Volume 1 Six years ago HK112 stole Canon's technical data!
The tracking expert from the International Intelligence Bureau of the Ministry of Foreign Affairs of Wosang Country tracked down to the server of the hacker union and suddenly stopped for a moment. They obviously took Shi Lei as the core member of the hacker union, and Shi Lei's frame-up was very successful!
The tracking expert only paused for a moment, contacting colleagues who were experts in intrusion attacks to assist in attacking the hacker union's server.
In the Asahi Shimbun of Wosangguo, and also in the Yomiuri Shimbun, within the internal voice channel of the two triads controlled by the hacker alliance, Hei Dao said with a hint of laughter: "Brothers, we can take a breather now. Those sons of bitches from the Ministry of Foreign Affairs' International Intelligence Bureau have been led away by that great god Lucifer! The only question is whether Lucifer will be able to escape in the end!"
"The second-in-command of the alliance and also the group leader, Hei Hu, spoke up: 'Boss, judging from Lucifer's displayed strength, he should be able to easily escape the pursuit!'"
Hei Bao nodded in agreement: "Second Brother is right, the strength displayed by Lucifer is too powerful! The defensive power of the NK official website was actually pierced like a sheet of white paper by him, and the internal security department had no way to stop it!"
"Boss, something's wrong!" Hei Qiang suddenly spoke up, "Boss, our server has been attacked, suspected to be the work of the International Intelligence Bureau of Waiwu Province!"
"What!" Hei Dao exclaimed, "What's going on! We didn't provoke the International Intelligence Bureau of Waiwu Province at all, and weren't they supposed to be tracking down Lucifer?"
Black Panther had a bad feeling in his heart, "Boss, I wonder if it's Lucifer who is framing us?"
"Hei Qiang shouted: 'Boss, Second Brother, Hei Shou, let's retreat together! Our squad can't hold on much longer!'"
"Everyone, fall back! That damned Lucifer!" Black Knife growled. The seven core members of the Hacker's Union who were outside immediately abandoned their tasks and brought their meat shields back to defend the union's server.
A dark wolf's heart twisted, a thing called hatred slowly grew within him. His heart let out an angry howl: Lucifer, it's you again! I must catch you, I must take revenge on you!
The Ministry of Foreign Affairs' International Intelligence Bureau, through NK TV station, issued an emergency press conference. They only announced one piece of news: the hacker who invaded NK's national television station is suspected to be a core member of the Hacker Alliance. Their tracking experts are currently closely surrounding the Hacker Alliance's server, and once they break through the server, everything will be revealed.
Sitting in front of Server No. 1, Shi Ke sneered at the Hacker Alliance and the International Intelligence Bureau of the Ministry of Foreign Affairs of Wosang State, with a fierce battle between the two sides on an internal server of the Hacker Alliance!
The power of the International Intelligence Bureau of the Ministry of Foreign Affairs of Wosangguo has only shown one-tenth, and the hacker alliance can still make a profit from Shi Lei who temporarily doesn't care about them, he has more important goals.
After completing the second step of framing and shifting blame, Shi Lei began to execute the third step of the plan, invading Canon!
This summer, the hacking incident in Wosangguo was triggered by Canon, and if Xiaoyi didn't expose Shi Lei, Shi Lei wouldn't have instigated a cyber war behind the scenes.
Although the loss of Wosangguo was already quite tragic, Shi Lei did not satisfy as a fuse for Canon, and he didn't get hurt at all, which is simply ironic!
Shi Ke connected to the supercomputer Yan and also had a first-class gaming PC from Ai Ke Xin company. The two powerful gaming PCs combined, quietly approached Canon.
Shi Ke's target is Canon's technical data, especially in the field of optical equipment and digital camera technology. Although Shi Ke doesn't like the little devils from Wosangguo, he has to admit that Canon is in a leading position in the world in terms of digital cameras.
If we can infiltrate into Canon's internal network and obtain technical documents from their R&D department, that would be great!
The main computer of Canon's R&D department is also a supercomputer, with computing performance that is quite advanced, almost reaching one-fifth of the supercomputer Yan, ranking in the top 300 globally.
Such a powerful supercomputer is very difficult to invade, even if Shi Lei controls the world's ninth-ranked supercomputer, Yan, it is still very difficult!
High-tech confidential technology industry, telecommunications industry, financial industry, these giant oligarchs like supercomputers because supercomputers are secure!
Shi Ke controlled the supercomputer Yan, wandering on Canon's official website, without immediately invading internally. He was looking for the most opportune moment, searching for a gap in Canon's security defense.
