According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...After a day and a night, Xiaotian and his technical team finally identified the malicious computer virus. They then created a dedicated removal tool based on the virus's core sample.
Effectively prevent such virus attacks.
Almost all of Xing Baohua's companies with internet access suffered DDoS attacks. By sending a dedicated removal tool to the company's server via email, the problem was generally resolved.
Although these problems have been solved on the surface, viral attacks continue.
In addition to Huahong Telecom, Huahong Bank was also targeted by URL and DNS attacks.
These virus attacks all exploit web pages, using DNS records to redirect users to fake websites they've set up.
Once users enter such fraudulent websites, customers cannot distinguish between real and fake websites and will log in using their account number and password.
These user actions will be recorded. Then, customers will receive information that their account funds have been transferred out.
The preventative measure was to start scanning and removing viruses. Xiao Tian and his team finally had a bit of an easier time, but they still had to trace the problem through logs.
In terms of tracking, technical personnel, including Xing Baohua and Xiao Tianna, are relatively weak.
Actually, you can find clues by following the leads, but the other party might have a blocking mechanism.
This is one of the most common types currently available, invented by Xing Baohua.
This guy used violent tactics to obstruct investigations and prevent them from pursuing the case.
Is there a way to solve this problem?
One option is to use phishing to lure the hacker into a trap during the next attack.
With improved internet speeds and server computing power, a suspect can be identified within minutes if you're quick enough.
Unless the hacker realizes something is wrong within those few minutes and quickly activates the blocking mechanism to disconnect and escape.
There's really no way to investigate that now.
Fortunately, Xing Baohua came up with an even more insidious and ruthless trick.
Most hackers use botnets as decoys. Botnets are idle or in use computers that are used to do shady things without the owner's knowledge.
In that case, let's infect every computer in the world with a wired network with a virus that protects against tracking.
This way, any botnet exploited by hackers will upload its logs to the central server. The system then scans for unusual IP addresses based on the log characteristics.
The cost will be much higher, with storage on the main server being the biggest expense.
Creating a virus is not easy, and installing it on every machine would be a huge undertaking.
What software do computer users use the most?
Not everyone uses Xunlei, so Xing Baohua set his sights on Microsoft.
If a machine uses Microsoft products 90% of the time, how about adding a small patch to Microsoft?
After discussing it with Xiao Tian, Xing Baohua felt that this method was good. First of all, the disguise should be very small.
The second method involves hacking into Microsoft's servers and sending out patches through them.
As long as users boot up and use the Microsoft system, it must automatically update; otherwise, the patches will not function.
Although Microsoft patches usually provide a confirmation option to install or cancel, their patches do not offer this prompt.
It was only a matter of time before Microsoft discovered this patch, hence the tight release schedule.
After devising a plan, we started working on it that very night, and it was finished quickly. After some testing, it seemed fine, and we were ready to start hacking Microsoft.
Is Microsoft so easy to smear?
The world's most trolls are all here; it wouldn't be an exaggeration to say they're trying to mess with the big boss.
So what? We're all from technical backgrounds, who's afraid of who!
In order to bypass Microsoft's firewall, they made all sorts of preparations, even preparing ten small servers.
All preparations were complete, and we were ready to roll up our sleeves and get to work. We thought it would be a tough battle, but we were a bit stunned when we encountered the first firewall.
Isn't this the Aegis Aegis system?
"Boss, can I use your Shield system account?" Xiao Tian immediately called Xing Baohua.
The Aegis Security system was created by Xing Baohua in collaboration with Uncle Qiao and Gates.
Grandpa Qiao has been led astray by Xing Baohua. Now he is fully committed to building a world-class security system, and the software is almost always sold along with Microsoft's hard drives.
Who would have thought that the renowned Microsoft security system could enter so easily?
Having the key makes things easy. Of course, before leaving, you also need to clean up the traces to prevent Microsoft from knowing how the hacker got in, as this makes the investigation much easier.
After finishing the push notification program, Xiao Tian and the others were cleaning up the traces before leaving.
It was done so easily, without any trouble at all.
This is similar to you holding a token, strolling around a heavily guarded palace, hiding something, and then coming out.
Sure enough, after uploading the patch, Xiao Tian asked everyone to restart their computers. No abnormalities were found after booting up, but clues could still be found through data traffic monitoring.
The system logs also show that patches are downloaded and installed automatically.
People who don't understand these things wouldn't even know about this. Even those who know what they're doing might notice something amiss and check the logs to see that it's a security patch pushed out by Microsoft.
Only those who work on the systems within Microsoft can truly understand where the differences lie.
First of all, they didn't push out any patch at all; where did this patch come from?
It's easy to find out once you investigate, so it's just a matter of time.
Almost all users worldwide connected to the internet and using Microsoft operating systems have been affected.
This chapter is not finished yet. Please click on the next page to continue reading the exciting content!