Friends, gather together to attack.
7480 kept shaking his head, and his attitude became more and more relaxed: "It's useless, they are not Zhu Jianrui's opponents."
It was only then that Zhuang Li posted a new post.
Thanks to the previous post, his popularity on the dark web has reached its peak, and when he speaks, hackers all over the world flock to him and listen carefully. This time, instead of praising how powerful MIK's network is, he pointed out two fatal flaws in the network - Meltdown and Spectre.
Through the "meltdown" vulnerability, a low-privileged user can also access the system's memory out of bounds, thereby downloading local data.
Through the "ghost" vulnerability, attackers can use malicious applications to obtain user-level private data that should be quarantined.
In other words, as long as these two loopholes are identified, the MIK network, which was previously unbreakable, will become a sieve.
After Zhuang had a haircut, he picked up the coffee cup and sat in the afternoon sun to enjoy the comfort and tranquility of this moment.
But the Internet has set off an extreme carnival. In order to verify whether these two vulnerabilities really exist, countless hackers poured into MIK, and were pleasantly surprised to find that they succeeded!
At the same time, Zhu Jianrui, who was sitting in front of the computer and smiling at the hackers, showed a shocked expression. His computer went black, and no matter what key he pressed, it wouldn't start, nor would a forced shutdown.
Immediately afterwards, his secretary rushed in and said quickly, "Mr. Zhu is not well, the computers of the whole company are all black!"
"You make everyone calm down, don't panic, I can solve this problem right away." Zhu Jianrui took out his laptop, connected to the intranet, and started to fight back.
But to no avail, these hackers have flooded into MIK's management backend, logging off PCs and servers.
Within seconds of Zhu Jianrui opening his laptop, more than 1,000 personal computers and 500 servers at MIK were logged off, and all backups were cleared.
Zhu Jianrui wanted to restore the data, but found that the boot sector was also deleted, and all internal data had been stolen and smashed. In other words, MIK's system has no way to recover, and the lost files can never be recovered.
A lot of cold sweat broke out on his forehead instantly, and without thinking, he took out another mobile phone from the dark compartment of the drawer and sent a message: "Help!"
As the most powerful hacker in China, there is naturally a large group of hackers gathered around him, and he is their leader and has the authority to respond.
These people soon joined the battle and tried their best to help Zhu Jianrui rebuild MIK's defense network.
Sitting in the afternoon sun, Zhuang Li watched this scene leisurely and comfortably through his laptop. He had long expected that Zhu Jianrui was not fighting alone, but to his surprise, the broker named Mima was also a hacker, and he was completely under Zhu Jianrui's orders.
That's interesting.
Mima secretly helped the Gong family with a lot of things. If he is Zhu Jianrui's subordinate, it can be seen that Zhu Jianrui knew his background a long time ago, and secretly influenced the development of the Gong family. How old was he then?
"Zhu Jianrui is getting more and more interesting." Zhuang Li sighed casually towards the dense forest outside the window.
7480 cheered Zhu Jianrui secretly: Come on, protagonist! You can do it, you are so powerful, you must do it! Hold on!
Fortunately, Zhu Jianrui's team really held on. They rewrote a set of defenses at breakneck speed, covering up previous vulnerabilities. MIK's network was once again impeccable.
At this moment, Zhuang Li made another post as an American hacker, pointing out several loopholes in the newly written defense program.
This kind of vulnerability is called "zero-day vulnerability" in the industry, also known as zero-day attack, which refers to a security vulnerability that is maliciously exploited immediately after being discovered. They are not known to the general public and are therefore vulnerable to hackers. The company being attacked doesn't even know how to defend against a counterattack.
The network is made up of tens of millions or even hundreds of millions of programs, and it is impossible for every program to be tightly connected. When running, they will always produce some calculation error of one kind or another, which is the loophole in the mouth of the public.
In fact, the more programs there are, the more vulnerabilities there are. And Zhu Jianrui's team prides itself on being highly skilled, and the newly built defense system actually consists of tens of millions of programs.
In the eyes of other hackers, it's impregnable.
But in Zhuang Li's eyes, it is a big net, except for loopholes or loopholes.
The zero-day attack begins, and it's another wild loot. MIK's new network collapsed not long after it was built, and this time, Zhu Jianrui, who had gathered dozens of the best hackers around him and couldn't turn it around, finally smashed the computer in frustration.
He growled like a madman, grabbed his hair, and finally fell to his knees feebly.
He knew that the MIK he had just acquired was over! Because its database not only saves the private files and scandalous scandals of all stars, but also saves all the movies and TV series that MIK has invested in and produced in the recent past.
If hackers spread the scandals of those stars to the web, MIK would become notorious.
If hackers turn those movies and TV shows into seeds for free download, the billions invested by MIK will be lost.
Zhu Jianrui faced bankruptcy as soon as he bought the company. Counting the time he spent in this skyscraper, it was less than a day.
Outside the window, a blood-colored setting sun was slowly falling, just as the brilliant life of this talented young man had already ended before it even started.