How to solve bitcoin virus
Publish: 2021-04-29 19:45:41
1. Wannacry virus is spread based on Windows system, and smartphone users will not be affected. To prevent viruses, please open the system control panel - system and security - install system patches. If you do not open the system patch function, please open and repair all vulnerabilities immediately. It is recommended to upgrade the system for systems below Windows 7. Thank you for your support and trust in Tencent housekeeper.
2. The device that has been infected with the virus is reinstalled. Delete all disks and recreate them
3. In short, blackmail virus is a computer virus that uses Windows system vulnerability to maliciously encrypt user files and then extort money < / UL >
{rrrrrrr}
10
(3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning
4. Hard bifurcation is defined as permanent divergence in the blockchain. After the release of the new consensus rules, some nodes that have not been upgraded cannot verify the blocks proced by the upgraded nodes, and usually hard bifurcation occurs. It doesn't matter whether blockchain hard forking is good or bad. This problem depends on how to treat it. Blockchain itself is just a technology that anyone can use. This technology is not mature at present, and there are not many mature projects. Yuanying China is just trying a new mode of blockchain crowdfunding.
5. 1, this kind of software generally exists virus
2, install a computer housekeeper to kill virus for your computer
3, after installing, directly use the virus checking and killing function to completely delete the virus
2, install a computer housekeeper to kill virus for your computer
3, after installing, directly use the virus checking and killing function to completely delete the virus
6. Anti virus expert: the damage caused by bitcoin virus is irreversible, and even if the ransom is paid, it may not be relieved.
Mr. Li in Cheng recently encountered a strange thing. His computer seems to be under the control of hackers, and all the files can't be opened. There is also a mysterious English conversation on the computer screen. It turned out that Mr. Li's computer was kidnapped by a bitcoin virus, and the "kidnapper" proposed to use three bitcoins as a "ransom" to buy decryption software. Anti virus experts warned that the damage caused by this blackmail virus is irreversible and should be carefully prevented
after an English recitation, all the computer files were encrypted
"on the afternoon of October 4, my children used the computer to do their English homework. After that, the computer didn't turn off. After about an hour, the computer suddenly made a sound in English, just like recitation." "Because the child was doing English homework, he didn't think much about it at that time. As a result, he saw that the computer desktop had been modified," Mr. Li recalled
six days later, Mr. Li's desktop still looks the same as it did in the afternoon. The background of the desktop turns white and there are several lines of green English in the middle of the screen. Every file on the desktop, including word documents, JPG images and videos, has been changed in format“ These files can't be opened. After clicking open, there will be a prompt that there is no corresponding software. "
Mr. Li realized that there might be a virus in the computer, so he quickly tried to translate the English on the desktop“ Files and data have been encrypted. The only way to decrypt files safely is to pay three bitcoins to buy a decrypted file. If you use third-party software to decrypt files, you will suffer irreparable losses. " Mr. Li said
several web addresses are attached to the text. You can buy the decryption software in English by clicking on these web addresses“ I didn't click on these links. I'm worried that there will be more trouble after I click on them. " Mr. Li told reporters that when he first encountered such a strange thing, he couldn't figure out what was going on
it's impossible to crack a bitcoin with 4100 yuan, but it's painful to pay for it.
with doubts, Mr. Li asked the relevant experts of UESTC for advice. After looking at Mr. Li's computer, experts concluded that the one implanted in Mr. Li's computer is most likely bitcoin virus“ This virus, also known as bitcoin Trojan horse, encrypts 114 kinds of files in the infected computer, making it unable to open normally, and "blackmail" the owner by pop-up windows. "
it is understood that bitcoin virus appeared abroad as early as 2014 and began to appear in China in early 2015. The reason why it is called bitcoin virus is that the virus will ask the victim to pay 3 bitcoins as ransom for the purchase of decryption software. Bitcoin, a virtual currency, can only be used in the digital world, making transactions difficult to track
not only that, the encryption method of this virus is quite complex, "it takes hundreds of thousands of years for brute force cracking, and it also takes more than ten years or even decades for supercomputer cracking."“ I have also consulted several IT experts. They all said that this virus is difficult to decrypt. They also suggested that I negotiate with hackers to buy decryption software at an appropriate price. " Mr. Li said helplessly< In other words, Mr. Li needs to spend 12000 yuan to buy decryption software“ The documents I have stored in my computer for more than 10 years, as well as the photos of my life and work in recent years, have all been illegally destroyed. " When Mr. Li thought of it, he felt distressed< At present, Mr. Li has reported the case to the local police station and is waiting for the police to investigate and deal with it<
blackmail viruses are good at camouflage, and the damage caused by them is irreversible
Li Tiejun, an anti-virus expert of Jinshan company, told reporters that recently, such as bitcoin Trojan horse and other kinds of blackmail viruses are more common“ This kind of virus uses the encryption processing inside the system, and it is an irreversible encryption, so it is possible to crack it only when you get the secret key of decryption. In other words, in addition to the virus developers themselves, other people are impossible to decrypt
according to reports, blackmail viruses are usually spread through e-mail, disguised as working documents inside the computer system, incing computer users to open documents“ If the user does not pay attention to the security warning, the virus program may run Li Tiejun said,
"in the early version of blackmail virus, the decryption key may exist in the registry of the system, but we have analyzed the current popular virus version, which can't be removed." Li Tiejun said that what is more serious is that the principles and methods of bitcoin virus have been disclosed on the Internet for a long time, "many hackers carry out transformation and develop more virus variants."
