In Hollywood's view, hackers are like black magic guides using computers. In movies, computers can blow up homes, close highways, release plagues and Trigger feminism. Some people may think that Hollywood's imagination is full, but the reality is bone feeling. They are wrong, because in reality, it is also like the film described the hacker action, and the level of stimulation is no less than the film.
1. Logic bombs detonate in Siberia
In 1982, the CIA in Ronald Reagan discovered that the KGB had stolen technology from the West for years. In this respect, the CIA decided to set a huge trap for the KGB, which is probably the first Trojan virus ever used in history. They had some knowledge of what the KGB was going to steal, so they deliberately leaked a "secret software": the "Mighty"--cia to help adjust the gas pipeline project to plant a "logic bomb" in the software.
The software runs in the same way that if you switch to 100,000 cycles from the original mode, the logic bomb will start. But the KGB were not stupid-they checked what they had stolen-but later did not find anything unusual. The software was very helpful to them at the time, and could be used in a natural gas pipeline project in Siberia stretching to western Europe.
The program worked well in the last few months (mentioned above 100,000 times), but in June 1982 the US spy satellite detected a very large explosion at the Siberian pipeline construction site. The explosion was 30,000 tonnes, about one-fifth of the power of the atomic bomb cast in Hiroshima. The US magazine described it as "the greatest nuclear-weapon-free explosion seen from space".
2, a laptop to the Defense Department's knee in an arrow
The US military computer network was invaded by a worm called Agent.BTZ, which came from a laptop in Afghanistan and was then spread by USB flash drive into the military's central Command. Next, Agent.BTZ stole the secret material from the State Department and the Pentagon and then sent the top-secret information to the unknown owner.
The U.S. Department of Defense immediately launched an emergency response, the network Military department through the top-secret network to isolate and remove malicious code. But Agent.BTZ has the ability to scan computers to find data, then open the back door, copy itself to other networks, continue to transmit data and make back doors. In addition, Agent.BTZ continues to mutate, downloading new code to change its "signature" and evade detection. Later, newer, more complex variants of Agent.BTZ appeared on the web, then lurking 1.5 later, and then began to steal confidential documents.
Finally, guess what? The U.S. military has taken the most primitive approach, taking hundreds of of computers offline and reformatting them, and destroying thousands of infected U-disks. In the end it was barely over the virus.
3, hackers "kidnap" medical records and obtain money
In July 2012, a group of hackers hacked into a surgeon's computer network in medical practice, then encrypted the patient's medical records and other sensitive files throughout the database so that others would never see it. The hacker then released a message saying that the database would be restored if a full ransom was paid. The surgeons then shut down the server and then contacted the police and informed their customers that their information had been compromised.
Also in 2008, the prescription drug company Express Scripts received an email with 75 clients ' social Security numbers and prescription records demanding a specified amount to keep information safe. Of course, Express scripts decided to put the interests of its clients first and refused to pay, and then emailed 700,000 of their clients to let them know that their message could have been stolen.
4, Virus Spy
It is known as the Flame, which is a 20 trillion malicious program that runs in several Middle Eastern countries, particularly Iran. Flames can replicate data files, capture sensitive screenshots, download Instant Messenger, remotely turn on the computer's microphone and camera, and record what is happening near it in any conversation.
The flame receives commands and data through the Bluetooth system, and it also has innate capabilities: false vouchers to avoid being found. It performs an obscure encryption technique known as a prefix collision attack. It can also automatically remove itself from the infected computer and destroy all traces of it.
The flames were disguised as Microsoft software updates for the first five years, until an occasional chance was discovered in Iran. Iran accuses the United States and Israel of creating flames, but the two countries do not admit they did it.
5. Stuxnet Virus for Iran nuclear power plant only
As we mentioned earlier, it turns out that, in addition to the virtual world, hackers can also destroy objects in reality. A virus known as the dormant state of Stuxnet was discovered in the network of factories, power plants and traffic control systems around the world in June 2010. Strangely, in every system that discovers the virus, the virus does nothing: it's like a zombie, but it turns out Stuxnet is waiting.
Viruses in general, just as violent as a werewolf broke in and began to spoil something. The Stuxnet virus is different: it has a specific target-Iran's uranium enrichment facility: the centrifuge at Natanz, where its destructive effects can only be activated. It turned out that the Stuxnet virus controlled 30% of the computers at the Natanz facility, which Iran eventually recognized as a virus and temporarily shut down its nuclear facilities and nuclear power plants.
This column more highlights: http://www.bianceng.cnhttp://www.bianceng.cn/Network/Security/