The initiator of bitcoin blackmail virus
{rrrrrrr}
10
(3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning
Once the computer is infected with this bitcoin blackmail virus, all the file data on the computer will be forcibly encrypted. If it is not delivered in the form of bitcoin to the virus maker & lt; Ransom;, Then these files can't be decrypted and retrieved. Even if the ransom is paid this time, they may be decrypted next time; Patronize & quot& mdash;& mdash; That is to say, this virus is very important to & lt; Pay attention to data & quot; It's hard to estimate the harm that can be caused by the users, especially the enterprise users
How to avoid the harm of bitcoin blackmail virus< p> As soon as bitcoin blackmail virus came into being, it immediately caused an uproar around the world. Major network security organizations and well-known anti-virus software began to pay attention to this problemthere is a lot about & lt; Manually set the firewall to close the sensitive port of the computer, so as to resist the bitcoin blackmail virus; But this kind of method is more suitable for those who know computer better; Non white people;, For example, for a third rate programmer like me, this method is more suitable for me. I can't even use antivirus software
but for the general public, it may be necessary to deal with it in a simpler way
it has been several years since the advent of bitcoin extortion virus. In order to help users' computers fight against bitcoin extortion virus attacks, many anti-virus software have certain defense mechanisms. For example, 360 launched a & lt; Anti blackmail service;, If your data is encrypted by bitcoin extortion virus when 360 is installed on your computer, 360 will compensate for your ransom and recover your data
users who don't know how to use computers can choose to install anti-virus software to defend you against such viruses, but it depends on their hobbies to choose which one
2. This kind of blackmail virus mainly infects windows system. It will use encryption technology to lock files, forbid users to access, and blackmail users
3. The attacker claimed that he could only unlock the file after asking for more than $300 worth of bitcoin. In fact, even if the ransom is paid, it may not be able to unlock the file
Why are they infected
once the blackmail worm attacks a user machine that can connect to the public network, it will scan the IP of the intranet and the public network. If the scanned IP has opened port 445, it will use the "enternal blue" vulnerability to install the back door. Once the backdoor is executed, a blackmailer virus named wana crypt0r will be released to encrypt all documents and files on the user's machine for blackmail
why use bitcoin
bitcoin is a kind of point-to-point network payment system and virtual pricing tool, commonly known as digital currency. Bitcoin is popular among cyber criminals because it is decentralized, unregulated and almost untraceable< Background of transmission and infection
this round of blackmailer worm virus mainly includes two family variants onion and wncry, which first broke out in Britain, Russia and other countries, and many enterprises and medical institutions were recruited in the system, resulting in heavy losses
global monitoring of security agencies has found that as many as 74 countries have suffered this blackmailer worm attack
since May 12, the spread of infection in China has also begun to increase sharply, and the outbreak has been intensified in many universities and enterprises
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
first dig a very deep place, preferably more than ten layers above the bedrock, and then, like in the picture, dig a corridor first, and then dig the corridor every two squares in a carpet style. Generally, you can dig some good mines. Also, don't use a low-grade chisel to dig high-grade ore, it won't drop things. Gold and diamond mines can only be g with iron. In addition, please ignore the red ore, red stone in PE version is just useless box.
so if you want to protect the security of the computer, you still have to install anti-virus software
you can use Tencent computer housekeeper, who can protect the account security in a comprehensive and multi-dimensional way, accurately attack Dao Trojan horse, instantly check and kill it, and give early warning of risks, so as to detect and block the destruction of Trojan horse in the early stage of Trojan activity, Second kill the latest popular trojan through cloud killing technology. And the interface is simple and easy to operate
The recent outbreak of bitcoin extortion virus has caused an uproar all over the world. Many people can understand that hackers obtain benefits through virus extortion. However, the strange part of this incident is that hackers demand payment of bitcoin by name. Personally, I don't think this incident is a pure virus blackmail or hacker's network attack, which must also contain an unfathomable purpose of interest
{rrrrrrr}
therefore, I guess that the behind the scenes or the people who started this bitcoin blackmail virus may be the founders and supporters of bitcoin. We should know that bitcoin is far from as good as they boast, and ordinary people will certainly not understand and explore bitcoin, From this we can see that both the value growth of bitcoin in recent years and the bitcoin blackmail virus attack are guided by the founder of bitcoin and its supporters
because if bitcoin can really become a common currency, then these beneficiaries can become banknote printing factories like governments and banks, which is a huge windfall for them
