Hardcore crisis

Chapter 49: Fear

In this dark web world that is almost unknown to ordinary people, various illegal activities and espionage activities are communicated in secret, including Bitcoin transactions, money laundering, human trafficking, arms market, illegal propaganda, illegal gambling, and intelligence trading. Wait, using this network, anyone can do things that violate laws and ethics anonymously without worrying about too many dangers.

The reason why I say too much, but not completely, is that governments in various countries are also monitoring the dark web, striving to grasp the core of the dark web and control the lifeblood of the entire dark web. For the US FBI and Cyber ​​Operations Command, which have huge resources, the results achieved in recent years are pretty good.

However, beneath the dark web, there is a more secretive network called the "black box."

"Black box" does not specifically refer to a special network address, but refers to a contact method that no third party knows except the two parties involved in the transaction. The characteristics of "black box" are more terrifying than that of the dark web. There are at least traces of the dark web, but the "black box" will use social engineering to transmit secret information in real life, and then through several real-life contacts, then After decrypting the secret information, the information is transmitted through the network.

For example, using games to convey each other’s transaction information.

In "Minecraft", specific blocks are placed to spread information, and in shooting games, character gestures are used to convey intelligence. This new type of intelligence trading in recent years is ten times more secretive than traditional information dissemination.

With Sonny's ability, it may be difficult to control the "black box". It is just luck to accidentally detect anomalies, but for Sonny, there are no secrets in the dark web.

According to Lu Yuan's instructions, a large number of stolen credit card accounts, as well as money laundering, gambling, Bitcoin transactions, and various bad debt loopholes were all exploited by Sonny. In just over a week, he had stolen money in at least a dozen countries. Ten banks registered a large number of accounts, and a large amount of laundered funds were quietly transferred into them, totaling more than 500 million US dollars.

This is a large number, but in the online world where trillions of funds flow every day, this batch of funds is divided into dozens of transactions and cannot attract anyone's attention.

Of course, there were still some obstacles to using the money domestically, so Lu Yuan then registered some offshore companies in the British Virgin Islands. It is true that these offshore companies do not have legal certificates and corresponding documents, but as long as no one checks the paper certificates and just look at the certificates on the Internet, these offshore companies are definitely legal and reasonable formal business enterprises.

With these back-ups, when Lu Yuan starts up the domestic company, the funding problem will not be a big problem.

Running a company in China requires traveling around. However, there are many things in this world that cannot be solved without money. As it is troublesome and wastes time, Lu Yuan entrusts an agent to register the company and does the errands. He only needs to do a few things that cannot be done for him. .

But personal experience is still indispensable.

Lu Yuan found it troublesome, but compared to him, someone hundreds of kilometers away almost soaked his entire clothes with cold sweat.

In fact, three minutes ago, Qiu Hong was still a very confident person.

But after three minutes passed, he quickly changed from a very confident person to a guy who was deeply unconfident and extremely scared.

The reason is simple, it's just a photo.

Photos are something everyone has. With the advent of mobile phones as a powerful camera tool, the number of photos produced every day is equal to the total number of photos produced in the past few decades.

In this day and age, no one is afraid of photos, let alone a selfie.

The premise is that the source of this selfie is normal.

Three minutes ago, he had just quit the game. After satisfying his daily entertainment, he was about to open QQ to joke and chat with his little sisters. At this time, the printer next to the computer suddenly started working.

Before he quit his job, he occasionally needed to print some documents. Qiu Hong bought a printer, which can not only print copied documents, but also color photos. It can be printed through a mobile phone connection without turning on the computer. It is really very useful. convenient.

Now, he felt extremely regretful about purchasing this printer.

The printer whirred and a five-inch color photo was slowly printed out from the outlet. Qiu Hong, who was operating the computer and staring at the screen, turned his head over in confusion and happened to see the front of the color photo.

It was a selfie, a selfie of him.

The dark circles under his eyes, the disheveled hair, and the dry, unwashed face, who else could he be?

Something's wrong with the printer?

This was his first thought. Then the second thought was that it’s impossible!

No matter what went wrong, he never had a selfie on his computer or mobile phone, and he never printed a selfie. How could it be possible to make something out of nothing!

Then, when Qiu Hong picked up the photo in confusion, his eyes widened and he almost jumped out of his chair.

Not only does this selfie look familiar, there are several lines of information on it, including his name, date of birth, work experience, account balance, home address and other information.

Is this a machine failure?

Qiu Hong, who is a hacker himself, immediately noticed something unusual. Didn't the angle of the photo come from where he placed the camera?

Unknowingly, the camera was activated, took a picture of him and sent it to the printer to print out...

Is this an accident due to machine failure?

still……

Cold sweat instantly soaked Qiu Hong's clothes. Ten seconds after fear enveloped his heart, his first action was to pull off the camera cord.

It was so shocking. As a hacker with decent skills, Qiu Hong understood how terrifying this was. It is indeed fun to hack into other people's computers and use cameras to monitor others, but if you change the target to yourself, it is not an endlessly interesting thing. Just think that no matter what you do, every move you make is monitored by others. Next, he couldn't help but feel his scalp numb.

He was no longer in the mood to video chat with his sisters. After pulling off the camera, he sat on a chair and took a few breaths. Qiu Hong picked up the photo, and the surprise in his heart still hadn't dissipated much.

Even if his name, home address, etc. were leaked, he bought a lot of things online. It is normal for this information to be leaked, but why is he so clear about his bank account balance?

There were three savings cards in total, and the balance on each card was clearly marked. It was so clear that Qiu Hong felt it hurt his eyes just by looking at it.

How is this done?

Has your bank information been leaked?

Impossible. He was the only one who installed the Trojan on other people's computers. How could someone install the Trojan on his computer quietly?

Calm, calm!

Forcing himself to calm down, Qiu Hong quickly used the tools he wrote to start searching for suspicious clues on the computer.

Five minutes, ten minutes, until a full thirty minutes passed.

He had to admit one thing, either he did not have a Trojan on his computer, or the person who hacked him had a much higher technical level than him.

Since he couldn't find any clues, Qiu Hong felt even more cold. He felt that all the operations on the computer were under the surveillance of others. He immediately shut down the computer, then leaned down and pulled out the power plug of the computer, and then reluctantly He breathed a sigh of relief.

"Woooo..."

Less than half a minute after he was relieved, Qiu Hong suddenly turned around and watched dumbfoundedly as the printer quickly sprayed out photos, one by one as if he was possessed by a demon, and he frantically spit them out, all of which were his personal selfies and photos. Concealed identity information.

"Ahhhh..."

Qiu Hong stood up in anger and fear, pulled out the power plug of the printer, ran to the living room, turned off the wireless router, and then walked back to the study room sweating profusely, sat down and panted heavily without speaking.

But then, something even more frightening happened again.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like