current pattern of the Internet. I used to hide in the dark and do some destructive behaviors, but now I think it's really not good!" Hanhaoniao continued, "That's why I invited the second leader to cooperate with ZM. Everyone took this opportunity to do something big!"

Hu Yifei had a headache when he heard this, "I really have no interest in this matter, let's talk about it!"

"Then you think about it!" Hanhaoniao did not force it, "Inexplicable attacks may occur on the Internet in the past two days, please pay more attention to the second in command!"

"Okay, I understand!" Hu Yifei went offline after posting this sentence. Hu Yifei was a little angry and went to his website and issued a new announcement, "There may be inexplicable attacks on the Internet in the near future. Please take network security measures!"

Looking back at the wolf den, I found that many people were discussing this matter. Yesterday, only the British family was in a row. Now dozens of countries have joined forces to encircle and suppress the investigation. Although the United States has not yet announced the conclusion of the investigation, many people in the wolf den have chosen to believe that the British hacker secrets were stolen by the secrets yesterday.

It would be fine if the family was stolen. Now so many stolen people are emerging. It is definitely unreasonable to say that they are simply hacking. Then not everyone is wronged.

Hu Yifei looked at the comments and thought that he didn't know who came up with the idea of ​​the hacker. He was such a genius. Anyway, there were few things that could be found out about hackers. Say you are, you are, you are not, and that is not. Even if the IP attacked comes from Africa, people can say that you are using the African springboard.

However, the United States is obviously smarter than the United Kingdom. It is not embarrassing that Britain says that its national defense secrets were stolen. The Americans are smart. Their defense secrets were not lost. The core secrets of the company were stolen by hackers. The United States has always been a high-tech image and is most afraid that others will think of their technological secrets, especially in Western society that pays attention to intellectual property rights. This will easily gain support. If you find out who the hacker is, you will be able to condemn it at that time.

"Oh..." Hu Yifei felt a little nervous. He was the same as Han Hunter at that time. He didn't do anything. He felt uncomfortable if he didn't do anything. He really wanted to do something, but he didn't know who to do it. After being bored for a long time, he decided to go out for a walk.

At this time, what was more depressed than Hu Yifei. It was dark sky. He didn't need to guess. He knew that someone used yesterday's British incident to take advantage of the problem. It was really a yellow mud that was falling off his crotch. It was either shit or shit. Even if you were all over your mouth, you couldn't explain it clearly.

Hei Tian hated the assassin organization at this time, it must be discussed with the Americans in advance!

In the next few days, no one came forward to say that the secrets were done by Chinese hackers, but some world-renowned media focused on doing some reports, such as "China's cyber attack power is world-class!", "The number of Chinese hackers is more than two million!", "Many well-known hackers were recruited by the Chinese government and secretly developed cyber attack weapons!",...

It is unclear, but these reports appear in a concentrated manner to guide you in this direction and allow you to subconsciously connect two things. This is the greatness of information invasion.

On the fifth day, McAfee and VeriSin both released their own investigation reports on the hacking incident.

Hu Yifei finished reading the investigation of the two companies and was stunned. The conclusions drawn by the two security agencies were completely different.

Verisign said that the hacker used a double vulnerability attack Trojan, which mainly exploited the PDF vulnerability, which was exactly the same as the US government's claim; while McAfee said that he did not find the PDF Trojan among his investigative objects. The hacker's attack method was very complicated, and he mainly used an ie vulnerability, which first slowly implanted part of the malicious code into the computer, and then combined it to carry out the next attack.

In terms of the losses to the companies under investigation, VeriSin said that the hackers' goal was very clear, which was the source code library of these companies, and the hackers had already succeeded in most cases; but McAfee did not mention the results of the hackers at all.

The only consensus among the two companies is that the hacker's attack is organized, the time of initiation is consistent, and the time of ending is consistent.

In other words, it can prove that the hackers' attacks are organized, but it cannot prove that the hackers use the PDF attacks that appeared in the UK, nor can they prove that the hackers have successfully stole the source code of these companies, nor can they prove that the hackers were organized by.

Most of the subsequent media reports quoted VeriSin's investigation report. Hu Yifei then believed that the sugar-fried chestnuts were not nonsense, and the direction of the matter was exactly the same as the original prediction of the sugar-fried chestnuts.

McAfee is the second largest security company in the world, and Heitian used to work here; Verisign is even more awesome. It is one of the basic Internet service providers. Among the thirteen root domain name servers in the world, two of Verisign are in the hands of Verisign. Verisign also controls the registration and management of .com and .net domain names. To be more indirectly, Verisign also does security intelligence business. He is the big boss of the Carrot Alliance, controlling half of the global vulnerability transactions.

"Damn it, there are really people who come out to waving flags and cheering, standing up and cheering!" Hu Yifei compared the two reports on the screen. Verisign's report was simply customized according to the template.
Chapter completed!
Prev Index    Favorite Next