Is there bitcoin virus in Tianjin
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
in this global computer virus incident, mobile China also received a blackmail. Fortunately, the machine that received the email was a testing machine, which did not affect us. However, it's different for college students in the graation season. The thesis is locked, which is related to graation. So in the face of this outbreak of blackmail virus, how should we deal with it and what protective measures should we take<
first of all, let's understand the characteristics of this virus
the computer virus initiated by hackers will encrypt a large number of files on the system into files with. Onion suffix. After poisoning, they are required to pay bitcoin ransom to decrypt and recover the files, causing serious losses to personal data, and anti-virus software cannot decrypt these encrypted files. But we must not listen to the hacker's so-called "give money to decrypt" saying, because hackers do not necessarily keep their promises, in addition, bitcoin is expensive, and it is also a large number for ordinary users< Secondly, we need to pay attention to the background of the virus outbreak.
according to the domestic experts, according to the network security agencies, this is a virus attack event launched by lawless elements using the "eternal blue" leaked from NSA hacker's weapon library“ "Eternal blue" will scan windows machines with open 445 file sharing port, without any user operation. As long as the machine is turned on and connected to the Internet, criminals can plant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
e to the previous outbreak of worms using port 445 in China, operators have blocked port 445 for indivial users, but the ecation network has no such restriction, and there are still a large number of machines exposing port 445. According to the statistics of relevant institutions, at present, more than 5000 machines in China are attacked by NSA "eternal blue" hacker weapons every day, and the ecation network is the hardest hit area
What are the coping methods
1. Close port 445, and you can search and query by yourself
2. At present, Microsoft has released a patch ms17-010 to fix the system vulnerability of "eternal blue" attack. You can install this patch for your computer as soon as possible
as for XP, 2003 and other Microsoft machines that no longer provide security updates, microblog professionals recommend using "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being attacked by blackmail software and other viruses
1. Use the mobile antivirus software to kill the virus, such as Tencent mobile housekeeper, etc.
Open Tencent mobile housekeeper security protection (or deep search and kill, open Settings stubborn Trojan horse kill)
2. If you can find the virus in the storage directory, manually delete it,
3. If you can't find the location of the virus, You can format the SD card directly,
4. If none of the above methods works, you can get the root and clear it
Open Tencent mobile Manager (PC) - App treasure - Toolbox - one click root
or swipe
Open Tencent mobile Manager (PC) - App treasure - Toolbox - swipe
please enter the following URL and see the following feedback information, It means that your computer has no virus ~
http://www..com/
(feedback)
please look at the virus code
the logic of the code is as follows:
visit the domain name, if the domain name exists, then exit everything; otherwise, if the domain name does not exist, then continue to attack
so as long as the domain name exists, It's safe~
according to the investigation of the FBI, bogchev infected more than one million computers in 12 countries and lost more than 100 million US dollars only because of the "terminator Zeus" Trojan horse virus and the "bitcoin blackmailer" blackmail virus
the FBI offered a huge reward for the arrest of bogchev. According to the reward order, those arrested for providing key information will receive a reward of $3 million, which is also the highest reward offered by the United States in the fight against cybercrime
when the Trojan horse first paid for bitcoin, it did not use the anonymous network, which led to the exposure of the server, and the identity of the author of the virus was found out. Since the disclosure of bogchev's identity, the design of the "bitcoin blackmailer" family Trojan horse has become increasingly cunning, and the bitcoin payment link has been changed to Tor (onion network), which makes it more difficult for the police to arrest bogchev
