Cyber Heroes

Chapter 363 Investigation

In the afternoon of the next day, Xiangshan found someone from the Internet Security Network.

"You want to talk to those hackers?" The person in charge of this part of the security department is a Frenchman. He scratched his slightly greasy curly hair and said, "This is not good, Director Xiang. After all, we are still within the Rama project park. If the other party gets to the bottom of it, there will be big trouble."

Xiang Shan said: "Really not possible?"

"'Zhu Rong' is there, and maybe other top hackers are also there. The person who set up this website is probably the top black hat, maybe he is 'Zhu Rong' himself." The person in charge said: "There are all top hackers over there. I Not recommended to take risks.”

Xiang Shan said: "I'm sorry, please think of a way. This is a work requirement."

As Xiang Shan spoke, he took out a copy of the meeting minutes: "I communicated with other people in the research department in the morning. We all agreed that the ideas being discussed by these hackers are very valuable. I have arranged A group to verify several key points they raised. I think it is necessary to join this discussion."

"This..." The person in charge took the record and hesitated for a moment.

Xiangshan said: "This is also to crack the 'Orunmila Project' faster. Although the 'Orunmila Project' may not be as important as the 'Obatala Project', it is an important step for us humans to understand the 'Ogun' A shortcut for the maker.”

The person in charge sighed: "I understand. Today, members of the network security department have a meeting with members of the 'Hanuman Project'. We may temporarily fall under your command. At the meeting, I will list your opinions." To discuss matters, work with others to discuss their feasibility. But please note that there must be no unnecessary exchange of information with the 'risk' community until we have the results."

Xiang Shan nodded.

That hacker community brings together the most elite "guerrillas" and the most destructive criminals of this era. Especially the special place called Rama Project. The "intelligence" here itself has the potential to impact the existing order of society.

Whether you upload data to the website from here or download data from the website, there are risks.

In the former case, it is possible to expose your own location and identity, or alert hackers.

In the latter case, it is possible for some dangerous code to sneak into the park.

The people in these security departments are indeed regular soldiers, the country's elite. However, at most they can only guarantee that "the enemy can be destroyed afterwards", but they cannot guarantee that "the intelligence will not be leaked."

Xiangshan nodded and said: "Please. In addition, I hope to temporarily join the work of your department."

The person in charge showed a confused look: "You? This..."

"I'm also a programmer. Although I'm better at hardware and low-level things, it's okay to understand your discussion, right?" Xiang Shan said.

The person in charge muttered. I don't know if he thinks Director Xiang is trying to improve his qualifications, or if he thinks he is overestimating his abilities.

But now Xiangshan is one of the biggest officials in the park. The rest of the people are also on the same level as him. This seemingly ridiculous request was actually met.

After all, in the first phase of the "Orunmila Project", the director had proven his ability as a scientist.

Just as Jing Hongtu expected. Even if Xiangshan has some non-compliant operations, he can be easily forgiven - as long as the purpose of these operations is directed to "the project he is researching", then everyone will easily forgive him.

After all, he is a crazy scientist.

This is indeed a good character.

Xiangshan sat in the conference room of the network security personnel, took out the recording pen openly, and recorded the progress of this time there.

To be honest, the current progress of the "Hanuman Project" is really not very good.

The "Risk" community is a completely anonymous online community. Its structure is very simple, with almost no "unnecessary data" stored, and almost no measures other than account passwords to protect user accounts.

At the same time, this community also uses distributed virtual servers, and even the application framework is written by a powerful hacker individual or group. This website is not an ordinary small website that relies on a server in a small country.

When a user accesses this fixed domain name, it will be temporarily assigned by the algorithm. From a bunch of volunteer proxy servers, three available ones will be randomly selected to form a temporary data link, allowing the user to ping a currently available server IP.

But the triple springboard is only the first step. For general illegal network activities, the triple springboard is enough, but these hackers obviously will not be satisfied with what has been compromised by law enforcement agencies.

