In fact, compared to being implanted with a broiler program, Mai Liyang thinks this is more likely to be a contagious virus.

After all, the purpose of implanting the broiler program is to mine, but how can it be mined if it is directly discovered?

Therefore, this kind of program is usually relatively hidden, allowing people to contribute computing power and pay electricity bills to others without knowing it.

"Why is your computer okay?"

"My system is Xuanyuan system. I guess this virus can only run on win system, right?"

While talking to his roommate, Mai Liyang began to search online.

He soon discovered that what they encountered was not an exception.

In just the past hour, a large number of netizens reported online that their own devices or those of their friends were experiencing serious lags.

Some people even began to question why Win and Android devices had such problems just after the Xuanyuan system was released?

This question was immediately echoed by a group of conspiracy theory netizens.

Comments such as "eating looks ugly" and "doing whatever it takes" began to appear more and more often.

Some people even went to the official WeChat accounts of Xuanyuan Technology, Dahan Core, Warwick, Xiaomi and other companies to leave messages, directly questioning whether they were responsible for this.

But at this moment, these companies have no time to respond to netizens.

In fact, there is nothing to respond to. The more you explain this kind of thing, the darker it becomes. It is better to just ignore it.

——

"Hell, how can there be a system with such strong defense?!"

After more than two hours of fierce offensive and defensive battles, Gnaji and others were unable to find even a single crack in the Xuanyuan system.

It felt like what they were facing was a flawless body.

Although there are ports extending from the body, these specially reserved ports are encrypted layer by layer.

If you attack such a port by force, it is equivalent to hitting an egg with a stone. It requires a lot of computing power and energy. Unless the computing power is crushed, it will be impossible to capture it.

Moreover, engaging in such a high-profile offensive and defensive battle also increases the possibility of exposing their true IP.

While this made them feel outrageous and desperate, they also couldn't help but have the idea of ​​stopping here for today, looking back to sum up their experience, clarify their thinking, and come back next time.

"found it!"

Just when they were all looking frustrated at this unprecedented setback, Detlef suddenly said with some surprise:

"There is a small vulnerability in the Process Components module of the user interface!"

This discovery immediately excited the hacker team.

Finding a loophole is like finding a hole in the city wall during a city attack and defense battle.

The next step is to frantically throw things inside, carry out indiscriminate attacks on the structure inside, paralyze the defenses and then drive straight in to take over control of the system.

"Set fire on the server directly!"

Following Detlef's order, they quickly began to throw various destructive virus programs into it.

As long as their server can be paralyzed, the remaining user terminals are just lambs waiting to be slaughtered. The server terminal permissions can be used to quickly and easily paralyze the entire user group.

"Let me just say, there is no airtight wall in the world, how can there be a system without loopholes!"

"Haha, I'm already imagining their panic expressions now!"

The crazy attack rhythm made their blood boil. It had been a long time since they had carried out such an exciting and challenging mission.

"I have to admit that the system they made this time is indeed much better than the previous one. It can even be called perfect!"

"I can't wait to see their kernel code!"

"..."

——

Xuanyuan Technology.

Unfortunately, the panic scene that Gnagy and the others imagined did not appear here.

Because this loophole in the Process Components module was one of the loopholes they deliberately created when they castrated the Xuanyuan system.

It's better to say it's a loophole than a trap.

After entering through this vulnerability, they are faced with another "inner city". The virus is thrown here, but it still cannot mobilize any system resources. They can only continue to use the scanner to scan for vulnerabilities, and then enter the next inner layer.

Like a bottomless pit, they can never find the real way.

However, with each additional shell, the computing power load of the system will also increase. When the computing power is full, the system will automatically restart.

Although automatic restart is definitely much better than being controlled by paralysis, it is certainly best not to go to this point.

“How much computing power does the server use now?”

"It's less than 10%. They can withstand it even if they attack for several days in a row."

Feng Mingsheng nodded: "It can't be delayed too long. The greater the computing power, the longer it will affect ordinary users. This is not what we want to see."

After saying that, he turned to look at an Internet police officer in police uniform standing next to him and said, "Are you okay over there?"

"It should be soon."

On the other side, after discovering that there was no response to the attack for a long time, Gegina and others finally realized that there must be a firewall inside the vulnerability, so they immediately changed their strategy and started sending various scanners inside.

As time passed by, Jeremy finally realized that something seemed wrong.

Although they have been enduring the encirclement and suppression by the other party, the intensity of this encirclement and suppression seems to have been intentionally controlled at a certain critical point...

"It's strange. It's been so long. Logically speaking, they should have had enough time to mobilize their power to stop us..."

Jeremy's words immediately woke up everyone who was already red-eyed.

They glanced at the time subconsciously and realized that almost three hours had passed before they knew it. Even if they were caught off guard, they should have fully reacted, right?

"It's broken, they are fishing! Shut down the phone quickly!"

However, when they were about to end the battle forcibly, they suddenly discovered that at some point, except for the program they had just used, the entire server was completely out of their control.

At the same time, a bell suddenly rang.

"What are you doing?! Stop your behavior immediately and shut down the server! Fuck... it's over, it's too late! Fuck you!"

Before Gnaj realized what was going on, Nadella on the other end hung up the phone.

Gnaji, who came to his senses, quickly shouted: "Pull the switch quickly!"

Before he could finish his words, Jeremy, who was the first to realize the seriousness of the problem, had already pulled the switch, and the entire office suddenly fell into darkness.

After a while, someone turned on the light of their mobile phone and asked with a confused look: "What happened?"

"..."

Gnaji was silent for a moment, and then said with a somewhat bitter tone: "If I guess correctly, you will receive a call soon..."

Sure enough, as soon as he finished speaking, Jeremy and Detlef's cell phones also rang rapidly.

Then what greeted them was a roar like a storm.

In order to cooperate with the action, Microsoft, Google and Apple all gave this server certain permissions, allowing them to use the computing power of the total server to complete the control of massive broilers.

But who would have thought that the other party had already followed the network cable to control this server without anyone noticing, and also used the permissions of this server to effortlessly implant reverse implants into each main server. Unknown powerful virus!

Underestimating the enemy, being careless, loving war...

These three fatal mistakes ultimately led to a catastrophe in their attack!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like