as for Mr. Li's claim of spending money to buy decryption software, Li Tiejun said that the statement of virus developers is not credible“ Virus encryption is an irreversible encryption, and the damage caused by it is also irreversible. " Li Tiejun said, "and do not know who the other party is, even if the ransom, it may not be able to lift."
therefore, Li Tiejun reminded that important files should be backed up in time. In addition, special care should be taken when dealing with e-mail, "for suspicious programs, do not open them on your own computer."“ There is also the installation of security software on the local computer. Now some security software can intercept the new blackmail virus. Even if the virus features are not found, the virus can intercept the encryption action in the process of encrypting files. " Dong Xingsheng, reporter of West China Metropolis Daily
Mr. Li in Cheng recently encountered a strange thing. His computer seems to be under the control of hackers, and all the files can't be opened. There is also a mysterious English conversation on the computer screen. It turned out that Mr. Li's computer was kidnapped by a bitcoin virus, and the "kidnapper" proposed to use three bitcoins as a "ransom" to buy decryption software. Anti virus experts warned that the damage caused by this blackmail virus is irreversible and should be carefully prevented
after an English recitation, all the computer files were encrypted
"on the afternoon of October 4, my children used the computer to do their English homework. After that, the computer didn't turn off. After about an hour, the computer suddenly made a sound in English, just like recitation." "Because the child was doing English homework, he didn't think much about it at that time. As a result, he saw that the computer desktop had been modified," Mr. Li recalled
six days later, Mr. Li's desktop still looks the same as it did in the afternoon. The background of the desktop turns white and there are several lines of green English in the middle of the screen. Every file on the desktop, including word documents, JPG images and videos, has been changed in format“ These files can't be opened. After clicking open, there will be a prompt that there is no corresponding software. "
Mr. Li realized that there might be a virus in the computer, so he quickly tried to translate the English on the desktop“ Files and data have been encrypted. The only way to decrypt files safely is to pay three bitcoins to buy a decrypted file. If you use third-party software to decrypt files, you will suffer irreparable losses. " Mr. Li said
several web addresses are attached to the text. You can buy the decryption software in English by clicking on these web addresses“ I didn't click on these links. I'm worried that there will be more trouble after I click on them. " Mr. Li told reporters that when he first encountered such a strange thing, he couldn't figure out what was going on
it's impossible to crack a bitcoin with 4100 yuan, but it's painful to pay for it.
with doubts, Mr. Li asked the relevant experts of UESTC for advice. After looking at Mr. Li's computer, experts concluded that the one implanted in Mr. Li's computer is most likely bitcoin virus“ This virus, also known as bitcoin Trojan horse, encrypts 114 kinds of files in the infected computer, making it unable to open normally, and "blackmail" the owner by pop-up windows. "
it is understood that bitcoin virus appeared abroad as early as 2014 and began to appear in China in early 2015. The reason why it is called bitcoin virus is that the virus will ask the victim to pay 3 bitcoins as ransom for the purchase of decryption software. Bitcoin, a virtual currency, can only be used in the digital world, making transactions difficult to track
not only that, the encryption method of this virus is quite complex, "it takes hundreds of thousands of years for brute force cracking, and it also takes more than ten years or even decades for supercomputer cracking."“ I have also consulted several IT experts. They all said that this virus is difficult to decrypt. They also suggested that I negotiate with hackers to buy decryption software at an appropriate price. " Mr. Li said helplessly< In other words, Mr. Li needs to spend 12000 yuan to buy decryption software“ The documents I have stored in my computer for more than 10 years, as well as the photos of my life and work in recent years, have all been illegally destroyed. " When Mr. Li thought of it, he felt distressed< At present, Mr. Li has reported the case to the local police station and is waiting for the police to investigate and deal with it<
blackmail viruses are good at camouflage, and the damage caused by them is irreversible
Li Tiejun, an anti-virus expert of Jinshan company, told reporters that recently, such as bitcoin Trojan horse and other kinds of blackmail viruses are more common“ This kind of virus uses the encryption processing inside the system, and it is an irreversible encryption, so it is possible to crack it only when you get the secret key of decryption. In other words, in addition to the virus developers themselves, other people are impossible to decrypt
according to reports, blackmail viruses are usually spread through e-mail, disguised as working documents inside the computer system, incing computer users to open documents“ If the user does not pay attention to the security warning, the virus program may run Li Tiejun said,
"in the early version of blackmail virus, the decryption key may exist in the registry of the system, but we have analyzed the current popular virus version, which can't be removed." Li Tiejun said that what is more serious is that the principles and methods of bitcoin virus have been disclosed on the Internet for a long time, "many hackers carry out transformation and develop more virus variants."
