Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter five hundred and eighty first hindsight

At this time, the internal chaos of the Yidaili United Sao Paulo Bank was already in chaos.

Just two hours ago, a large number of unaudited account information modification records appeared in their system, including whether there were even instructions for fund allocation.

Anyone who is engaged in the banking industry knows what this means.

Obviously, they were seriously attacked, but the problem is that the entire bank's technical department has been mobilized, but found that they could not even find the source of the attack.

Theoretically, if you want to intrude into a bank system, you must first at least have an access application from the outside to the inside, but within these two hours, all accesses are secure and approved.

In other words, either the attacker disguises himself as a completely unrecognizable normal visitor, or the attack comes directly from the inside.

In either case, the technical ceiling of United São Paulo Bank has been exceeded.

They were like Trojan City, which had been invaded by Trojans, but they could not find the invisible Trojan.

"How is the situation? Are the instructions still being generated?"

A bank tech executive asked to the technician in front of him.

"No, we have urgently cut off the network connection of the central server. No new attacks have occurred. This is good news, but it is also bad news."

"I understand that the losses caused by a disconnection are immeasurable--but fortunately we have insurance, they should compensate, right?"

"Maybe there is no need to expect them to be kind, they will definitely lower the price when determining the loss."

"But the bad news I'm talking about now is not this, but rather, it's a clear signal, a proof that we're under attack."

"It is obvious that the attack is carried out through the network. As long as we reconnect to the network, we will continue to be attacked. With the capabilities they have shown so far, they can even clear our accounts directly."

"How is this possible! All our information is connected to the swift system. To tamper with this part of the data, they must crack the entire swift system. Can anyone in this world do it?"

The executive's tone was a bit unbelievable. He could indeed feel the seriousness of the situation, but he had been away from the technical field for too long and did not make too intuitive judgments.

He subconsciously felt that this was just a provocation by a small group of hackers who love to show off their skills in a corner of the world. They dare not attack the banking system directly. Even if they can escape investigation in a short period of time, as long as the state power intervenes and uses social workers on a large scale, they will not be able to escape for long.

Since this is the case, the multiple encryption used by the swift system is still a natural disaster for them.

RSA encryption, elliptical encryption. These technologies that have been used by humans for decades have become more and more innovative today. They still protect the most important assets of human beings, and they have never shown any signs of being compromised.

Now, the technicians under his command actually said that they can break through the limitations of the swift system and directly tamper with transaction data?

Looking at the senior executive's questioning expression, the technician hesitated for a moment and replied:

".Okay, maybe they won't tamper with their accounts through swift settlement, but I'm sure they will definitely zero the balance displayed in our system."

: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : :

"The RSA encryption system on which the modern banking system relies for survival is likely to have been compromised."

(End of this chapter)
Chapter completed!
Prev Index    Favorite Next