Hk946 The Worm Spreads, and the Big Penguin Is Shot!
Worm is a very evil computer virus, which spreads indiscriminately in the Internet, causing immeasurable losses. The clever worm will continue to mutate.
Because worms mutate, the "love bug" and "cover letter" that appeared in the Internet world six or seven years ago are still active in the Internet world. Even in 2013, these two stubborn worms are still active in the Internet world and play their role.
Annan Star, the second-generation hacker organization in Nanyue Kingdom, and its leader, Da Pineapple, is a worm expert!
In a quiet and secret room in Nanyue Kingdom, Big Pineapple copied the killer from the USB flash drive. That is the worm that Big Pineapple spent more than two years preparing carefully.
This worm, named by Big Pineapple: 'blo', has a very high contagiousness, and has a very intelligent mutation method, unless Big Pineapple disarms the core defense of the worm and requires the worm to delete itself. Otherwise, it is difficult for external forces to remove the blo worm virus that spreads in the Internet.
The pronunciation of the word 'blo' is somewhat similar to 'big pineapple'. It is a very popular game. Big pineapple chose to name it that way, not only because of the similar transliteration, but also because he also likes the game blo.
The wretched uncle of the worm expert, Big Pineapple, with glass glasses as thick as beer lids, stared at the monitor of the laptop, and he showed a wretched smile.
"Xia Guo. Hacker Union, you are ready to taste my power!" Big Pineapple's voice. With a gloomy look, "Although our Nanyue country's hacker world is not as powerful as your Xia country, our Nanyue country should not be underestimated."[
Regarding the information of the Northern Combat Command of the South Vietnam Country, it was revealed that it was going to occupy Airen Island in Xiaguo and destroy the Philippine country's No. 90 warship on Airen Island. It is not that Big Pineapple could not have guessed, it was hackers. The relationship between South Vietnam and the Philippines is not bad. Both countries have the same boss.
Lover's Island was occupied by the Philippines, not because of how good Lover's Island is or how rich in product resources, but because of the demands of the country's boss.
If there is no big brother of Li Jian country behind his back, Nanyue country and the country of the Philippines would not dare to confront the big brother of Xia country!
It's just that things have come to this level, does the truth still matter?
The hacker circles of Xia, the Philippines, and Nanyue have been at war. The truth has become unimportant, what matters is the confrontation of strength. The big fist is the uncle, and the winner is the winner! As for the losers, there is no right to say any reason and excuse!
History, written by the victors!
Big Pineapple is on the laptop, putting the final touches on the blo worm. Including the attack target, attack method and so on. The attack target screening mode of the blo worm adopts a dual-mode judgment. The first way to judge is that the blo virus will first judge the local p address of the infected computer, so as to judge the corresponding country of the user according to the p address.
If it is the p address in the Xiaguo area. Worms can break out, destroying computer system files. It will also destroy the user's data information. The basic purpose of the blo worm virus is to destroy the user's entire computer system and completely repair it.
In addition to judging the country by the p address, the second way of judging the blo worm refers to the 'red 'color' code' worm. When the computer is infected with the blo worm, the blo worm will automatically determine the computer's system default language.
If the default language of the computer system is simplified Xia Guoyu and traditional Xia Guoyu, then the blo worm virus will quickly infect the computer, wait for the user to trigger the virus, and wait for the opportunity to completely destroy the computer.
Big Pineapple, the leader of the Star of Annan, suspended his right hand above the enter key of the laptop keyboard. Once he pressed it, the blo worm virus would automatically enter the Internet, and enter the Internet area of Xia Guo according to the predetermined address.
The source of transmission chosen by Big Pineapple is very clever. The first transmission channel, he mounted the blo worm virus in the user system of Big Penguin, the famous instant messaging software of Xia Guo. Big Penguin's defense is very strong, but no matter how big Penguin is, it is impossible to protect the safety of every user, right?
Big Pineapple did not invade the official server of Big Penguin. It just applied to become a user of Big Penguin, and then applied to join some groups created by users themselves, and then spread the blo worm into the space of the Penguin group.
The blo worm will autonomously spread within the penguin group, and infect the computers of each group member through the association of the group members of the penguin group. Then use the computers of these group members to infect other group spaces corresponding to each group member, as well as the friends of each group member. Then, based on the friends of each group member, infect the friends of the friends. In such a reciprocating cycle, with the help of the huge user group of Big Penguin, the blo worm virus will spread to most of the Xia Kingdom in a very fast time. Internet.
