Chapter: 740
Norah wondered if she should ask Sean to investigate the accident of her parents...
Shaking her head, she decided against it.
She hadn't figured out how to help the Wilson family reclaim its stature in Glophia yet, so that issue would have to wait.
She carefully reviewed the information Sean had sent her. She didn't recognize the doctor from Victoria Hospital or the nurse from Silver Boulder Private Hospital. Regarding the organization paid to spread rumors, it seemed they were simply paid to create chaos.
ALL she needed to do was find out who had hired them.
“Thank you, darling," she noted. Since she now had enough details, she could proceed on her own.
But there was another important task to address.
She logged back into the hacker forum and checked her friend list, noticing that a certain contact was online. The corner of her mouth turned up.
Free help was just a message away.
“Come out and help," she typed.
JW replied with a screaming emoji, "Is the top hacker asking for my help? I'm so lucky!"
Norah replied, "Calm down. Here's the link. I need you to hack the devices of those who've spoken harshly there, and plant a couple of viruses while you're at it."
JW responded, "So many?! All of them?! Man, I have to go to work tomorrow."
Norah encouraged him, "Show off your skills and keep it up. I believe in you."
JW said "I'll do my best! Don't forget to include me for any benefits!"
Feeling pleased after giving the instruction, Norah was in high spirits.
JW, who was from another country, had almost been overwhelmed by several hackers when he first joined the hacker forum, but Norah had come to his rescue. Since then, JW had become her most reliable ally, always ready to assist her.
Though JW's hacking abilities were not outstanding, he was certainly capable of handling the task she had assigned to him.
The country's lack of attention to cybersecurity made their firewalls merely a thin layer, which could easily be breached.
She aimed to make those hiding behind their screens realize the inconvenience of having their devices compromised.
If she found the time, she planned to develop a program to embed in the link that would infect anyone who responded to the post, delivering a hefty dose of computer viruses as a surprise.
JW had taken over the task, so she decided to just wait for the results.
She wasn't one to stay silent when attacked. Rumors didn't affect her as much as outright slander. Clearly, someone was targeting her.
Investigating the organization was straightforward. Many accounts shared the same IP addresses, allowing her to take control of the server, sift through the chat logs, and trace the data.