Hackers are extremely mysterious for many people.

And about the number theft, it is definitely the most hated thing for many people, after all, the equipment and game currency that worked hard to get krypton gold or burst the liver were all looted by the hackers, and anyone who changed it would be very angry.

In fact, many people do not know that the hacker theft industry has formed a relatively professional industrial chain as early as a few years ago.

The first is the development process: tech-savvy hackers write Trojan virus programs, develop different styles of Trojan variants for different websites or online game accounts, and then sell them according to categories to "Baoma people" who spread Trojan viruses.

The second is the distribution channel: Baoma people sell to second- and third-level Baoma people, who often only understand the operation of hacker Trojans without understanding the development of offline hackers, and the Trojan virus spreads in this way.

Again is the hanging horse receiving letter: the offline hackers who got the Trojan virus hung the Trojan virus on these well-known websites through the code vulnerabilities of various well-known websites. As long as netizens browse these websites with Trojan viruses, the Trojan virus will be automatically implanted in the computers of netizens, thereby stealing the online game accounts of netizens, and then automatically sending them back to hackers in the form of emails.

Finally, there is the letter washing transaction: after recovering a large number of emails, hackers will log in to the stolen online game account, transfer all the equipment and virtual money inside, and then make huge profits through real-world money transactions.

This has formed a huge industrial chain.

In fact, this huge industrial chain still existed until the crossing of An Oak, but compared with this era, the hacking technology of later generations has already increased countless times compared with this era, and the difficulty of number theft has become higher and higher, and profits have been compressed a lot.

It can attract countless hackers to flock to it, which shows how huge profits there are in this industry chain.

In fact, before the outbreak of the Miss virus a few years later, even a small hacker team could earn hundreds of thousands or even millions of dollars a month!

Of course, such a complete industry chain can mostly be done by some slightly advanced hackers.

More hacker groups will adopt the method of self-production and self-sales, that is, they abandon distribution, but choose to complete this industrial chain themselves.

And Anque's target is these small groups.

Implanting a Trojan horse in a black Internet café is not difficult, and even if An Li wants to, it only takes ten seconds at most, and even antivirus software cannot be killed.

In fact, if you want to attack those big bulls, An Que can also do it easily.

However, at the moment, time is limited, and An Li does not plan to waste time with those big bulls for the time being, and when today's affairs are dealt with, he will slowly clean up.

Kill cattle, it's better to fatten.

For those big cattle, every day's income is a considerable amount, and the money they are making now is just saving money for themselves.

After screening several small groups that seemed to have strength, the corners of An Li's mouth turned up slightly:

"Today, you are my dish!"

......

In Xining, in a certain community, several young people in their twenties are busy.

"Brother Wang, look, sold and sold, all the game coins in the past few days have been sold, and 100,000 have arrived, hahahaha!" One of the young people looked at the transfer reminder on his mobile phone with joy, and the smile at the corner of his mouth was about to bloom.

When several other people heard this, they all came up:

"Haha, it's so cool!"

"Look, our strategy is perfect, this Trojan has only been hung for five days and earned 100,000, Mad, huge profits!"

"It's not thanks to Brother Wang, if it weren't for the good enough Brother Wang, how could it be so powerful, the game account password received by email every day is like a snowflake, Made, it's so cool!"

"Get rich!"

The person who was called Brother Wang also stopped the work at this time, also with joy: "All this is still thanks to the joint efforts of everyone, let's continue to work hard and improve our skills, I believe that after a while, our income will definitely double!" "

There's no chicken blood, it's more inspiring than actually making money.

In an instant, everyone in this room had a burst of brain fever.

It seems that they can already see the picture of driving around in a Porsche sports car in the future, hugging the beautiful woman left and right.

But just when everyone was happy, someone noticed the computer behind Brother Wang:

"Brother Wang, is there something wrong with your computer!"

Something went wrong?

Brother Wang looked back and saw that the programs and software he had opened before had disappeared for some reason, and although the computer had not restarted, it had returned to the desktop interface just after booting.

This is...... What's going on?

Something went wrong?

No, you can't!

Their own computer is newly equipped, the hardware and software are specially made by themselves, and in order to avoid being tracked down by the game company, their own computer has set up a lot of protection measures, how can it fail for no reason?

Is there a compatibility problem?

At this moment, a pop-up window with a black background suddenly appeared, instantly occupying the entire computer desktop. Immediately after that, a picture of a time bomb waiting to explode appeared on the computer screen, and the countdown on it could be seen that there were still ten minutes left, and under the bomb, a row of blood-red letters quietly appeared:

[You have been hijacked, the following two answers, please make the right choice!] The

next second, options similar to multiple choice questions appear below the blood word.

[A: I am willing to pay the ransom, please let it go.] [

B: You kind of let the police come and arrest me, and by the way, you robbed my account! ] This

....

Seeing this scene, in the originally sultry house, a cold breath suddenly appeared in everyone's hearts, which made everyone feel creepy.

"We ... Is this being anti-hacked? Someone swallowed.

Anti-black?

"How is this possible!" Someone is full of horror:

"We didn't accept any software Trojans, and we didn't even know it, how did we do this?" Our technology is not very good, but Brother Wang is a real master, even several big websites can be hacked in, how can it be quietly hacked? "

He's telling the truth, but...

The facts are in front of you!

That Brother Wang also had a hellish expression, and hurriedly rushed to the computer and crackled on the computer.

But what is frightening is that this computer seems to have been completely taken over, no matter how you operate it, the computer has not changed in the slightest.

The only thing you can do is choose two different options.

Throw in the towel, or be looted?

Is this a multiple choice question?

This is obviously a proposition!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like