Chapter 226 Asking for Trouble (Part 2)



The intensity of a DDoS attack depends mainly on the quality of the zombies controlled by the attacker.

A 'zombie' is a computer system that an attacker has hacked into and successfully controlled.

This computer system can be a personal computer, a server, an IoT device, or any other computing device connected to the Internet.

As long as a device becomes a so-called "zombie", the attacker can manipulate the device through remote control as if it were the attacker's own device.

Generally speaking, attackers often prepare a large number of "zombie machines" in advance.

Exploit vulnerabilities, weak passwords, social engineering, malware, and other methods to infect a large number of devices and turn them into "zombies."

The attacker then organizes these "zombies" into a botnet, which is coordinated by the attacker through a server to send a large number of requests or data packets to the target, thereby exhausting the target's resources, causing the target server to overload and making it impossible for legitimate users to access the service.

Of course, before sending the attack command, the attacker needs to test the "zombie" under his control to ensure that the controlled "zombie" can respond to the execution of the command.

At the same time, in order to reduce the risk of being tracked, attackers will also use springboards to disguise and hide their real addresses.

Before an attack is launched, the backdoor programs hidden in these "zombie computers" will be in a silent state and will not have any impact on normal use.

Therefore, it has considerable concealment.

The quality and quantity of "zombie" determine the success rate and power of DDoS attacks.

Or control the bandwidth and processing power of the 'zombie'.

A broiler with a high-speed internet connection will definitely be more effective than one with a low-speed internet connection.

Or control a large number of 'broiler chickens'.

Controlling 10,000 broilers to attack at the same time would of course be much more terrifying than controlling 1,000 broilers of the same mass.

Zheng Hongyi has great confidence in the technical capabilities of these three trusted subordinates.

In addition, DDoS attacks do not require much technical content, so Zheng Hongyi never thought about the possibility of failure.

However, what was once again beyond Zheng Hongyi's expectations was that as the attack had begun, his access to the 'Boundless Dimension' platform on his computer was not affected in the slightest!

It is impossible for him to be paralyzed. There is no sign of paralysis at all.

As for the AI's response to the questions he asked, it also maintained an incredibly smooth speed.

No matter how tricky the questions he tried to ask, the platform was able to maintain a normal response frequency.

Zheng Hongyi couldn't help but frown.

Just when he was about to remind his three trusted subordinates to continue to increase their output, the three trusted subordinates suddenly cried out in surprise!

Zheng Hongyi's heart suddenly skipped a beat.

Although I still don’t know what happened, I instinctively have a bad feeling!

"Boss! My attack failed! The opponent's skills are too strong. They directly paralyzed my 'chicken'! They even tracked my address through the springboard I created earlier!"

"Boss! I'm worried about this too! How many technicians do they have?! How can they react so quickly?! My attack didn't even have time to cause any trouble before it was easily broken!"

"Boss! I...my situation is the worst. I have lost control of the computer..."

The three technicians shouted to Zheng Hongyi.

The expressions on their faces no longer had the calmness they had before, and in addition to the panic in their voices, one could also hear that they were clearly at a loss.

Zheng Hongyi suddenly stood up and rushed to the side of the three technicians. After looking at the computer screens they were using, the expression on his face froze instantly.

Because he could clearly see that not only had the three technicians' computers lost control, but the people on the other side had even used the three technicians' computers as a springboard to directly invade the 365 Company's intranet!

Zheng Hongyi's eyes widened. He quickly turned around and pressed the button on the landline phone on his desk. Then, with a frantic look on his face, he yelled, "Quick! Cut off the power! Cut off the power immediately! Cut off the entire company's power supply!"

"Power off?! Boss, forcibly shutting off the power could cause unknown losses. System damage, data loss, database corruption—all of these could happen. Recovering after restarting the system would also be extremely difficult. Should we try to isolate the infected system first? Or activate the emergency response plan?"

One of the technicians was startled and couldn't help but speak with a slight stutter.

"It only took them a few minutes to intercept the attack and track you down! This level of technical capability is beyond my comprehension! Isolation measures will be useless!"

Zheng Hongyi's eyes were red, like a gambler who had lost everything.

Another technician stared blankly at the screen in front of him, muttering, "Boss... it's too late... the other party... the other party has already destroyed our database..."

"Ruined?! Are you kidding?! It's only been a short time?!" Zheng Hongyi was stunned.

"It's really ruined... Our software has crashed... It's over... It's all over..."

When the third technician spoke, it was obvious that he was about to hold back his tears.

Zheng Hongyi was dumbfounded.

Not to mention that he had not considered the possibility of attack failure. Even if he thought of the possibility of failure at a certain moment, he never thought that the other party would track down the company's address and take over his company in an instant!

How is this possible? !

You know... their company is a top security protection company!

How could someone break through the firewall so easily and destroy the company's database so easily?!

If the database can be restored... then the loss is manageable, but if the database cannot be restored...

Thinking of this, Zheng Hongyi's breathing became heavy, and he shouted loudly: "Investigate the damage immediately! Thirty minutes! Within thirty minutes, I want to see the results!"

The three technicians were startled by the shouting, and looking at Zheng Hongyi's eyes that seemed to want to devour someone, they immediately ran out of the office together in a panic.

In less than fifteen minutes, the preliminary results were compiled.

"The database... is completely destroyed? Are you sure? It's really impossible to recover?!"

Zheng Hongyi's lips trembled.

After receiving a positive answer, Zheng Hongyi felt a black screen in front of his eyes and fainted on the spot.

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List