Revisiting Future Path

Chapter 256: Bitcoin Ransomware

256th Bitcoin Ransomware

The era of no privacy has actually arrived.

From 2002 to 2010, the computer intelligent life monitoring system quietly deployed the global Internet. Wherever there is the Internet, it cannot escape the monitoring of the computer intelligent life latent system.

Even if it is physically isolated without a network cable, it cannot withstand the monitoring of computer intelligent life. Even, in order to make up for the shortcomings of the physically isolated LAN, the priority optimization of the computer intelligent life monitoring system is the ability to attack the physically isolated network.

Generally speaking, physical isolation of the network is not absolute isolation. Local area networks with higher security levels often use intermediaries such as U disks to interact with the Internet. With the interaction at the physical level, the bridge between the Internet and the local area network can be built for the intelligent life of the computer.

The most terrifying aspect of computer intelligent life is not its ability, but its unlimited self-reproduction.

Computer intelligent life is one and ten thousand.

Computer intelligent life first latently infects a computer A connected to the Internet. When computer A inserts a USB flash drive, it will split itself and hide on the USB flash drive; when the USB flash drive is inserted into computer B, it continues to split itself and infect computer B; the USB flash drive is inserted into computer C , It continues to divide itself and infect computer C. If computer C is a computer in a local area network with a higher security level, the computer intelligent life monitoring system will quickly infect all other computers in the local area network. Although the physical isolation mechanism prevents the local area network information from being uploaded to the computer intelligent life supercomputer headquarters in time, as long as there is a USB flash drive between the local area network and the Internet, the USB flash drive will become the intermediary of the computer intelligent life monitoring and physically isolated LAN system. An information update.

This is how the Hawaiian Oahu Cipher Center Branch was easily compromised by the computer intelligent life monitoring system.

Any local area network that has been plugged into an infected USB flash drive, and any physical connection to an infected LAN computer is already a puppet of the computer's intelligent life monitoring system.

In Wei Dongsheng's eyes, the Internet has no secrets.

In Wei Dongsheng's eyes, the Internet has no privacy.

The more life depends on the Internet, the less privacy it has.

When Andrew started typing on the keyboard, he instantly turned into a little lamb stripped naked in Wei Dongsheng's eyes. There is no secret at all. When not connected to the Internet, the latent system secretly monitors the operation records and uses limited intelligence to interfere with Andrew's judgment; when connected to the Internet, Andrew is always under the real-time monitoring of computer intelligent life.

For example, when Andrew uses Google to search, the computer intelligence life directly hijacks the Google feedback page, disguising the page Wei Dongsheng wants to show to Andrew as the result of a Google search; when Andrew views the picture, the computer intelligence life slightly changes the order of the pictures, and when Andrew clicks the next page Suddenly found that the picture became what Wei Dongsheng wanted to show him.

Wei Dongsheng didn't care what Andrew thought specifically, and all his energy was used to interfere with Andrew's ears and eyes.

Why is Andrew more aware of the Patriot missile incident that just happened than other colleagues in the department? This is not accidental, but because Wei Dongsheng ordered the computer intelligent life to tamper with the commentary area of ​​the novel, and the vest method deliberately set off disputes about the Patriot missile incident. Andrew may not be able to stand in China’s position against the United States’ sale of Patriot missiles to Gulf Island, but he can know this and keep it in his heart, and understand why the Chinese people hate the United States’ sale of Patriot missiles to Gulf Island.

Why does Andrew subconsciously oppose the sloppy qualitative hacker organization from China? This is also because Wei Dongsheng ordered computer intelligent life to occasionally create coincidences that caused Andrew to browse the Internet and "mistakenly" break into a dark forum that promotes human rights, opposes surveillance, and opposes war, and detailed information accuses the U.S. government. After verifying that these data are true, Andrew gradually began to reshape the Three Views, doubting whether his work was protecting the American people or hurting the American people. In the past year, Andrew's eyes and ears are all negative energy, and his heart has become increasingly disgusting with the bad American bureaucracy. When he personally met the department boss who simply and rudely identified the intruder as a Chinese hacker without any evidence, Andrew was already out of anger.

Not angry with the department boss, but angry with the hopeless political ecology of the Hawaiian Oahu Crypto Center branch.

However, Andrew lacked the courage to resist.

Andrew wanted to escape, looking for a paradise that was not dirty.

At this time, Wei Dongsheng ordered the computer intelligent life to guide Andrew "accidentally" thinking of his friend Edward Snowden, thinking of working in Japan.

