Position: Home page » Bitcoin » The initiator of bitcoin blackmail virus

The initiator of bitcoin blackmail virus

Publish: 2021-05-06 01:53:30
1. In short, blackmail virus is a computer virus that uses Windows system vulnerability to maliciously encrypt user files and then extort money

{rrrrrrr}

  • 10

    (3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning

  • < / UL >
    2.

    Once the computer is infected with this bitcoin blackmail virus, all the file data on the computer will be forcibly encrypted. If it is not delivered in the form of bitcoin to the virus maker & lt; Ransom;, Then these files can't be decrypted and retrieved. Even if the ransom is paid this time, they may be decrypted next time; Patronize & quot& mdash;& mdash; That is to say, this virus is very important to & lt; Pay attention to data & quot; It's hard to estimate the harm that can be caused by the users, especially the enterprise users

    How to avoid the harm of bitcoin blackmail virus< p> As soon as bitcoin blackmail virus came into being, it immediately caused an uproar around the world. Major network security organizations and well-known anti-virus software began to pay attention to this problem

    there is a lot about & lt; Manually set the firewall to close the sensitive port of the computer, so as to resist the bitcoin blackmail virus; But this kind of method is more suitable for those who know computer better; Non white people;, For example, for a third rate programmer like me, this method is more suitable for me. I can't even use antivirus software

    but for the general public, it may be necessary to deal with it in a simpler way

    it has been several years since the advent of bitcoin extortion virus. In order to help users' computers fight against bitcoin extortion virus attacks, many anti-virus software have certain defense mechanisms. For example, 360 launched a & lt; Anti blackmail service;, If your data is encrypted by bitcoin extortion virus when 360 is installed on your computer, 360 will compensate for your ransom and recover your data

    users who don't know how to use computers can choose to install anti-virus software to defend you against such viruses, but it depends on their hobbies to choose which one

    3. What is blackmail virus< Different from other similar blackmail viruses, wannacry virus is a kind of worm that can infect other computers automatically and spread rapidly e to chain reaction
    2. This kind of blackmail virus mainly infects windows system. It will use encryption technology to lock files, forbid users to access, and blackmail users
    3. The attacker claimed that he could only unlock the file after asking for more than $300 worth of bitcoin. In fact, even if the ransom is paid, it may not be able to unlock the file
    Why are they infected
    once the blackmail worm attacks a user machine that can connect to the public network, it will scan the IP of the intranet and the public network. If the scanned IP has opened port 445, it will use the "enternal blue" vulnerability to install the back door. Once the backdoor is executed, a blackmailer virus named wana crypt0r will be released to encrypt all documents and files on the user's machine for blackmail
    why use bitcoin
    bitcoin is a kind of point-to-point network payment system and virtual pricing tool, commonly known as digital currency. Bitcoin is popular among cyber criminals because it is decentralized, unregulated and almost untraceable< Background of transmission and infection
    this round of blackmailer worm virus mainly includes two family variants onion and wncry, which first broke out in Britain, Russia and other countries, and many enterprises and medical institutions were recruited in the system, resulting in heavy losses
    global monitoring of security agencies has found that as many as 74 countries have suffered this blackmailer worm attack
    since May 12, the spread of infection in China has also begun to increase sharply, and the outbreak has been intensified in many universities and enterprises
    wannacry blackmail virus prevention method:
    1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
    2. Close ports 445, 135, 137, 138 and 139, and close network sharing
    3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
    4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
    5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
    4. There is no relevant regulatory unit and operating rules to rub the edge of the law. Don't rule out the possibility of black background.
    5. If you want to dig a good mine, you have to dig deep
    first dig a very deep place, preferably more than ten layers above the bedrock, and then, like in the picture, dig a corridor first, and then dig the corridor every two squares in a carpet style. Generally, you can dig some good mines. Also, don't use a low-grade chisel to dig high-grade ore, it won't drop things. Gold and diamond mines can only be g with iron. In addition, please ignore the red ore, red stone in PE version is just useless box.
    6. Only the Barry underground can collect ore. But in the seaside can collect ore fragments, such as Kela coast, eluk waterfall gold panning, etc. Ore fragments have the same function as ore, and occupy less lattice than ore, so it is easy to obtain, so now few people go to Bari underground mining.
    7. Nowadays, computer viruses update too fast, so security is very important
    so if you want to protect the security of the computer, you still have to install anti-virus software
    you can use Tencent computer housekeeper, who can protect the account security in a comprehensive and multi-dimensional way, accurately attack Dao Trojan horse, instantly check and kill it, and give early warning of risks, so as to detect and block the destruction of Trojan horse in the early stage of Trojan activity, Second kill the latest popular trojan through cloud killing technology. And the interface is simple and easy to operate
    8.

    The recent outbreak of bitcoin extortion virus has caused an uproar all over the world. Many people can understand that hackers obtain benefits through virus extortion. However, the strange part of this incident is that hackers demand payment of bitcoin by name. Personally, I don't think this incident is a pure virus blackmail or hacker's network attack, which must also contain an unfathomable purpose of interest

    {rrrrrrr}

    therefore, I guess that the behind the scenes or the people who started this bitcoin blackmail virus may be the founders and supporters of bitcoin. We should know that bitcoin is far from as good as they boast, and ordinary people will certainly not understand and explore bitcoin, From this we can see that both the value growth of bitcoin in recent years and the bitcoin blackmail virus attack are guided by the founder of bitcoin and its supporters

    because if bitcoin can really become a common currency, then these beneficiaries can become banknote printing factories like governments and banks, which is a huge windfall for them

    9. As of May 15, 2017, 100000 computers have been infected in more than 100 countries and regions, and more than 100 countries have been attacked, including the United Kingdom, the United States, China, Russia, Spain and Italy. The victims of extortion virus network attacks that spread rapidly to the world will continue to increase, because hackers can easily enter those computers that haven't updated Microsoft's "windows" operating system for several months. Russia and Ukraine are under intensive attacks. Russia's interior ministry also said that about 1000 computers were infected, less than 1% of their weight. Technicians have successfully stopped the attack and updated the Department's "anti-virus defense system" [1]. However, according to the information provided by the virus-free website, wannacry3.0 version appears, and wannacry2.0 is estimated to be a failed variant. The real variant is wannacry3.0 version. If the suicide switch is turned on and protected, it is more difficult to break the suicide switch, and the infection rate may be faster. It is suggested that Chinese users use 360 security guard, Tencent computer housekeeper and other anti-virus software to protect, and ensure that Microsoft released ms17-010 patch in mid March, and start 360 security guard's anti blackmail service. Moreover, wannacry3.0 is more powerful and destructive than the "Cerber" blackmail virus that dominated the world's computers in 2016.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750