Decrypt bitcoin blackmailer
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
Wanacry blackmail virus is a kind of worm computer virus with blackmail nature written by the professional criminal group of "shadow broker" H2 >
because of the wanacry blackmail virus, the windows-445 series port vulnerability ms17-010 is used to attack, which covers all versions of windows and has a huge audience. After wanacry attacks the computer, it will encrypt a large number of users' documents / data / files / photos, and require payment of bitcoin ransom to unlock
< H2 > unfortunately, Windows users are attacked by wanacry blackmail virus. The current solutions are as follows: (never pay ransom in any case, there is a lot of evidence that even if ransom is paid, the file cannot be decrypted.) H2 > < UL >
Windows users can completely eliminate wanacry blackmail virus on devices by formatting all hard disks
indivial users can contact domestic and foreign security manufacturers, such as Qihoo 360, Jinshan drug bully, Kaspersky, mcfel, Tencent security manager and other security centers for assistance in recovering important data
use "blackmail virus immune tool" to repair. Users download the offline version of Tencent computer manager "blackmail virus immunity tool" through other computers, and the files to a safe and non-toxic U disk; Then turn on the designated computer when WiFi is turned off, the network cable is unplugged and the network is disconnected, and back up important files as soon as possible; Then use the offline version of "blackmail virus immunity tool" to fix the vulnerability with one click through USB flash disk; Network can be normal use of the computer
use the file recovery tool to recover. Users who have been infected with the virus can use the computer manager - file recovery tool for file recovery, with a certain probability of recovering your documents
note: we will continue to pay attention to the handling methods of relevant security manufacturers, waiting for more superior perfect unlocking
{rrrrrrr}
10
(3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning
Once the computer is infected with this bitcoin blackmail virus, all the file data on the computer will be forcibly encrypted. If it is not delivered in the form of bitcoin to the virus maker & lt; Ransom;, Then these files can't be decrypted and retrieved. Even if the ransom is paid this time, they may be decrypted next time; Patronize & quot& mdash;& mdash; That is to say, this virus is very important to & lt; Pay attention to data & quot; It's hard to estimate the harm that can be caused by the users, especially the enterprise users
How to avoid the harm of bitcoin blackmail virus< p> As soon as bitcoin blackmail virus came into being, it immediately caused an uproar around the world. Major network security organizations and well-known anti-virus software began to pay attention to this problemthere is a lot about & lt; Manually set the firewall to close the sensitive port of the computer, so as to resist the bitcoin blackmail virus; But this kind of method is more suitable for those who know computer better; Non white people;, For example, for a third rate programmer like me, this method is more suitable for me. I can't even use antivirus software
but for the general public, it may be necessary to deal with it in a simpler way
it has been several years since the advent of bitcoin extortion virus. In order to help users' computers fight against bitcoin extortion virus attacks, many anti-virus software have certain defense mechanisms. For example, 360 launched a & lt; Anti blackmail service;, If your data is encrypted by bitcoin extortion virus when 360 is installed on your computer, 360 will compensate for your ransom and recover your data
users who don't know how to use computers can choose to install anti-virus software to defend you against such viruses, but it depends on their hobbies to choose which one
3. Through this function, there is a file recovery function to recover the files deleted or encrypted by blackmail virus
for people, the best way is to prevent the source of infection, do not open or run the unknown installation package, install a safe prevention attachment - bitcoin house
the best way to remove is to re install a system.
after being invaded by the blackmail software, almost all kinds of files such as photos, pictures, documents, audio and video in the user's host system will be encrypted, and the suffix of the encrypted files will be changed to. Wncry, and a blackmail dialog box will pop up on the desktop, asking the victim to pay hundreds of dollars worth of bitcoin to the attacker's bitcoin wallet, And the amount of ransom will increase over time.
firstly, bitcoin has certain anonymity, which is convenient for hackers to hide their identities; Secondly, it is not subject to geographical restrictions and can collect money on a global scale
at the same time, bitcoin also has the feature of "decentralization", which allows hackers to automatically process victims' ransom through programs
compared with other digital currencies, bitcoin currently has the largest market share and the best liquidity, so it has become the hacker's choice. This is similar to the logic behind the fact that criminals like to use US dollar cash
bitcoin is a network virtual currency born in 2009. It is also the most frequently used virtual currency in the world
starting from the essence of bitcoin, the essence of bitcoin is actually a special solution generated by a bunch of complex algorithms. A special solution is one of the infinite (in fact, bitcoin is finite) solutions that can be obtained from the equations. Every particular solution can solve the equation and is unique. In the metaphor of RMB, bitcoin is the serial number of RMB. If you know the serial number of a note, you have the note. The process of mining is to constantly seek the special solution of the equation system through huge amount of calculation. The equation system is designed to have only 21 million special solutions, so the upper limit of bitcoin is 21 million
the reason why bitcoin is so popular is that it can be accepted, traded and stored by the whole world after it has currency characteristics. It has formed its unique living environment
there are also bitcoin trading platforms in China. After the accident these days, the price has gone up a little
since bitcoin has no issuer and the theoretical total number is 21 million, it has been circulating on the Internet for all kinds of transactions, and there are great hidden dangers. China's attitude towards its development is serious and cautious. Although it is not forbidden, its supervision is very strong
on January 11, 2017, the Shanghai headquarters of the people's Bank of China and the Shanghai Municipal Finance Office carried out on-site inspection of bitcoin China, focusing on whether the enterprise carried out credit, payment, exchange and other related businesses without permission or license; Implementation of anti money laundering system; Fund security risks, etc. On January 12, 2017, the business management department of the people's Bank of China also entered the trading platforms such as "fire coin net" and "currency bank" in Beijing.
