Chapter 430: absolutely vicious attack

Black and white are really only a piece of paper apart.

In the global anti-virus software industry, there are many anti-virus software companies whose predecessors are actually illegitimate organizations that profit from hackers.

It's just that with the improvement of laws and regulations in various countries, many such illegitimate organizations have begun to bleach.

Some of them cooperated with capital to become antivirus software companies, and some directly sold the corresponding technology to antivirus software companies, or related technicians directly expected to work in free antivirus software companies.

Therefore, it is too easy for technicians to create or spread some kind of computer virus with these antivirus software.

In the process of 306 occupying the domestic market on a large scale, Avira (Little Red Umbrella) Company in Germany and Norton and Mai Coffee in the United States suffered the most losses.

Among them, the anti-virus software engine of Xiaohongsan has been widely used in the Xiaguo market, including domestic security companies such as Jingshan Rising, more or less using the antivirus engine of Xiaohongsan.

As the world's largest antivirus software company, Norton itself also has business in Xiaguo.

High-end computers of various brands, including Lianxiang, Dell, and HP, are all pre-installed with Norton's antivirus software.

Now that 306 is popular, everyone has no money to make.

The first force was Norton. Norton studied in detail the deeply optimized WindowsXP system and windows98 system to find out the weak points of the system.

To this end, a Trojan horse is prepared, and it is ready to attack the deep optimization system in the name of a third-party hacker organization.

Several kinds of Trojan horses, such as Needham, Code Red, etc., which have been popular during this period, are no longer traditional computer viruses, but have evolved into mixed viruses with dissemination methods.

This type of virus is difficult to detect and kill, and can easily cause irreparable losses to users.

In order to test the anti-virus capability of 306, Norton's engineers improved this type of mixed virus on the basis of Needham and Code Red, so that it can specifically attack pirated systems such as deep optimization - after all, deep optimization currently uses 306 Antivirus software has the largest number of users.

Foreign anti-virus software companies attack their opponents with viruses, and then demonstrate their anti-virus capabilities to gain market share. This trick is not used once or twice.

And tried and tested.

Sometimes common computer viruses on the market, you really can't tell whether they are released by antivirus software companies or by international hacker organizations.

After all, if there are no mice in the house, having a cat is completely useless.

If there are no computer viruses, why do users buy antivirus software?

Norton, in the name of a third-party organization, created this Trojan virus named Polzes, and secretly told the characteristics of the virus to network security companies such as Maicao and Xiaohongsan.

Of course, Norton will definitely not tell the other party with a big fanfare: I created this virus. Now I will tell you the characteristics of the virus. You should pay attention to upgrading the software and virus database, and pay attention to protection.

This is what Norton told the international anti-virus software manufacturers: We have caught a new type of virus on the Internet. It is very disguised and can completely and irreversibly destroy users' files, pictures, etc. Now I will capture this virus. The characteristics tell you that you should pay attention to protection.

In fact, whether it is Mai Coffee or Xiaohongsan, as well as Kaspersky and other internationally renowned antivirus software manufacturers, they all know that Norton's behavior is to give 306 a long experience.

These antivirus software companies have been doing computer security for more than 10 years and 20 years. They know what their strengths are, and they also know very well that Xiaguo Antivirus Software Company is actually a gold and jade, and it has failed.

Because so far, no Xiaguo antivirus software company has developed an antivirus software engine or created its own virus database by relying on its own capabilities.

All Xiaguo antivirus software companies use the purchase of foreign antivirus software engines.

Norton absolutely does not believe that a newly born Xiaguo antivirus software company, a free antivirus software company, and an antivirus software company that has never purchased foreign antivirus software engines and virus databases, can really protect users' computers.

Under Norton's dominance, Platses quickly spread on the Internet in Xia Guo.

The target of Puerzes' attack is very clear, that is, the deeply optimized windows system.

Jingshan, Ruixing, Jiangmin, etc. were more or less aware of the relevant news, but they did not express their position or notify them.

According to the relevant laws and emergency mechanisms of computer network security in Xia Guo just promulgated, if a domestic security company discovers the latest computer virus, it must immediately report to the National Computer and Information Security Center.

But this time, Jingshan, Rising and Jiangmin all knew and named the Trojan horse Berses to deal with 306.

