Even if you run away, they can still get your real IP address after decoding the data.
As technology becomes more and more advanced, judicial organs are also strengthening their efforts in this area. Later, the concept of a cybercrime investigation team emerged, which is an organization specifically for collecting information on cybercrime and making arrests.
It's full of experts. Xing Baohua remembers a short video of someone arresting online scammers or something like that.
A young man pointed at a programmer and said, "Don't touch the computer or the code!" The programmer replied that the young man didn't understand, to which the young man retorted confidently, "I don't understand? I graduated with a master's degree in communications engineering. You think I don't understand?"
Trying to pull some tricks, they kicked a hornet's nest.
This is how a master hacker obtains a real IP address so they can come and catch you. Botnets are useful, it all depends on how you use them. If used well, they can indeed provide cover and allow you to escape unscathed.
While keeping an eye on Fujiwara Kazuo, Xing Baohua also kept a close eye on the one in Ottawa. If this person could immediately disconnect and move away, it would indeed be very difficult to find him again.
But this person was unaware that Xing Baohua had already installed a virus on his computer. Even if he moved, as long as he continued to use the computer, finding him would still be easy.
Computers are so expensive, I guess this person wouldn't be willing to throw them away.
An assistant standing nearby said to Xing Baohua, "Boss, we've found the server's IP address. It's in Japan, on a text-based forum."
He then handed his notebook to Xing Baohua. Xing Baohua copied down the forum address, planning to check the finished product later.
Looking at it from the backend, it's all code; you need to decode it to figure out what it is.
So, the Ottawa hacker broke into a Japanese forum and used the forum's server to help him complete his attack.
After some effort, based on the server logs, a bunch of compromised computer addresses were found. After breaching them, it was finally discovered that the real addresses matched those in Ottawa.
This serves as valid proof that Ottawa hackers not only infiltrated the food delivery server but also launched brute-force attacks on it.
After the cyberattack was blocked, everyone was able to catch their breath and rest for a while.
This internet speed is infuriating!
If the internet speed is fast, Xing Baohua can download the contents of the other party's hard drive quickly and know what's inside, so he can make targeted plans.
Time seemed to stand still, and everyone returned to calm.
Waiting, a lonely wait.
While Xing Baohua was resting at night, he was woken up by his assistant on duty, who said that the email monitoring system for Kazuo Fujiwara had triggered an alarm.
Xing Baohua quickly got up and came over to take a look.
Open the email; there's a string of addresses in the code—that's the email address.
Without saying a word, Xing Baohua sat down at his computer and connected to the server. Using a virus he had previously left behind, he hacked into the other party's computer and began monitoring their data commands in real time.
Xing Baohua saw Fujiwara Kazuo writing an email, so he handed the email address he had just copied to his assistant to check the email server.
Hack in and find the recipient's address.
The assistant recruits people; once hacked into the system, all they have to do is wait patiently. As long as the recipient opens and reads the email, they can see the reading data in the email backend.
The email was in English, and I understood the meaning, but I couldn't decipher it.
They used code names to disguise their messages. They must have agreed beforehand on what words and phrases would represent what meaning.
Goodness, it's just like a spy movie, so exciting!
"The boss has checked the emails and is analyzing the address," the assistant said.
Ottawa!
With a wave of his hand in the air, Xing Baohua knew that Fujiwara Kazuo and the Ottawa hackers must be connected.
Perhaps there should be one more, but this one has yet to be acted upon.
But it doesn't matter. As long as Kazuo Fujiwara or anyone from Ottawa dares to embezzle customer funds, Xing Baohua will take action to arrest them.
The ones in Ottawa are hard to catch, but Kazuo Fujiwara can't escape.
Once you get one of them to talk, they'll tell you the answers to many things you can't understand.
For example, why are there SoftBank agreements on the computer?
What exactly is their relationship with SoftBank?
According to the investigation in Japan, this guy has a clean record, and there are surplus or large sums of money entering his bank account.
Are all the funds overseas?
Perhaps, but Xing Baohua's capabilities are limited, and he is powerless to help with overseas accounts.
Now all we can do is wait. Fujiwara Kazuo has already set up the framework. It could be him or someone else using the fraudulent transactions. Whoever it is, as long as we track down the IP address, Xing Baohua will start making arrests, with Fujiwara Kazuo being the first to be arrested.
The others can only try to find someone.
The Ottawa hacker read the email but did not reply. Then, Xing Baohua noticed that Fujiwara Kazuo's computer was switched off.
The machine is off, so he can't operate it. More waiting!
You really can't play this without patience.
The next day, around 9 a.m., the firewall of the food delivery server went off, indicating that someone had broken in again.
Meanwhile, the backend displayed multiple notifications of users exceeding their recharge limits, and the number of logged-in customers online also gradually increased.
While staring at the computer screen, Xing Baohua called Zhao Shanhai, saying he needed to do some dirty work.
Give him all of Kazuo Fujiwara's information, with only one request: find out his relationship with SoftBank, where the money stolen from the food delivery company went, who the organizer was, and who the members were.
After giving the instructions, Xing Baohua began directing the investigation into the IP addresses of these accounts that were misusing customer information.
The results showed that the other party used a switch and several routers, with the routers connected to a splitter. The splitter had 16 ports, each port supporting one machine, which meant one main IP address, and then assigning sub-IP addresses for login.
A few people can control fifty or sixty machines.
This chapter is not finished, please click the next page to continue reading!
Continue read on readnovelmtl.com