031 Finding a needle in a haystack
“How did you feel when you go to work on the first day?”
What Meng Fei didn't expect was that Luo An's WeChat avatar would light up and send greetings on his own initiative.
During working hours at a bank station, you are not allowed to turn on your phone at all.
They can only use their work WeChat account to operate on their computers.
But Meng Fei is not restricted by this. He has Internet skills. The strongest bug system in his brain directly controls the mobile phone in his pocket.
“It feels OK.”
Meng Fei is actually talking about the girls around him.
"Is the case a tricky one?"
Luo An only cares about the important things.
If the experts he chose can successfully solve the case, the relationship between Mantis Software and relevant departments will be further deepened, and they will be more qualified to compete for more projects.
But if it is a mess, Meng Fei's losses will be small, and Mantis Software's reputation will be huge.
"Don't worry, boss, I'll do it."
Luo An was stunned. I heard that this kid was introverted and cautious, but why is he so arrogant now?
In fact, this case is indeed difficult. Even if he has the system in hand, there is still some trouble.
But always be full of confidence in front of your boss, unless you can't get along with your future.
This case seems very simple, but the money from several VIP customers was inexplicably transferred away.
But it is complicated and complicated. The real reason is like finding a needle in a haystack.
In the past two weeks, hundreds or thousands of small amounts of funds have been continuously transferred from the accounts of the VIP customers of Jingui Bank to an illegal account that has been monitored.
The bank did not immediately shut down the illegal account. This is actually not very meaningful. This account is just a mastermind who uses it to collect money.
If you block this, he can still go to other accounts. Your monitoring may not be able to be monitored by then.
Jingui Bank's VIP customers are all wealthy, so they usually don't pay attention to this small amount of money transfer.
When the banker called to ask, they found that the money in their accounts had been transferred inexplicably, and they all denied that they had operated it.
Judging from the system records, the money is transferred through legal operations, inputting the username and password.
But these operations do not come from these VIP users' own computers or mobile phones.
Some people may think, Oh, I just need to check the IP addresses of these operations and find where the operator is.
In fact, this meaning is for reference only.
Even if people don’t deliberately hide, with NAT forwarding everywhere now and countless machines sharing IP addresses, it will be difficult for you to locate a real black hand through IP addresses.
If the other party sets up a proxy to move the IP overseas, or simply walks on the street to find a place where wifi is black and surf the Internet, you can easily put the blame on others.
The Criminal Investigation Bureau Cybersecurity Department is responsible for this case. They have investigated this information and sent it directly to Meng Fei's email.
He browsed one by one and could see that the machines that initiated the operation were scattered and irregular.
There are mobile phones and computers, domestic and foreign, companies and private ones, and even servers that are obviously hacked.
This is a real veteran, a veteran who leaves no trace.
If it is just that VIP customers really leak their passwords, it is not a serious problem.
It’s a bit scary that the accounts and passwords of hundreds of VIP customers have been leaked at the same time within two weeks. You don’t even know how much it has leaked out.
The account list of VIP customers is only saved in the bank. Therefore, even if you don’t talk about how the password is leaked, the account list may only be leaked from the bank.
If there is really a leak, the Mantis software cannot be separated. The security system of the Golden Turtle Bank is developed and maintained by the Mantis software.
It is precisely because of this that the bank asked the Criminal Investigation Bureau to invite an expert familiar with Mantis Software from the Expert Academy to participate in the investigation.
This is Meng Fei who just took office.
His mission is not to catch the mastermind behind illegal money transfers, but to find out how the bank accounts of VIP users were leaked.
A task like looking for a needle in a haystack.
But VIP account managers are the biggest suspects.
Because there is a huge pit here, it is also the weakest part of the entire system.
The VIP account manager's computer can access VIP customer information from the server, which is necessary for them to operate.
Just to prevent account managers from leaking this information, the security system is blocked by technical means so that they can't see it.
If there is a way to break through the blocking of the security system, account managers may get this information and sell it to the black industry organization.
This does not mean that it is impossible to leak through other ways. However, with Meng Fei's experience, hackers are always likely to choose the easiest link to start.
He must first be familiar with the operation routines of VIP account managers, and then analyze step by step whether there is any possibility of breaking through the blocking step by accident.
Even if there is no on the surface, if you see every line of code and every instruction in detail, the vulnerability may be hidden.
Perhaps normal operations cannot be triggered, and some special actions can be exposed.
For example, there was a very funny vulnerability in Windows in his previous life.
Originally, you had to enter your username and password when logging in. Later, someone accidentally discovered that by switching the input method when entering your password, you can skip this step.
Password limitations become useless.
Perhaps the source of the leak was that an account manager accidentally did an unusual operation and downloaded the user's account list?
Meng Fei had no need to analyze it step by step, he directly called out the bug system.
"Scan all vulnerabilities that may expose VIP customer accounts."
At this time, he could feel countless codes and logic running through his mind like lightning.
When he used the strongest bug system in the first few times, he didn't feel this way, and everything passed without any consciousness.
Now I can feel that as the level increases, his control and understanding of this power from the system is becoming stronger.
He could feel the powerful computing power that came from somewhere, and was analyzing every bit at an incredible speed.
Finally, a series of loopholes were listed.
He shook his head repeatedly when he saw it.
These vulnerabilities are not unavailable, but it is too difficult to use them.
If you get a development team, you may be able to use one or two of them after working hard for a few months.
It is impossible for a VIP account manager sitting here to exploit these vulnerabilities to obtain a client's account.
But the results of his analysis this time can only confirm that the client in front of him and the server he connected to this time have no problems.
He didn't know if other machines would be different.
Theoretically, the software on these machines is the same.
But no one knows whether different machines will be equipped with different versions of patches, or will simply be installed by insiders with Trojans that directly destroy the security system?
He intends to analyze all the machines used by VIP account managers.
This is not just a scan of antivirus software.
Antivirus software can only recognize recognized viruses and Trojans. If you write a program yourself to "steal" information already on your machine, you will most likely be ignored by antivirus software.
What he needs to scan is all the code that may be run on the machine, whether it is a virus or not.
He needs to know where they are, their purpose of operation, their specific behavior, and whether there are loopholes.
It is equivalent to a comprehensive security test of a lot of unknown software.
This probably involves more than 300 computers in the account manager's office on this floor.
In the past, even if it was not counted as the time to develop scanning tools, it would be good to get ten units a day, and this job was at least one month.
But now he can just scan one by one with the bug system one by one.
Of course, he would not walk around in front of every computer in full view of everyone. And time is not that urgent.
He would do this when everyone gets off work and is late at night.
So for the rest of the day, just hang out on the website and flirt with girls on WeChat.
The morning working hours always pass extremely quickly, especially when there is a beautiful girl sitting next to you.
At this time, he heard a gurgling sound.
He lowered his head and said to the girl beside him:
"Your stomach is ringing."
Xiao Han, who had been busy with work and forgot time, only then did he realize.
"Oh, I'm so sorry, I almost missed the meal!"
Chapter completed!