Desperate Hacker

Chapter 263 Anonymous

Chapter 263 Anonymous

Tokyo, mx company!

Recently, more and more hackers have come to their company to try their luck, so much so that the company has been continuously improving its security level, but even so, it is still struggling to cope with hacker attacks!
Fortunately, I haven’t encountered any major problems so far!

At this time, several foreigners were sitting in the car outside the company's headquarters building!

They looked at the logo of mx company hanging outside the office building, and they were thoughtful for a moment!
"How do you think they did it?"

"Who knows? I said it might not be through technical methods, but maybe some mole was bribed!"

"A mole? I can't say it's impossible, but I think it might be some kind of social engineering method!"

There was a girl sitting in the car, looking at the company employees who were eating rice balls outside, she looked at them with interest!
In the past few days, there has been a trend in the hacker circle!
Everyone is trying to copy the peak organization, the kind of attack method that has been speculated in the technical circle!
So mx company's defense system has become a touchstone for everyone!

So much so that in the past few days, customers who have entrusted their Bitcoin assets to mx have begun to distrust this company more and more!
But no one knew that these young people sitting in the car were members of the famous Anonymous organization on the Internet!

As the news about Peaker hacking into mx company and stealing 60 Bitcoins became more and more popular on hack news, the Anonymous organization also began to pay attention to this news.

They are different from speakers! The peaker organization seems to be purely for financial gain!

And every action they take is coordinated with their harvest in the financial market!
In other words, all the money earned by this organization is legal income, and the source of income can be explained to the government departments without money laundering!

These people come and go without a trace, so even the regulatory authorities have nothing to do with them!
Unlike the Anonymous organization, the Peaker organization is a pure cyber bandit!

The Anonymous organization and the Speaker organization are different!
Because this organization always tries to expose things that the governments of some countries are desperately trying to cover up!
for example? FBI's top-secret files on aliens!

Such as the Kennedy family scandal!

Previously, the leak of the emails of the presidential candidates of the Lighthouse Country was done by them!

However, the Anonymous organization will not launch cyber attacks for pure profit. The reason why they came to Tokyo today is to crack the mysterious intrusion method of Peaker!

"If it's social engineering! Then I think they must have an insider in this company! There's no way such a big thing will be covered up!"

"Not social engineering? That would be interesting!"

"Look! How about we imitate Speaker, force them to come out and sacrifice themselves, and talk to us?"

"It's not that no one has done it! Look, this is the news I collected yesterday. Someone in mainland China imitated the Peaker organization a few months ago! But someone said at the time that this was not their work, because Peaker is only interested in money. !”

……

Several young people in the car were discussing with each other, but they were only outer members of the Anonymous organization!

They came here just because it was more convenient for them to go to Japan, so they accepted the order of the organization and came here to explore the way!

How many people are sitting in the car?They are only a few hundred meters away from mx company, but they are still discussing how to invade this company's mysterious vault?

Although the hundreds of thousands of Bitcoins stored in the vault are indeed very tempting, as a hacker, what he wants more is the intrusion method of the Peaker organization!
It seems like no one can defend this organization!
"You guys should be quiet for a moment!"

A blond man sitting in the passenger seat suddenly said something, and the car suddenly became quiet!
Then he picked up his phone, and an electronic voice with a cyberpunk-style voice suddenly came from the other end of the phone!

"How's it going? What's going on at mx company these days?" "Some little Muggles have been challenging the company's security system and want to prove themselves! But now the situation has changed. I think even the speaker, I’m afraid we can’t even get in!”

"Your mission has changed! Stop researching mx company and find a way to find this organization?"

"what?"

"This is what the leader means! He said he hopes to recruit the speaker to do big things together..."

The other end of the phone gave a simple explanation, and everyone looked at the companion holding the phone!
When the call ended, the companion put down the phone and then signaled to drive away first!
"What did you say on the phone just now?"

"Let's not worry about mx anymore! They said they found the speaker. The leader is interested in the technology of this organization and wants to win them over to do big things together!"

"Find them? How?"

"Didn't you read the article on Hack News carefully? Mx Company stated that they have found no signs of large-scale misappropriation of Bitcoin, and there is no evidence on the Internet to prove that the speculation in the Hack News article is correct!"

"what do you want to say in the end?"

"What I want to say is, if what that article said is right, everyone's attention is now focused on mx company. I think everyone has fallen into a blind spot. Everyone knows that it needs to be controlled in a short time. With so many Bitcoins being traded, the demand for computing power is staggering, and no one’s computer has such powerful computing power!”

"You're saying they'll probably have a data center on their hands?"

"It's possible! But I think if they were so rich, they wouldn't care about the ransom paid by Colonial Company. Although they didn't intend to ask for the ransom at all, they must have other ways!"

"I do know that government departments and research institutions generally have large computers to support a large number of computing needs! These devices meet the requirements of the speaker!"

"That's it! They must have used this method! Let's not check mx now! Let's investigate this and see if we can find any clues about them!"

"Wait a minute! I'm thinking of someone?"

"Who?"

"Have you heard of the Apocalypse Group?"

"What do you mean?"

"I had a girl I met in an information competition before. She later went to the University of Pennsylvania, but I heard that she had been living in a foster family. How do you think she paid for her tuition?"

"You mean, there is a financial sponsor who supports her?"

"I admit that Susan is really hot, but I don't think her sponsor is doing it for her beauty!"

"what is that?"

"Do you remember that Speaker exposed all the members of the Apocalypse Group a while ago? However, some of the exposed members claimed that they had a traitor! If I confirm that Susan is a member of the Apocalypse Group, do you think the traitor will be who?"

"Your friend?"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like