From Canon's official website, Shi Ke carefully entered the personnel department server of Canon, and searched for personnel data of the R&D department in the personnel department server.
Before a hacker invasion, sufficient preparation is necessary to avoid flurried response to unexpected situations. Canon Inc.'s Tokyo headquarters has more than 3,000 R&D personnel distributed in various research institutes throughout the city.
These studies store corresponding research materials, but the R&D department's main computer at Canon headquarters also stores R&D materials. However, the R&D department's main computer is heavily guarded, and it's not easy to get in!
Shi Ke was searching for R&D department's materials in the HR department, then a smile appeared at the corner of his mouth. Xia Guo has an old saying: A strong defense often collapses from within!
Canon's external defense is indeed very strong, and can even be described as abnormal, absolutely not the kind of paper-thin defense like NK TV station's official website!
Unfortunately, such a strong defense system also has a weakness, that is, the internal defense is insufficient! Shi Lei searched for the identities of several senior researchers in the R&D department of Canon's headquarters on the server of the personnel department, and then invaded the internal fully defensive system. After intercepting the account numbers and passwords of those senior researchers from the internal security defense system, he quietly bypassed Canon's defense system and entered the internal system of the R&D department.
The internal system of Canon's R&D department, according to the permissions set by Shi Ke for those senior researchers, cannot obtain any information outside of their research, but Shi Ke is a hacker after all.
Shi Ke secretly bypassed the system authentication, taking advantage of a vulnerability in the system authorization, and quietly granted temporary permissions to senior researchers, temporarily allowing them to access other research project materials.
The supercomputer Yan's computing power exceeded that of the R&D department's supercomputer, and the two sides were fiercely opposed. The system authorization vulnerability remained effective under the protection of the supercomputer Yan.
Shi Ke hastily typed on the keyboard, searching through the R&D department's research on optical technology and digital camera-related technical conditions. After filtering out a large number of technologies related to copiers, fax machines, medical equipment, etc., he was left with only the digital camera and optical technology that Shi Ke needed.
Even with just optical technology and digital camera technology, the file data statistics of the system exceeded 200GB!
Canon's supercomputer has strict restrictions on data flow, although Shi Ke can now easily view these materials with the help of the supercomputer Yan, there is no way to take them away because Canon's supercomputer will sound an alarm once it detects that there is data flowing out.
Shi Ke looked at the over 200GB of data and was in a dilemma. All this data was from Jinshan Silver Mine, if he didn't move it away, Shi Ke would absolutely not be willing to leave empty-handed after entering Treasure Mountain.
NVIDIA's supercomputer has strict data flow restrictions. These restrictions come from hardware devices and attempting to pause them through software will only trigger alerts!
Shi Ke rubbed his head, at this moment even if he had the superpower of photographic memory, it would take him several months to finish reading over 200GB of data! Not to mention that he didn't have such an ability, where would he find the time to memorize?
"What should I do now?!" Shi Lei stared at the computer screen, muttering to himself.
Suddenly, Shi Ke thought of a story, about a child deceiving people. This story was widely spread in Xia Guo, telling the story of "The Wolf is Coming!"
Shi Ke decided to take advantage of the "Wolf Coming" story to probe into Canon's internal security department. He controlled the supercomputer Yan, and in the supercomputer of Canon's R&D department, he created a virtual data packet and then randomly sent it out.
Canon's internal security department immediately discovered that the R&D department's supercomputer was transmitting data externally, and they took immediate action to closely monitor the supercomputer, only to find that there was no data flowing out at all.
Canon's highly vigilant internal security department made a thorough investigation of the supercomputer but found no problems and finally gave up.
After they gave up, Shi Ke increased the volume of virtual packets to 10GB and then randomly transmitted data again.
A massive data flow triggered a frantic alert within Canon's internal security department, with the traffic monitoring hardware alarm system reporting a staggering 10GB of data being transferred. However, after investigation by the security department, no supercomputer was found in the R&D department, and there were no abnormalities or signs of data loss or duplication.
Within the security department of Equifax, after slightly relaxing a bit, Shi Ke once again increased the volume of virtual data packets to 100GB and established another random data transmission.
Traffic monitoring hardware alarm, Canon's internal security department, once again thoroughly investigated the R&D department's supercomputer and research data in it. However, all those traffic were virtual data constructed by Shi Lei, without leaving any trace. How could Canon's internal security department find out the problem?
After repeating back and forth more than a dozen times, the security department of Canon also got annoyed. When the traffic monitoring hardware issued an alarm again, they didn't even bother to check it out.
Shi Ke knew the opportunity had arrived!

