Brian Selfridge realized his time was up. From his roost in a bolted meeting room with the blinds half shut, he could see two individuals from the emergency clinic IT group adjusting the corner with what resembled an unmistakable feeling of direction.
He stifled a grin as he watched the pair totally dominating one another.
One of them – forehead wrinkled, eyes covered in an open PC – strolled directly past his room, saying, “He’s here! He must be!”
Selfridge realized he was minutes, if not seconds, from being discovered. In any case, that was fine. He and his group had hacked into the medical clinic PC framework from a vehicle in the parking area a few days prior. They went in through a cardiovascular ECG framework that was a couple of years old thus more helpless against hacking than more current gadgets.
Yet, there were 10 alternate ways into the framework that would have been comparably simple.
Indeed, they didn’t should be anywhere nearby to do a hack this way. An all around made “phishing” email is ordinarily all you need to get the ball going. A clueless representative snaps on a connection inside the email and – blast! – you’re in. You could send that from anyplace – say from an office in Moscow, or Tehran, or Pyongyang.
He was just on location this time since he expected to get in as fast as could really be expected.
In the event that he’d had the opportunity, Selfridge would have halted to shake his head. However, with the IT group shutting in, he stowed his PC, gotten out a side entryway, and took off to discover his accomplice, who was hanging tight for him in a close by vehicle.