To be on the safe side, Big Pineapple has also added other means of dissemination, that is, disguised as software that netizens are interested in, to trick netizens into downloading the blo worm program. [
Big Pineapple disguised the blo worm virus software as 'peeping' software, deceiving users to use this software to activate the camera of Penguin software friends, so as to peep at each other.
This kind of software did still exist in 2007. Some brainless people who didn't know the truth easily fell into the trap of the big pineapple, or were killed by the ** in their hearts. The voyeur software is actually the blo worm.
Once the blo worm virus is installed, in an attempt to spy on the penguin friends through the blo worm virus, the blo worm virus will take the opportunity to infect the penguin friends. Thus, just like the first infection method, other computer devices can be quickly infected by the Penguin software.
The blo worm mainly relies on Penguin software to spread. But it does not mean that the blo worm virus can only rely on Penguin software to spread. The blo worm can also rely on e-mail, as well as some social networks to spread.
For example, any blog, online chat room, or forum, etc., can become the transmission channel of the blo worm. A computer user infected with the blo worm, browses any blog, and replies. Then the blo worm virus will follow the user to enter the blog and stay in the blog.
Other computer users who are not infected with the blo worm virus will be attacked by the blo worm virus if they also browse blogs infected with the blo worm virus.
With the help of various methods, the blo worm developed by Big Pineapple will be around for a few hours. Infect a lot of computer users, resulting in very serious consequences.
June 3, close to the early morning.
Xia Kingdom, Nanyue Kingdom, and the Philippines, the hacker circles of the three countries have almost reached a tie, mainly the Xia Kingdom hacker circle, which needs to face the South Vietnam and the Philippines at the same time. The hacker community of the two countries, and in it, the power of the cybersecurity departments of the two countries is also mixed.
The leader of the second-generation South Vietnamese hacker organization Annan Star, the worm blo created by Big Pineapple, after more than two hours of continuous spread, has infected more than 10 million computer devices.
This is a very exaggerated figure. In less than three hours, more than 10 million computer devices have been infected. Once these millions of computer devices. After being hit by a devastating "sex", how serious the consequences will be?
Maybe ordinary people don't care about the loss of data. However, for enterprise users or "government" users, the importance of data far exceeds the value of computer hardware itself.
Jingya Garden.
Shi Lei didn't care about the hacking war in the Internet, he was paying attention to the flight trajectories of the five steel ships. The five steel ships carry five pieces of n235 metal, and a powerful plastic fryer is installed on each steel ship. If something unexpected happened to the steel ship, which caused Fa to arrive in Shuangqing City on time and accurately, the plastic bombs would be enough to blow the steel ship into slag, thereby annihilating the information about the n235 metal.
"Yizure, five steel ships, how long do you expect to arrive in Shuangqing City?" Shi Lei asked Yizuer again. This question has been asked many times by Shi Lei.
Izual calculated all the specific times. "Sr, Steel One, will arrive in four hours; Steel Two, expected to land in four hours and seventeen; Steel Three to Steel Five, about four hours thirty-two to four hours thirty Returning at about nine minutes."
The five steel ships took different flight routes, so the arrival times were different. If there is any accident in the middle, Izull will temporarily change the flight direction.
"Sr, on the Internet, an unknown worm has been retrieved, do you want to capture it?" Izuer reminded Shi Lei, interrupting Shi Lei to continue to ask about the steel number and the n235 metal.
"Oh?" Shi Lei was a little surprised, "Is the unknown worm a variant? Izul, capture the unknown worm and put it in a sandbox environment for research!"
"Yes, sr!" Izuer responded to Shi Lei.
After a while, Izuer successfully captured the unknown worm virus, that is, the blo worm virus released by the big pineapple. According to Shi Lei's instructions, Izuer put the blo worm into the sandbox environment and conducted an exhaustive analysis of infection in various situations.
Izull adjusted the mode of the sandbox environment, let the blo worm enter the sandbox environment, and checked the destructiveness of the blo worm.
After more than ten minutes of analysis, Yizuer gave Shi Lei the answer, "sr, the core signature code of an unknown worm has been extracted. This worm will infect the computer system, destroy the data stored in the computer, and forcefully modify the data drive of the computer's hard disk. , has reached the trace of destroying the hard disk. The system has automatically adjusted the defense mode, wn secret network users, and the Brave World City auxiliary server cluster will all be immune to this unknown worm virus.”
"Yizul, track how many such unknown worm infection origins exist on the Internet, and track them according to the core signature!" Shi Lei gave the order again.
(To be continued. If you like this work, you are welcome to come to the starting point to vote and monthly pass. Your support is my biggest motivation. Mobile users, please go to m to read.)
ps: Brother Ma: Do you dare not to black me?
〖∷Update fast∷∷Plain text∷〗