Nicholas booted up his computer, made sure he was on the secure internal red server. If he was going to stop this attack, he had to enter the world that was alive and well and lived behind the Web. He initiated his TOR software, left the real-world Internet behind, and headed into the darknet.
He plugged in Gray’s files, started probing the firewalls COE had set up.
Gray was right. The coding was good. More than good, it was solid. Seemingly unbreakable.
“No, this won’t do at all,” he said, and started typing, launching his own protocols to attack the worm.
Three minutes later, two layers of encryption were down. Now he was staring at a deep network of code. Whoever had written it was incredibly sophisticated, which helped narrow the suspects. He kept digging and noticed a repeated line of code. He felt a niggling sense of familiarity—it was the structure of the language. Flashy, that was it, “aren’t I clever; you’ll never catch me” flashy. After examining the threads for a few moments, he saw what he needed, and he smiled. This code wasn’t homegrown in the United States. This had been bought from an outsider.
A few more clicks and he knew he was right. The hacker who’d written the code was more than sophisticated, he was on the highest level. And then it came to him—he knew. It was the electronic signature of a German he knew. Gunther Ansell sold hijacked server proxies to the highest bidder—making millions of dollars per proxy. Gunther had always been an egotist, and Nicholas had always known if Gunther kept showing off with his code, putting in his signature, it would be his downfall one day.
Sorry, Gunther, today isn’t going to be your day. He buzzed Gray. “I’ve got a line in.”
Gray came to his cube, laptop in hand. “How did you do it?”
“I’ll show you once we’ve stopped their attack. Call the IT guys who are working for these companies, tell them to ready their new code now. I’m going to need you for a side attack. Upload our denial-of-service package, and I’m going to throw a little homegrown code into the mix. We have to move fast to break their stranglehold. By now they know the breach has been noticed and they’ll be working to close the loop.”
Gray pulled up a squeaky chair, set the laptop on it, and knelt on the floor, brought up a screen full of code. “Ready when you are.”
“Three, two, one . . . go.”
Gray launched his attack, and Nicholas did as well, using his own code to snap along Gunther’s, attacking, dissolving thread after thread. Gunther was good, very good, but so was Nicholas. Five minutes later the first firewall came down, and Nicholas had control of the ConocoPhillips server.
Nicholas pumped a fist in the air. “Yes! Now we’re on to Occidental’s mainframe.”
Twenty minutes later, they’d wrested back control of all the servers and handed them off to the IT heads of each company.
Nicholas let out a big breath. The damage done by the cyber-attack would take weeks to undo, but at least they’d stopped it cold. The companies wouldn’t know the depth of their issues until they had a chance to do a full security assessment. There was no doubt in his or Gray’s mind the attacks would continue, and soon. But for now, they’d won.
“Gray, pray it will hold. COE’s hackers will try to attack again, I’m sure.”
“Still, it’s a big save. Good going, Nicholas. Zachery will be very pleased, as will the CEOs of the companies we bailed out.”
Nicholas looked at the clock. “It’s late morning in Germany. This genius—Gunther Ansell is his name—he isn’t known to frequent daylight. Chances are right now he’s at home, asleep.” Nicholas grabbed his cell. “If we move fast enough, we can get people in to snatch him before he wakes. We’ll have them take him to a dark site, have a chat with him, get a line into who hired him to build the code and how they paid, and boom—we just might have our problem solved.”
“Who are you going to call?”
Ghostbusters. “FedPol,” he said, and dialed.