as for Mr. Li's claim of spending money to buy decryption software, Li Tiejun said that the statement of virus developers is not credible“ Virus encryption is an irreversible encryption, and the damage caused by it is also irreversible. " Li Tiejun said, "and do not know who the other party is, even if the ransom, it may not be able to lift."
therefore, Li Tiejun reminded that important files should be backed up in time. In addition, special care should be taken when dealing with e-mail, "for suspicious programs, do not open them on your own computer."“ There is also the installation of security software on the local computer. Now some security software can intercept the new blackmail virus. Even if the virus features are not found, the virus can intercept the encryption action in the process of encrypting files. " Dong Xingsheng, reporter of West China Metropolis Daily
7. You can use Tencent computer housekeeper to check and kill viruses as follows
1. First, upgrade your antivirus software and update the virus library to the latest
2. Open Tencent computer Housekeeper - virus checking and killing
3. Select lightning, overall or designated location (three kinds of checking and killing modes, according to your own needs). During the process of killing, you will scroll the process description and display the progress bar. In its traditional interface, it displays the start status of the antivirus engine in the form of icons, and displays the identification times of suspicious behaviors, the number of files scanned safely and other information
4. Wait patiently for the end of the scanning, if there is any abnormality, you can click to deal with it and clean up the virus
5, You can also choose to turn on the Tencent computer manager in safe mode, and follow the above steps for antivirus
turn off the computer, cut off the network, and select the entry mode (press the F8 key to start the computer and select the first item to enter the mode. This mode only starts the basic driver, and does not load other software. Then open your virus software and clean it up
1. First, upgrade your antivirus software and update the virus library to the latest
2. Open Tencent computer Housekeeper - virus checking and killing
3. Select lightning, overall or designated location (three kinds of checking and killing modes, according to your own needs). During the process of killing, you will scroll the process description and display the progress bar. In its traditional interface, it displays the start status of the antivirus engine in the form of icons, and displays the identification times of suspicious behaviors, the number of files scanned safely and other information
4. Wait patiently for the end of the scanning, if there is any abnormality, you can click to deal with it and clean up the virus
5, You can also choose to turn on the Tencent computer manager in safe mode, and follow the above steps for antivirus
turn off the computer, cut off the network, and select the entry mode (press the F8 key to start the computer and select the first item to enter the mode. This mode only starts the basic driver, and does not load other software. Then open your virus software and clean it up
8. Direct use of anti-virus software can directly kill the virus, but the file is encrypted, the algorithm can not crack, can only recognize the bad luck
9. According to the report from the Internet news, experts say that once they win the recruitment, there is no solution at present.
ZHENG Wenbin said that there has been a worm virus spreading through port 445 in China, so some operators have blocked port 445 for indivial users. However, because the ecation network does not have this restriction, the campus network has become a "disaster area" attacked by blackmail virus
ZHENG Wenbin said that for computer users infected with blackmail virus whose files are encrypted, if they want to get the files back, at present, they can only pay bitcoin, and there is no other better way. But even if they pay bitcoin according to the requirements of criminals, there is no guarantee that they can get the encrypted files back. "We are also trying to find a way, Try to see if you can decrypt the encrypted file, but there is no other way
according to Zheng Wenbin, according to their monitoring, at present, in addition to the ecation network and campus network of some domestic colleges and universities, enterprises have also been affected by viruses, and some civil facilities, such as the computer systems of gas stations, have also been attacked by viruses.
ZHENG Wenbin said that there has been a worm virus spreading through port 445 in China, so some operators have blocked port 445 for indivial users. However, because the ecation network does not have this restriction, the campus network has become a "disaster area" attacked by blackmail virus
ZHENG Wenbin said that for computer users infected with blackmail virus whose files are encrypted, if they want to get the files back, at present, they can only pay bitcoin, and there is no other better way. But even if they pay bitcoin according to the requirements of criminals, there is no guarantee that they can get the encrypted files back. "We are also trying to find a way, Try to see if you can decrypt the encrypted file, but there is no other way
according to Zheng Wenbin, according to their monitoring, at present, in addition to the ecation network and campus network of some domestic colleges and universities, enterprises have also been affected by viruses, and some civil facilities, such as the computer systems of gas stations, have also been attacked by viruses.
Hot content
