Position: Home page » Bitcoin » Bitcoin antivirus

Bitcoin antivirus

Publish: 2021-03-31 02:47:37
1. From May 12, bitcoin blackmail computer virus broke out all over the world. At present, 16 hospitals across the UK have been attacked on a large scale, and many Chinese universities have been recruited. Hackers blackmail users for ransom by locking computer files, and only charge bitcoin

in this global computer virus incident, mobile China also received a blackmail. Fortunately, the machine that received the email was a testing machine, which did not affect us. However, it's different for college students in the graation season. The thesis is locked, which is related to graation. So in the face of this outbreak of blackmail virus, how should we deal with it and what protective measures should we take<

first of all, let's understand the characteristics of this virus

the computer virus initiated by hackers will encrypt a large number of files on the system into files with. Onion suffix. After poisoning, they are required to pay bitcoin ransom to decrypt and recover the files, causing serious losses to personal data, and anti-virus software cannot decrypt these encrypted files. But we must not listen to the hacker's so-called "give money to decrypt" saying, because hackers do not necessarily keep their promises, in addition, bitcoin is expensive, and it is also a large number for ordinary users< Secondly, we need to pay attention to the background of the virus outbreak.

according to the domestic experts, according to the network security agencies, this is a virus attack event launched by lawless elements using the "eternal blue" leaked from NSA hacker's weapon library“ "Eternal blue" will scan windows machines with open 445 file sharing port, without any user operation. As long as the machine is turned on and connected to the Internet, criminals can plant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers

e to the previous outbreak of worms using port 445 in China, operators have blocked port 445 for indivial users, but the ecation network has no such restriction, and there are still a large number of machines exposing port 445. According to the statistics of relevant institutions, at present, more than 5000 machines in China are attacked by NSA "eternal blue" hacker weapons every day, and the ecation network is the hardest hit area

What are the coping methods

1. Close port 445, and you can search and query by yourself

2. At present, Microsoft has released a patch ms17-010 to fix the system vulnerability of "eternal blue" attack. You can install this patch for your computer as soon as possible

as for XP, 2003 and other Microsoft machines that no longer provide security updates, microblog professionals recommend using "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being attacked by blackmail software and other viruses
2. In the bitcoin virus, 360 antivirus is useless, and even some paid antivirus software can not be used

bitcoin virus (bitcoin Trojan horse) "bitcoin blackmailer" was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, making it unable to open normally, and pop up windows to "blackmail" the victim, requiring the victim to pay 3 bitcoin as "ransom". According to the recent bitcoin price found by the reporter from the Internet, 3 bitcoin is almost 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail. The name of the Trojan horse program is usually in English, which means "order", "proct details", etc., and uses fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program.
3. There is a virus in the mobile browser, and the solutions are as follows:
1. Use the mobile antivirus software to kill the virus, such as Tencent mobile housekeeper, etc.
Open Tencent mobile housekeeper security protection (or deep search and kill, open Settings stubborn Trojan horse kill)
2. If you can find the virus in the storage directory, manually delete it,
3. If you can't find the location of the virus, You can format the SD card directly,
4. If none of the above methods works, you can get the root and clear it
Open Tencent mobile Manager (PC) - App treasure - Toolbox - one click root
or swipe
Open Tencent mobile Manager (PC) - App treasure - Toolbox - swipe
4. Low price is not necessarily good, but the cost-effective, or you can choose the interstellar cloud.
5. Yeah, I think it's better than fire coin. I've been using okex, and it's a great experience.
6. Jinshan drug tyrant official website has this special killing procere!
7. You can use Tencent computer housekeeper to check and kill viruses as follows
1. First, upgrade your antivirus software and update the virus library to the latest
2. Open Tencent computer Housekeeper - virus checking and killing
3. Select lightning, overall or designated location (three kinds of checking and killing modes, according to your own needs). During the process of killing, you will scroll the process description and display the progress bar. In its traditional interface, it displays the start status of the antivirus engine in the form of icons, and displays the identification times of suspicious behaviors, the number of files scanned safely and other information
4. Wait patiently for the end of the scanning, if there is any abnormality, you can click to deal with it and clean up the virus
5, You can also choose to turn on the Tencent computer manager in safe mode, and follow the above steps for antivirus
turn off the computer, cut off the network, and select the entry mode (press the F8 key to start the computer and select the first item to enter the mode. This mode only starts the basic driver, and does not load other software. Then open your virus software and clean it up
8. Install 360 mobile guard, and then turn on powerful mode, which is root. And then the whole thing. One time.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750