The system takes me for surgery

Chapter 419: Harmful Interference

Lu Chenhao looked at the audience's feedback and continued: "Especially implantable medical devices, including cardiac pacemakers and implantable cardiac defibrillators, you all know that these devices are used to save lives, but malicious hackers can Exploiting Vulnerabilities Turns These Life-Saving Devices Into Life-Threats. Electrophysiology Council Findings Show Hackers May Soon Be able to Disable or Reprogram Some Functions of Pacemakers, Causing Serious Risks From Electric Shock, Interference with Wireless Communications for Medical Monitoring, and Loss of Power as a result of."

Someone stood up and asked, "Has the problem you mentioned happened before?"

Lu Chenhao said: "I think it has already appeared, but we haven't found it yet."

Someone continued to ask: "How did you attack the pacemaker? Can you tell me the principle?"

Lu Chenhao explained: "A modern pacemaker is a microcomputer loaded with special software, which is implanted under the skin near the patient's collarbone. The pacemaker has two functions: to ensure the heart continues to pump blood, monitor the patient's signs and Immediately notify the doctor if the condition is abnormal. With the technology in place, hackers can infect the software running on it, draining the battery of the pacemaker and rendering the device useless.

Moreover, if the main hardware of the pacemaker is infected, it is possible to directly give the patient an electric shock that stops the heart.In my opinion, such "intentional harmful interference" is a real threat to the health and life of patients. "

Everyone felt that they were far away from themselves. Some people thought that this professor was a bit alarmist. Did he deliberately scare them because he thought about what products to sell.

It was ten o'clock in ten minutes, and Liang Yi didn't dare to be distracted for a moment. He paid attention to the reactions of all the lecturers present.

He found out that Xie Junxing, Xie Timmu's son, had also come to listen to the lecture. This was a bit beyond Liang Yi's expectation. He didn't expect him to come too.

Xie Junxing listened very carefully. While taking notes, he also checked the information from time to time to understand what Lu Chenhao said just now.

After listening to it, he felt that what Lu Chenhao said was very practical and easy to understand.

He saw Liang Yi, smiled at Liang Yi, and gave him a thumbs up.

Liang Yi also smiled slightly, and nodded in response to him,
This made Liang Yi very gratified. Perhaps it is the difference between this generation and the previous generation. We are more able to get rid of our own emotional knowledge, but use rational thinking to judge the right or wrong of a matter.

Liang Yi then called Zhong Yubo and asked him to pay attention to the changes in the condition of the old lady who ate moldy rice cakes.

Sitting next to him, Gan Xiaoyi said to Qin Hanyun: "Sister, is there really such a thing as hacking?"

Qin Hanyun shook her head and said, "I don't know, but Liang Yi and the others have expended so much energy on this lecture, so they should have their own judgment. If it doesn't happen, it's of course the best."

"It is."

Afterwards, Lu Chenhao straightened his expression and said at the meeting: "Actually, I have a purpose for calling you here this time."

The audience below began to whisper again.

"I knew there must be a purpose."

"Look, it must cost money."

"..."

Lu Chenhao said: "We may experience a hacker attack between 10 o'clock and 11 o'clock, and those hackers are coming to you."

As soon as this remark came out, there was an uproar in the audience and some people questioned his alarmism.

He made a quiet gesture and said: "You don't have to panic too much, because we have learned the news, but we don't know whether the news is true or not, so we have prepared a large number of temporary pacemakers in advance. If someone has a pacemaker malfunction, we will deal with it in a timely manner, and I can assure everyone that no one's life is in danger."

This sentence was quite dangerous for Lu Chenhao, but the matter was so urgent that he could only gamble his career in exchange for the trust of this audience. Liang Yi admired this sentence very much.

Liang Yi asked all the pacemaker patients present to wear a simple heart rate tester. Whenever there is an abnormality in the heart rate, the device will send out an alarm, and Liang Yi can lock and track it in the shortest possible time and deal with it.

On the other hand, Ouyang Ping'an was also capturing a lot of specific information about the hacking team. He suddenly jumped up and said to Liang Yi, "It's the shadow team. I saw it was the shadow team!"

Liang Yi also said excitedly: "Now that we know which team their team is, it will be easier for us to intercept."

"Yes, but they are too professional, I am still afraid of missing something."

Liang Yi thought of the shadow team that had caused Li Junhao's security team to retreat steadily, so he naturally knew his strength, and he said, "I know, but this is much better than the previous blind man feeling the elephant."

Ouyang Pingan said: "Now I can finally make two preparations, one is defense and the other is offense. Defense is to prevent shadow hackers from attacking the current source of cardiac pacemaker patients."

"Then how do we attack?"

"The offense was to find their server and then do a distributed DOS attack on their server to crash it.

Distributed DOS attack, its principle is to use a large number of data packets beyond the processing capacity of the attacked target to consume the available system and bandwidth resources of the system, and finally cause the network service to be paralyzed.

As an attacker, Ouyang Pingan first needs to invade and control the website of the shadow team through conventional hacking methods, and then install and start a special command on the server that can be issued by the attacker to control the process.
He tried to use the shadow team's IP address as an instruction, and when it was issued to the process, these processes began to attack the target host.

This method can concentrate a large amount of network server bandwidth to carry out an attack on a specific target, so the power is huge, and the bandwidth resources of the attacked target can be exhausted in an instant, causing the server to paralyze.

But it is very simple in theory, but this is a "fight" between two high-end hackers, like a fight between gods, it is difficult to tell the winner in a while.

10:00 am!

This is just an ordinary time in normal times, but today is too special.

When Liang Yi and the others saw the clock jumping to 10:00, their heartbeats suddenly accelerated.

"They really acted!" Ouyang Pingan said, he saw the signal from the shadow team to attack.

Next to him, Liang Yi saw a beam of scarlet light and shadow attacking the source power pacemaker company, and the scarlet light and shadow jumped repeatedly in their company.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like