Andrew has already applied. However, the approval process takes time. Before dispatching to Japan, Andrew still has to take charge of his business seriously. In other words, after the invasion, Andrew's authority was greatly reduced and he was not allowed to contact suspicious spy information. Andrew's current task is changed to big data analysis to analyze users of Chunqiu Search (US), and screen out suspected spies, alien ideologies, inappropriate speakers, etc.

This task is not important, it is purely tedious.

Andrew also disagrees with the indiscriminate monitoring of all Chinese and overseas students and Chinese users, and he has a somewhat coping attitude towards this task.

at this time……

Just hearing a ding-dong sound, the screen suddenly forced a red interface: "Ouch, your files have been encrypted."

"What's wrong with my computer?"

"Some of your important files, including but not limited to photos, pictures, documents, compressed packages, audios, videos, etc., have been encrypted and saved by me, so they cannot be opened normally. This is essentially different from general file damage. It has not been The destruction was only encrypted and saved by me. You can try to find a way to recover the files on the Internet. I can guarantee that if there is no decryption service for me, even if **** is resurrected, he will be helpless."

"Can these files be restored?"

"Of course you can. Please click the decrypt button, and you can restore some files randomly for free to prove my personality. If you want to restore all the files, please pay us 365 bitcoins within 7 days, otherwise we will No longer provide you with recovery services. Of course, we at DPI know that the world is poor and rich, rich and rich, the rich have countless mansions, but the poor have no room to live in. If you are a poor person who is worried about food, clothing, housing and transportation, and half a year If there is still no payment after time, we will have activities to restore your files for free. However, the free activities are randomly selected, and I hope you have good luck."

"How to pay for it?"

"We only accept Bitcoin. For those who don't understand Bitcoin, please click here for details; for those who don't know how to buy Bitcoin, please click here for the purchase method."

"Finally sincere advice: For unnecessary trouble, please do not close or delete this software until all documents are completely restored. The unlock password of each computer is unique. If you delete the original file, we will also lose it for you. Improve the ability to restore services."

The red interface, the right side is the description of the red letters on the black background; the upper left is a red background and white lock pattern logo, the lower left is two countdown squares: the upper square is a seven-day countdown, the countdown ends, the software automatically closes, no more Provide regular recovery services; the box below is a half-year countdown. When the countdown is over, the software manufacturer will provide random free recovery activities.

After reading the explanation, Andrew was stunned.

Is this blackmail?

Blackmail the NSA?

Andrew really couldn't imagine that someone in this world was blackmailed by the US National Security Agency!

But seeing is believing.

Regardless of whether you are a sub-bureau of the Hawaiian Cryptographic Center or not under the National Security Agency, the other party dares to invade or blackmail.

Although it has not been verified whether the ransomware is really encrypted, the opponent was able to break through the firewall of the Hawaiian Oahu Cryptographic Center branch and force a scary red interface to pop up on Andrew's computer, which proved the strength of the opponent. The other party can silently stuff the ransomware virus into Andrew's computer, and it will certainly be able to download the NSA hacker toolkit or other files like the intruder more than ten years ago. Based on this alone, the other party is worthy of the US government's global wanted.

Andrew subconsciously reviewed the transparent glass door behind him and was surprised to find that no colleague in charge of safety came to deal with the emergency. You know, in the hacking incident on January 12, Andrew has not yet realized that he has been recruited. Three colleagues from the security department have rushed over. Looking around the glass room hesitantly, Andrew quickly understood why no colleagues from the security department came to him.

This large office separated by glass rooms was completely in chaos at this time. Some people gathered in front of the computer to discuss; some hurried to report to the top; colleagues from the security department scratched their heads and concentrated on infected bitcoin In front of the ransomware computer, there was no time to trace Andrew’s room as accurately as a few days ago; the lesser-qualified colleagues in the security department rarely picked up paper and pen, family after family stopped by to register the loss of the ransomware incident. Obviously, it was not that Andrew was the victim, but that all computers connected to the Internet were infected with Bitcoin ransomware.

Turning his eyes to the computer, Andrew found that the computer had indeed disconnected from the network.

The Crypto Central Branch cut off all network connections from the source, and used the most primitive methods to curb the spread of Bitcoin ransomware.

But are such measures effective?

Andrew was preparing to personally verify the Bitcoin ransomware virus when a security colleague suddenly knocked on the glass room. Seeing the eye-catching red interface on Andrew's computer screen, the security department colleague sighed and drew a tick on the paper document: "Your computer is also infected with a virus?"

Andrew shrugged.

Colleagues from the security department continued to ask: "What about other computers?"

If you like to re-take the road of the future, please collect it: (wuxiaspot.com) Re-take the road of the future. The literature is updated the fastest.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like