Position: Home page » Bitcoin » The best way to deal with bitcoin blackmail

The best way to deal with bitcoin blackmail

Publish: 2021-05-02 21:40:39
1.

bitcoin blackmail refers to an email received in the mailbox. The content of the email generally includes: malicious software on the computer has captured the recipient's indecent photos through the webcam, knows the recipient's real password, etc., which makes the recipient fear and demands to pay the sealing fee in the form of "bitcoin"


if the blackmailer passes the email, he will take the next step, and he does have a lot of important information. In any case, don't transfer bitcoin to blackmailers. It's a bottomless hole. It's a good choice to keep all the evidence and report to the police. The above personal opinions are welcome to be criticized and corrected. Agree with me, please click like before you go, thank you! Like me, please pay attention to me, thank you again

2. Close port 445 and install security software. Unfortunately, Windows users are attacked by wanacry blackmail virus. The current solutions are as follows: (never pay ransom in any case. There is a lot of evidence that even if ransom files are paid, they cannot be decrypted.)
Windows users can completely eliminate wanacry blackmail virus on devices by formatting all hard disks
indivial users can contact security manufacturers at home and abroad, such as Qihoo 360, Jinshan drug tyrant, Kaspersky, mcfel, Tencent security manager and other security centers for assistance in recovering important data
use "blackmail virus immune tool" to repair. Users download the offline version of Tencent computer manager "blackmail virus immunity tool" through other computers, and the files to a safe and non-toxic U disk; Then turn on the designated computer when WiFi is turned off, the network cable is unplugged and the network is disconnected, and back up important files as soon as possible; Then use the offline version of "blackmail virus immunity tool" to fix the vulnerability with one click through USB flash disk; Network can be normal use of the computer
use the file recovery tool to recover. Users who have been infected with the virus can use the computer manager - file recovery tool for file recovery, with a certain probability of recovering your documents
note: we will continue to pay attention to the handling methods of relevant security manufacturers, waiting for more superior perfect unlocking.
3. Bitcoin extortion viruses are basically sent by mail, and are bound with viruses. Therefore, do not open files with uncertain sources, and back up important files in time. Although antivirus software has little effect, it is still necessary to upgrade antivirus software and operating system supplements as soon as possible. These measures are not only to prevent bitcoin viruses, but also to prevent more viruses
4. Wannacry blackmail virus prevention methods:

1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
5.

Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen

if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control




extended information:

the constituent elements of the crime of extortion:

1. Subjective elements

this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion

The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private property

6. no MLM is selling the concept and earning a head fee. The digital currency can be used to trade, it has its own value. There are a lot of people investing in digital currency now, but it is suggested to go to big trading platforms, such as hot money pro, which only has reliable digital currency online, so the risk can be reced.
7. It is recommended to download 360 offline repair tool. Eternal Blue vulnerability repair is immune to this virus
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750