🚀R&D background
Cyber hacking incidents are happening around the world. In June 2017, a virus called “Petya” New ransomware has once again ravaged the world, including the Ukrainian Capital International Airport, the National Savings Bank of Ukraine, post offices, subways, shipping companies, Russian oil and gas giant Rosneft, Danish shipping giant Maersk, American pharmaceutical company Merck, and American law firm DLA Piper Law firms, some Ukrainian commercial banks, as well as some private companies, retail businesses and government systems, and even nuclear power plants were attacked. Affected countries include the United Kingdom, Ukraine, Russia, India, the Netherlands, Spain, Denmark, etc. Compared with WannaCry, the virus encrypts the NTFS partition and overwrites the MBR, causing the machine to fail to boot normally and causing a more serious impact. BadRabbit attacks Eastern Europe: In October 2017, the new ransomware BadRabbit broke out in Eastern Europe, targeting enterprises and infrastructure in Ukraine and Russia. Facilities were severely damaged. The virus disguises itself as flash_player to induce users to download it. When users download, the virus encrypts the file into a specific format, modifies the MBR, and demands Bitcoin. BadRabbit can spread within a local area network through weak passwords and vulnerabilities, becoming a typical representative of ransomware worms. In addition, ransomware viruses have also begun to attack mobile devices: In June 2017, a ransomware virus posing as the "Honor of Kings auxiliary tool" spread widely on PCs and mobile phones through social platforms, game groups and other channels, threatening almost all Android platforms. , once the device is infected, the virus will encrypt personal files in the phone, such as photos, downloads, cloud disks and other directories. If the extortion fee is not paid, the files will be destroyed and the system will not function properly. In addition to network security, the shortcomings of today's Internet are that in the current centralized Internet, the distribution of application benefits is also centralized, and due to the "giant effect", the rights and interests of Internet resources are increasingly concentrated in the hands of a few people or enterprises, and Most Internet participants contribute storage, bandwidth, and user resources to the Internet but do not get or receive corresponding returns. Network security. In the current centralized Internet, the distribution of application benefits is also centralized. Today's Internet is an open network. Network security needs to be achieved through special security strategies. A large number of intrusions and data leakage incidents continue to emerge. again. Today's Internet is filled with a large amount of information, and data that is useful to users is drowned in useless data. Too many internet flaws exist and surround us.
Thus, the Honeycomb Network was born, and we called on more people to join the Honeycomb Network.
Last updated