So everyone chose to be silent, and secretly updated their antivirus software according to the virus characteristics and security protection methods provided by foreign antivirus software companies, but did not inform the Xiaguo Computer and Security Center of Polsay.

Soon, Platsys began to become popular on the Internet.

At the beginning, those users who did not install antivirus software were the first to be recruited.

The very vicious Trojan horse virus of Polcyth can use the resources of the system to multiply and quickly infect the entire computer.

It can completely destroy the user's documents and picture files, and make the user's application data missing error.

More and more users are infected with viruses and complain.

It is true that the virus can be effectively eradicated after reinstalling the system, but some valuable documents and photos left on the computer by the user are gone.

The Internet era has just arrived, and many qualified users use digital video cameras to take pictures, and habitually store the pictures in the computer.

GuA lot of valuable photos disappeared at once, and users complained.

After the first phase of the attack, Western antivirus software companies were a little confused.

Because after this wave of attacks, the damage to the entire Xiaguo computer and Internet market was actually very small.

Most of the affected users are users who do not have antivirus software installed.

Norton, Jingshan, Rising and other anti-virus software can protect because they have obtained the virus characteristics in advance, so they are foolproof.

But 306 didn't get the virus characteristics of Pullzes at all, although it also defended such a stubborn virus.

This is an insulting incident for Norton, who is absolutely confident in technology!

A third-party organization commissioned by Norton upgraded Pulsers and started the second round of attacks.

This time Norton didn't tell any antivirus vendors.

Mid-August was definitely the darkest day in the history of global computing and the Internet.

An international mailbox company that stores a large amount of user data, its server was attacked by Pulses, resulting in damage and leakage of emails stored by a large number of users.

There are also some commercial documents, as well as user privacy issues.

Immediately after, through the chat software mailbox and the hacked portal website, the 2.0 version of Places frantically attacked the computers of ordinary users.

This time it is not as easy as the first wave.

Many users who have installed anti-virus software such as Jingshan, Rising, Jiangmin, etc. have not survived this wave of attacks.

Users have been recruited one after another, and the documents and photos in the computer have been robbed.

Damaged damage, leaked leak.

Users who installed foreign antivirus software were not spared either.

Among them, the users who installed anti-virus software such as Maicao and Kaspersky are basically mature business users.

Most of the data on their computers are business documents, contracts, and so on.

After being attacked this time, the losses were quite heavy.

This time the whole Internet is lively.

The Trojan horse virus Przews immediately became the main topic of discussion in the Internet industry.

The National Computer Security Center has urgently intervened, immediately obtained samples of the virus, and analyzed them to think about countermeasures.

In the major computer markets, everyone complained one after another.

"The Polzes virus is really scary! Not only ordinary users, but also international high-end users!"

"Have you heard that KPMG's corporate computers at the Yanjing headquarters have all been recruited, and all accounting data and customer business data have been destroyed. I heard that the loss is as high as tens of millions of RMB!"

"No, KPMG has also been recruited? Some time ago, I just read the news that KPMG had signed a commercial contract with Mai Coffee in order to protect the customer's information, and the network security software they used should be specially designed for it by Mai Coffee. of."

"It's not just KPMG! Miracle seems to be involved too. The game accounts of many users of UU Kanshu have been stolen, not only their game data has been deleted!"

"My friend finally practiced to the full level. He logged into the game yesterday and saw it. It's good. Let him create a new character! He spent a lot of money to play this game!"

"Trembling, I was so scared that I quickly unplugged the network cable and played single-player games!"

Computer virus has no consciousness and thinking, it has a powerful infectious ability.

Not only was Xia Guo recruited, but the Plaques virus was also brought out by businessmen who traveled to and from Xia Guo and all over the world.

By means of international mail or USB flash drive, Puerzes became a global popular computer virus in an instant.

Moreover, with the help of international hackers, Purcell has undergone a variety of mutations.

Norton expected that users who had installed other anti-virus software were caught, but users who had installed Norton's anti-virus software were also caught.

This terrified the technicians at Norton World Headquarters.

They quickly responded at the first level, and immediately upgraded their antivirus software engine and virus database according to Berses' indicators.

But after working hard for a while, everyone suddenly discovered that Norton Antivirus was ineffective against the variant of Plasse!

Please remember this book's first domain name: . Mobile version reading website: