Chapter 294 What on earth are you doing?
Chapter 294 What on earth are you doing?
In fact, compared to being implanted with a bot program, Mai Liyang thinks this is more likely to be a contagious virus.
After all, the purpose of implanting a bot program is to mine, but how can you mine if you are discovered directly? So this kind of program is usually more hidden, allowing people to contribute computing power and pay electricity bills to others without knowing it.
”Why is your computer fine?”
”Mine is the Xuanyuan system. I guess this virus can only run on the win system?”
While talking to his roommate, Mai Liyang started to check online.
Soon he found out that what they encountered was not an isolated case.
Just within an hour, a large number of netizens reported online that their own or their friends’ devices had serious freezes.
Some people even began to question why this problem occurred on win and Android devices just after the Xuanyuan system was released?
This question was immediately echoed by a group of conspiracy theorists.
There were more and more comments like “ugly” and “unscrupulous”, and some people even left messages on the official websites and microblogs of Xuanyuan Technology, Dahan Core Industry, Huawei, Xiaomi and other companies, directly questioning whether they did it.
However, at this moment, these companies have no time to respond to netizens.
In fact, there is nothing to respond to. The more you explain this kind of thing, the darker it gets. It is better to ignore it directly. —— ”Damn it, how can there be such a strong defense system?!”
After more than two hours of fierce attack and defense, Gnaji and others could not find even a trace of cracks in the Xuanyuan system.
It felt like they were facing a flawless shell.
Although there were ports extending from the shell, these specially reserved ports were encrypted layer by layer. If they attacked such ports by force, it would be like hitting a rock with an egg. It would require a lot of computing power and energy. Unless the computing power was overwhelming, it would be impossible to capture it.
And such a big offensive and defensive battle also increased the possibility of exposing their real IP.
While this made them feel outrageous and desperate, they couldn’t help but think that they would stop here today, look back to summarize their experience, sort out their ideas and come back next time.
”Found it!”
Just when they were all frustrated by this setback they had never encountered before, Detlov suddenly said with some surprise: ”There is a small loophole in the user interface Process Components module!”
This discovery immediately excited the hacker group.
Finding a loophole is like finding a hole in the city wall in a city attack and defense battle.
The next step is to throw things into it crazily, attack the structure indiscriminately, paralyze the defense and then drive straight in to take over the control of the system.
”Focus on the server directly!”
With Detlev’s order, they quickly began to throw various destructive virus programs into it.
As long as their server can be paralyzed, the remaining user terminals are lambs to be slaughtered. The server terminal permissions can be used to quickly and easily paralyze the entire user group.
”I said, there is no airtight wall in the world, how can there be a system without loopholes!”
”Haha, I’m already imagining their panicked expressions now!”
The crazy offensive rhythm made their blood boil. They haven’t carried out such an exciting and challenging task for a long time.
“I have to admit that the system they made this time is indeed much better than before, and it can even be called perfect!”
”I can’t wait to see their kernel code!”
”…”—— Xuanyuan Technology.
Unfortunately, the panic scene imagined by Genaji did not appear here.
Because this vulnerability in the Process Components module is one of the vulnerabilities they deliberately created when they castrated the Xuanyuan system.
It’s better to say it’s a trap than a vulnerability. After entering through this vulnerability, they faced another ‘inner city’. The virus was thrown in here, but it still couldn’t mobilize any system resources. They could only continue to scan the vulnerability with the scanner and then enter the next inner layer.
Like a bottomless pit, they will never find the real way.
NoWith each additional shell, the system’s computing power load will increase, until the computing power is full, the system will automatically restart.
Although automatic restart is definitely much better than being paralyzed and controlled, it is of course best not to reach this point.
”How much computing power does the server use now?”
”Less than 10%, they can withstand it even if they attack for several days in a row.”
Feng Mingsheng nodded: “That can’t be delayed too long. The greater the computing power, the longer it will affect ordinary users, which is not what we want to see.”
After speaking, he turned his head and looked at a cyber policeman in police uniform standing next to him and said: “Is your side not ready yet?”
”It should be soon.”
…
On the other side, after discovering that the attack had not responded for a long time, Gejina and others finally realized that there must be a firewall in the vulnerability, so they immediately changed their strategy and began to send various scanners into it.
As time passed, Jeremy finally realized that something seemed a little wrong.
Although they have been under the enemy’s siege, the intensity of the siege seems to be intentionally controlled at a critical point…
”Strange, so much time has passed, and they should have enough time to mobilize their forces to stop us…”
Jeremy’s words immediately woke up the people who were already bloodthirsty.
They subconsciously looked at the time and found that more than three hours had passed without them noticing. Even if they were caught off guard, they should have reacted completely, right? ”It’s broken, they are fishing! Turn off the computer quickly!”
However, when they were about to end the battle by force, they suddenly found that, except for the program they just used, the entire server was completely out of their control.
At the same time, a bell suddenly rang.
“What the hell are you doing?! Stop what you’re doing and shut down the server! Fuck… It’s over, it’s too late! Fuck you!”
Before Genaghi could react, Nadella on the other end of the phone hung up.
Genaghi, who came to his senses, shouted: “Turn off the power!”
Before he finished speaking, Jeremy, who was the first to realize the seriousness of the problem, had already turned off the power, and the whole office suddenly fell into darkness.
After a while, someone turned on the light of his mobile phone and asked in a confused face: “What happened?”
”…”
Genaghi was silent for a moment, and then said bitterly: “If I’m not mistaken, you will receive a call soon…”
Sure enough, as soon as he finished speaking, Jeremy and Detlov’s mobile phones also rang urgently.
Then they were greeted by a stormy roar.
In order to cooperate with the operation, Microsoft, Google and Apple all gave this server certain permissions, allowing them to call on the computing power of the main server to complete the control of the massive number of bots.
But who could have thought that the other party had already controlled this server along the network cable without anyone noticing, and also used the permissions of this server to reversely implant unknown powerful viruses into the main servers of each company without any effort!
Underestimating the enemy, being careless, and fighting too long…
These three fatal mistakes ultimately caused their attack to cause a disaster!
(End of this chapter)