Chapter 284 - Chapter 284: Chapter 203: Do Him In! (Please Subscribe) (2/2)

It’s like a DDOS attack, which uses multiple computers or network nodes to send massive amounts of invalid or overloaded requests to a target server, thereby disrupting or even blocking normal network communication, causing the server to collapse.

Highly skilled hackers can take advantage of the server’s downtime to recover, invading the site and wreaking havoc.

However, as the founder of 720 Network Security Company and having experienced the virtual life of a ‘world-class hacker,’ Lin Chuan was calm and composed in such situations.

He didn’t even need to type any code.

He accessed the super firewall developed by the 720 Company.

However, Lin Chuan only activated the firewall’s basic defense mode.

The purpose was to make the attackers believe they could breach the firewall and lure them into continuing their assault.

This was to buy Angelina time to trace the attacking IPs’ origins.

“Idol, the site is under attack and might shut down from overload,” Angelina sent a message.

Lin Chuan laughed and replied, “I closed it protectively to safeguard users’ information and site data.”

“That’s good.”

“They are still performing XSS attacks and coupling it with ‘file upload vulnerabilities’ to attack our website server,” said Lin Chuan, his expression grave as he held a cup of Maojian tea and took a sip.

‘File upload vulnerabilities’ refers to attackers maliciously uploading files to the target server, using these files as a stepping stone to inject code, execute new commands, or perform other malicious operations.

Professional hackers can still attack the server even if the website is closed, altering server data to fulfill their objectives.

“I’m starting the tracking now.”

In North Bear, inside the HK studio, Angelina immediately opened the ‘Kaspersky’ network attack real-time tracking map.

Here, one can monitor the range and frequency of hacker attacks worldwide and differentiate between various types of attacks.

As a member of the North Bear HK Hacker Organization, Angelina is well-versed in operating ‘Kaspersky’ and in tracking network attacks.

She began her pursuit at once!

Half an hour later.

After meticulously unraveling the tangled web, she traced the true attacker from a multitude of decoy IPs.

—Originating from Southeast Asia.

“God of Hackers, it’s the Morgan Group!” Angelina immediately analyzed the IP and drew a conclusion.

“Morgan Group?”

Lin Chuan heard the name and furrowed his brows slightly.

He had heard the name several times in the dark web, but he wasn’t particularly clear about what the Morgan Group was involved in.

Angelina explained, “Morgan Group is a massive enterprise in gray and black industries. Its operations include addictive drugs, arms, money laundering, and so forth, commanding numerous hackers and assassins, and a host of Cleaners.”

Lin Chuan’s pupils constricted slightly.

This was a professional and vast gray and black force!