It can be understood this way. The "ontology" of the "risk" community exists in many different servers, each of which is independent of each other. At the same time, each part backs up each other. No matter which part is destroyed, it can be backed up again, making it difficult to eradicate. The servers where these "ontologies" are located may even be located in several completely different countries.

These "ontologies", or website source codes, will even continue to transfer themselves to other servers.

The occupied parts of all servers put together are the "complete virtual server" where this online community is located.

This community is like a swarm of amoeba that exists on the Internet. It will constantly shift, split, and deform. The swarm of amoebas are still hidden in the turbid water, making it difficult to see them. As long as some of these amoeba are missing, they will grow again.

"Taking down" this website is a very difficult thing in itself.

Every time you connect to Xiangshan, there is a huge risk.

However, there is something better about Xiangshan. What they represent is a union of the most powerful political entities on the planet.

The entrance and exit of the "Internet" itself is managed by this consortium or its members.

On this basis, the network security personnel of Project Rama can use resources unimaginable by ordinary black hats to disguise themselves.

In addition, they can also use huge resources to dig out everyone who connects to this website.

For example, they can send some of their own servers, mix them into those servers that are "jump nodes", and then use DDOS attacks to destroy most of the jump nodes that are not under their control. No matter how many chickens a hacker organization controls, it will never exceed the resources these people have.

For another example, they can use certain forensic or statistical techniques to dig out the real-world identities of most of the hackers on this website. This is what their violent organs are better at.

If a single country wants to take down a hacker nest, there may be certain political restrictions.

But the consortium behind Project Rama has no concerns.

The swarm of amoeba hides in the turbid water, but in the worst case scenario, this violent entity can even evaporate the entire pond.

It's just that it's not that time yet.

Hackers never imagined that they would encounter such a level of attack.

Soon, after a long discussion, the people from the network security department found some solutions.

Of course, this is just an episode.

Their current focus is still looking for "points of information leakage."

They are looking for files that may be viruses on all devices across the campus.

They still don't know where the virus came from.

The only thing that is certain is that the "infection" occurred within the campus.

"Zhu Rong" is not a hacker who likes to spread Trojans. According to intelligence, all previous actions of "Zhurong" were targeted. He will attack large technology companies, especially companies that attempt to build some kind of technical barriers and technological hegemony. He will try his best to dig out the undisclosed technology controlled by those companies.

In some cases, he would accomplish this by hacking into researchers working at those companies. But most of its methods are to first manipulate the servers of those technology companies, and then infect the personal devices of those researchers through the servers of those technology companies.

There are no records of ordinary people being infected by the virus written by "Zhu Rong" unintentionally.

So the infection must have occurred when some scholars were communicating with that translation software company.

Other technicians have already gone to that company pretending to be police officers - their police certificates are all real gold, and they even have extremely real resumes.

But the biggest problem is that Ingrid is really just a name in that company. She has not been involved in the work of that company in the past year.

Ingrid's device could not have been the first contact with the virus.

She contracted the drug in the park.

This is very scary. No one knows when the electronic virus infection occurred or how many people were infected. It’s even hard to know how many people have this thing on their devices.

The entire park may have been penetrated like a sieve.

If "Zhu Rong" hadn't posted "Sita" on the Internet without knowing what was going on, and happened to be noticed by the network security personnel of the "Rama Project", I'm afraid "Zhu Rong" would have been able to scoop up the intelligence here.

This is why the United States is eager to send its top experts over.

However, the original network security department of the Rama Project was not really just doing nothing. At least they built a high wall to physically isolate the information from further loss.

Now, they are desperately searching for possible virus samples. They hope to do something to save their reputation before "Agni" arrives

But the level gap is still there.

Early on the third day, there was still no sign of resolution.

A military vehicle also set off from the airport and headed to the park.

Xiangshan and several other persons in charge were waiting in the reception area.

Soon, a small group of United States soldiers appeared.

They saluted Xiangshan: "Gentlemen, the 'goods' have arrived."

Sorry, this chapter is difficult to write.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like