Rebirth of the Super Banking System

Chapter 226 People Who Shouldn't Be Offended (Please Subscribe!)

Enter the command room.

Tang Qing has been frowning tightly, he doesn't know how things will develop today.

If the talk collapses, it will mean that he can no longer rely on this arbitrage method to make money in the future. This is his main source of income now, and if he loses it, he will definitely feel bad for him.

If the negotiation is very 'harmonious', the other party will acquiesce to his kind of transaction in the future, even if there is a limit on the amount, everyone will be happy.

but.

No matter what the final result is, he must show his strength to the other party, so that the other party will not dare to think again in the future, otherwise nothing will be achieved.

"Food" is not qualified to negotiate conditions, they can't even decide life and death.

"Tang Yi, take down this website, the address is..." Tang Qing, who had decided, said an address and a redirect method.

"Yes, Commander." Tang Yi replied, turning around and uploading the task to Xiao Er, and then dismantling it and distributing it.

Although Tang Yi also understands, he is not a technician, but a commander. This kind of thing only needs to talk about it. Xiao Er formulates and dismantles and distributes tasks according to the process. Tang Yi is responsible for supervising whether the tasks are reasonable and complete. The rest is left to those intelligence analysts to do themselves. Otherwise, he can't be busy by himself.

I used to use a special anonymous browser to surf the Internet outside, but I don’t need it from the command room. Not to mention that no one can find the address, even if it is placed outside, with the strength of these analysts who are proficient in binary computers, It's also not easy to track down their addresses.

After receiving the task.

Dozens of intelligence analysts immediately turned into computer experts and jointly invaded the website. It sounds great, but it is actually very simple.

In order to make it easier to have "friendly" access to the outside world in the future, some analysts have studied Microsoft's systems and major development languages ​​early on, constantly testing and discovering new and useful loopholes.

Otherwise, how did you "share" the data and information of several national police stations and various agencies? The vulnerabilities they have found so far are as varied as hundreds.

And that's where these vulnerabilities come in handy. But since it wasn't certain which vulnerabilities would come in handy, one analyst tested several.

Because they are usually too well prepared, coupled with these people's "natural" talent for processing this kind of information.

In just three minutes, some analysts gained administrator privileges on the website server, and then. . . A larger-scale intrusion has begun, not only the network server, but also the computers and various communication equipment over there, such as routers, switches and other networked equipment.

After control, all the information that can be found is extracted.

. . . . . .

Africa.

In that huge basement.

A bunch of people huddled together.

The person in charge of the organization here and the supervisor watched beside Jack, waiting for his good news.

They knew that Tang Qing's transaction time was concentrated at this point, so when the first transfer order of 60 million euros was issued, the bank intercepted the money.

They were just waiting for the anxious Tang Qing to contact them, and then tracked Tang Qing's location to see if they could confirm the other party's information. In Jack's view, this kind of thing is very simple.

They also considered that if Tang Qing did not want the 60 million euros to 'run away', this situation is not impossible. After all, a huge amount of nearly 20 billion US dollars was transferred in such a short period of time, and the 60 million euros were transferred. It's not too surprising that it's a waste of time.

Of course, they were still taking chances, betting that Tang Qing cared about the money and would contact them. If they really didn't care, they would have nothing to lose, and they could get so much money in vain.

They are also not afraid that someone will dare to come and trouble them. There are shadows of major banks behind them. It is not an exaggeration to say that they are doing dirty work for them. With the escort of this group of people, the US government may not be able to move them. .

But everyone's face is still decent, you can't hang around under people's noses all the time, or they won't come to this kind of place.

Just as the group happily waited for the fish to take the bait.

Jack, who had been staring at the computer screen, suddenly sat up straight and shouted, "OH, MY GOD."

His face was full of surprise, as if he had seen a ghost.

"What's wrong with Jack, have you found the other party's position?" The supervisor stepped forward and said happily.

"Boss, we are finished." Jack said with a wry smile on his face. At the same time, he put away his hands on the keyboard and leaned back on the chair a little weakly.

"What do you mean, which bank is the other party?" the supervisor asked curiously. Anyway, he couldn't understand what was on the six screens just installed in front of Jack's eyes.

He thought he had tracked down which bank account he had traced, but he wasn't afraid. He apologized if he misunderstood, and at the same time secretly scolded the messenger for being meddlesome.

But Jack's next sentence made him suddenly fall into an ice cellar. "Boss, I mean, our server here has been compromised." Jack said with an ugly face.

"What, it's been captured, how is this possible, we have all kinds of security software installed here, how can we be captured, it's only a few minutes, even if the world's number one hacker team comes, it's useless, right? The alarm didn't sound. ." The supervisor disbelieved.

This news is too scary for Nima. He doesn't believe it at all. Over the years, they have suffered countless cyber attacks, but no one can get in. They have spent a lot of money to hire a lot of companies, experts and even hacker teams to improve their system. defense system. Much more powerful than those firewalls on the market.

"Boss, that's right, I wrote an inconspicuous little software and put it in the code of the server and computer. It's useless. The main purpose is to count the number and status of users with various permissions. Now all the servers and the routers and switches here, The computer has already added a new super user, remember it is a new addition, there can only be one super user for those devices, and he can forcibly add another one, this is not scientific at all," Jack explained slowly. Although he didn't want to believe it, such a completely illogical thing just happened.

As soon as the supervisor heard that the matter was serious, he quickly said: "That's for people to cut off the network immediately."

Jack shook his head with a wry smile and said, "It's useless, it's too late. With the internet speed here, all customer data in the database will be copied in just one minute, and it's useless if you break it."

"Then what should I do?" The supervisor had no choice. It took more than a minute to reach the well-protected computer room for a minute.

Jack spread his hands and said helplessly: "Please inform the above about this situation, we can't handle it, and now I guess I don't have permission to do any useful operations. Look, all our super user accounts have been deleted. Other low-level permissions All accounts are gone, boss, we may have provoked the wrong person."

ps: Mobile phone code words, thinking and logic are not used, please forgive me if you feel bad.

Chapter 227/2406
9.43%
Rebirth of the Super Banking SystemCh.227/2406 [9.43%]