Linus system blackmailed by bitcoin
In my opinion, I don't know if it's right. We still need criticism and correction. I don't think this virus has anything to do with which way you use to access the Internet, and it also has nothing to do with which kind of computer (PC or laptop) you use. He mainly aims at some loopholes in the Current Windows operating system. We all know that when a software is downloaded, it must have the highest administrator authority to install the software on this computer. This should be a security policy of the computer operating system. However, there are loopholes in everything, and the operating system is no exception. For example, this virus outbreak, in fact, the patch was released as early as March, but many users didn't pay attention to it and didn't fix it. So, now as long as you are connected to the network, and the system vulnerability is not repaired in time, you can scan the port, use the vulnerability of a port, directly install the encryption software (virus) to your computer in the background, and encrypt your important files, so as to achieve the purpose of blackmail. So it's better not to turn off the self-renewal function of windows for convenience. At the same time, it's also recommended to turn off some ports that are not often used but are very dangerous, such as 445, 135, 137, 138 and 139—— Finally, WiFi is just a way to access the Internet. It can also spread viruses. So, quickly update and patch it .... There is also a video here. I think it's very good, but I don't know if I can watch it http://weibo.com/tv/v/?fid=1034 :
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen
if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control
extended information:
the constituent elements of the crime of extortion:
1. Subjective elements
this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion
The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private propertyMikhailovich
bogachev, the author of the "bitcoin blackmailer" Trojan family, is a Russian hacker, ranking second on the list of the top ten most wanted hackers by the FBI and the leader of a cyber criminal group.
okcoin reminds users that the current domestic bitcoin trading platform does not support extracting bitcoin. If netizens want to buy computers for ransom payment, they need to choose a trading platform that can withdraw bitcoin to avoid a second loss. In addition, after paying the ransom, whether the computer attacked by the virus can be effectively unsealed remains unknown. Therefore, the technical personnel of okcoin currency bank suggest that the majority of Internet users upgrade and install the relevant patches of Windows operating system as soon as possible, and the infected machines should be disconnected immediately to avoid further spread of infection. Users who have not been attacked by virus should update the system as soon as possible, install regular and safe anti-virus software, and improve the defense ability of the computer.
