God-level Trader of Rebirth

Chapter 419 Nimya Variation

Chapter 419 Nimya Variation

"This is the first case of creating a computer virus in China, you have to win this case no matter what!"

February [-], [-].

The Eleventh Bureau of the Ministry of Public Security urgently called the Public Security Department of Hubei Province, requesting the local government to solve this "Internet virus" case as quickly as possible.

On the same day, six network monitoring experts from Hubei Province, experts from the National Computer Virus Emergency Response Center and the network monitoring team gathered in Jiangcheng.

As for the cause of the case, we have to talk about it from four months ago.

In December [-], a new type of virus called "Nimya" began to spread on the Internet.

In this era, viruses in computers are actually not uncommon. It can even be said that every computer user has more or less "poisoned" experience.

Netizens are also used to it.

Because no matter what kind of virus, you only need to reinstall the system to solve all problems.

At most, it is a little delay.

Therefore, the "Nimya" virus at this time has not been highly valued by Internet monitors and even netizens, so that it has left time for "Nimya" to spread on a large scale.

However, in just four months, "Nimya" quickly infected and invaded tens of millions of computers with lightning speed.

What is even more surprising is that the destructiveness of this virus is also unprecedentedly powerful.

Even if you reinstall the system, it doesn't help.

Because the virus will delete files with the extension gho, users cannot use the ghost software to restore the operating system.

Not only that, this virus will also infect all webpage files in the hard disk, and add virus URLs to them, causing IE to automatically connect to the designated virus website to download the virus as soon as the user opens these webpages.

Simply put, this virus is also an "opener" for other viruses.

Once infected with this virus, it is equivalent to moving the viruses on the entire network to the computer.

Of course, this function is not the whole of this virus, but it is just a foretaste before it destroys your computer.

After being infected with this computer virus, all software icons on your computer desktop, including the desktop wallpaper, will be uniformly modified into a pattern of "a panda holding three sticks of incense, clasped together".

Combined with the previously implanted virus website, a two-pronged approach will destroy your files until your computer has a blue screen or restarts repeatedly.

Basically, after getting to this point, the only thing you can do is to cut off the power and go out and browse the great rivers and mountains of the motherland.

No matter how severe the Internet addiction is, I will quit it for you.

For some website editors, the virus is a nightmare within a nightmare.

Because this virus can not only spread by means of U disk and shared files, but also automatically add program code at the end of the computer's web page files.

In other words, if the editors of the website upload data to the website after being infected with this virus, then all users who browse this webpage after that will be infected with this virus.

Among them, Suzhou Province has become the "hardest-hit area" that the virus has focused on.

The computers of a large number of enterprises were paralyzed.

By the time the National Computer Virus Emergency Response Center became serious, thousands of enterprises and government agencies, including finance, taxation, energy, and other units related to the national economy and people's livelihood, had been infected.

At first, some people tried to use anti-virus software to kill viruses on computers, but this virus called "Panda Burning Incense" has strong resistance to anti-virus software and can end a large number of anti-virus software programs.

General system reinstallation does not work at all.

Because when the virus is infected, the virus has already left a backup file for itself, just waiting for you to reinstall.

Unless the user completely formats the hard drive and then reinstalls it.

Only in this way can "Panda Burning Incense" be completely eliminated.

However, in this period, most people don't know anything about computers, not to mention formatting and reinstalling the system, and many people don't even know how to download anti-virus software.

They could only rush to the computer store and ask the boss for help.

For some computers used to store work files, the virus caused the most damage to them.

Even if they installed Jiangmin Antivirus, Rising Antivirus, Kingsoft Antivirus, 360 Security Guard, and a series of well-known domestic antivirus software, they still couldn't really kill the virus completely.

Within 10 minutes, "Panda Burning Incense" will be revived again.

In order not to lose important files in the computer, many people do not dare to format the hard disk, and can only wait anxiously for the emergence of the special killing tool for this virus.

However, at this time, the "Panda Burning Incense" virus has entered a rapid mutation period.

Portal websites such as Tianya Community, Silicon Valley Power, pconline, and download links of well-known software such as Kuaibo, Baofengyingyin, etc., all began to appear traces of "Panda Burning Incense" possession.

From the traditional peer-to-peer to the current peer-to-peer, "Panda Burning Incense" is spreading rapidly with the help of the astonishing traffic of poisoned websites.

Xiao Jiang is the network manager of an Internet cafe in Heilong Province.

During the two days from March 3nd to March 2th, the Internet cafe he was in was empty and there were no customers. When he turned on more than 3 computers in the Internet cafe, the screen was covered with "Panda Burning Incense" icons, and the system crashed and could not run. .

"The virus was infected on the morning of the 2nd. It was only one machine at the beginning. When I was killing the virus, other machines in the local area network were infected one after another." Xiaojiang said in an interview with reporters.

On the same morning, Mr. Liu, who worked in an IT company in Baijing, discovered after work that nearly 30 computers in the company were infected with "Panda Burning Incense". The virus destroyed the program files in the computer and deleted the computer backup. The company is developing The semi-finished software is destroyed once.

Mr. Liu was so angry that he almost fainted, but there was nothing he could do.

On the same night, in a newspaper office in Baijing, technicians were running around, and dozens of editors and reporters were waiting for them to clear "Panda Burning Incense" from their computers.

On March 3, Mr. Zhang, an employee of a Taiwan-funded company in Donghai City, turned on his computer. He was greeted by rows of pandas clapping their hands and holding incense.

Looking around, he saw the same surprised expression on the faces of his colleagues.

For a whole day, the company's business was paralyzed.

……

March [-]th, ten o'clock at night.

Infinity Corporation Headquarters, 14th Floor, Network Security Department.

A group of anti-virus engineers surrounded a computer isolated from the network.

With the click of the mouse, hundreds of panda icons appeared on the screen. This is the "Panda Burning Incense" mutant virus that the engineers caught that day.

Jiang Yuan is an anti-virus engineer in the virus team of Infinity's network security department.

His daily job is to catch viruses circulating on the Internet with dozens of partners, then "disassemble" the viruses, study their internal structure, and upgrade the virus database inside Infinity Company.

After capturing the virus sample, the members of the virus team immediately put the virus into the "honeypot".

"Honeypots" are servers with weak defenses set up by the virus team on the Internet. Engineers deliberately set up various loopholes on the servers to lure viruses into intrusion.

It's like a trap covered in honey made by a hunter, designed to attract prey to take the bait.

Later, they "dissected" "Panda Burning Incense" in a network-isolated environment.

After analysis, the engineers found that under the cartoonish appearance of the virus, there was a huge potential for infection. Its infection mode and killing method were very similar to the popular "Viking" virus.

The technology of "Panda Burning Incense" can't be considered superb, it mainly depends on the author's constant update, as long as it is updated, Jiang Yuan and the others must update the killing tool at any time.

In the past two days, the killing tool developed by Jiang Yuan and his colleagues has been upgraded more than ten times.

It can be said to be very passive.

Moreover, such an easy-to-use virus has already been secretly used by many hackers in the IT industry. It is difficult to guarantee that this virus will not mutate again.

"It seems that this virus cannot be eliminated at all, unless its program is decompiled."

An old man with gray hair stood behind Jiang Yuan and the others, adjusted his glasses on the bridge of his nose, and said worriedly.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like