360 recovers bitcoin blackmailer virus
Publish: 2021-04-18 09:23:26
1. In the bitcoin virus, 360 antivirus is useless, and even some paid antivirus software can not be used
bitcoin virus (bitcoin Trojan horse) "bitcoin blackmailer" was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, making it unable to open normally, and pop up windows to "blackmail" the victim, requiring the victim to pay 3 bitcoin as "ransom". According to the recent bitcoin price found by the reporter from the Internet, 3 bitcoin is almost 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail. The name of the Trojan horse program is usually in English, which means "order", "proct details", etc., and uses fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program.
bitcoin virus (bitcoin Trojan horse) "bitcoin blackmailer" was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, making it unable to open normally, and pop up windows to "blackmail" the victim, requiring the victim to pay 3 bitcoin as "ransom". According to the recent bitcoin price found by the reporter from the Internet, 3 bitcoin is almost 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail. The name of the Trojan horse program is usually in English, which means "order", "proct details", etc., and uses fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program.
2.
At present, 360 is the first in China to launch 360 anti extortion service
to provide document restoration and decryption service for the current popular specific Trojan family using asymmetric encryption
download and install the latest security guard 11.0 beta, and click "anti blackmail service" in the main interface

3. 1. Don't give money. Even if you hand it in, you may not be able to recover the data
2. 3. Install anti extortion protection tools, do not visit the website, do not open suspicious mail and files
4. Turn off the computer, including TCP and UDP protocol ports 135 and 445. Pay special attention to win7 system, do not use campus network, nor CMCC
5. If you still can't understand it, cut off the network
[how to prevent bitcoin blackmailer virus] some suggestions on Security:
backup important personal data. Pay attention to personal computer security maintenance, regularly update system patches, safe and reliable antivirus software.
2. 3. Install anti extortion protection tools, do not visit the website, do not open suspicious mail and files
4. Turn off the computer, including TCP and UDP protocol ports 135 and 445. Pay special attention to win7 system, do not use campus network, nor CMCC
5. If you still can't understand it, cut off the network
[how to prevent bitcoin blackmailer virus] some suggestions on Security:
backup important personal data. Pay attention to personal computer security maintenance, regularly update system patches, safe and reliable antivirus software.
4. 1. As long as it is a virus, it can be deleted.
2. This virus is a kind of stubborn virus. It needs to be killed in safe mode.
3. The choice of antivirus software is also very important. You have to choose a special tool for this virus. You can use the computer housekeeper to kill the virus.
2. This virus is a kind of stubborn virus. It needs to be killed in safe mode.
3. The choice of antivirus software is also very important. You have to choose a special tool for this virus. You can use the computer housekeeper to kill the virus.
5. How to prevent bitcoin extortion virus
1. Don't open strangers or unknown e-mails to prevent attacks through e-mail attachments
2. Try not to click the office macro running prompt to avoid virus infection from office components
3. Download the required software from the official website, do not double-click to open. JS,. VBS and other suffix files
4. Upgrade NGAF to the latest anti-virus and other security features library
5. Upgrade the anti-virus software to the latest anti-virus library to prevent the attack of existing virus samples
6. Regularly back up important data and files in different places, and recover them in case of virus< According to the characteristics of the blackmail virus, we can judge that its variants can usually hide features, but can not hide its key behavior. After summarizing, the behavior of the blackmail virus in the process of running mainly includes the following aspects:
1. HTTP request through script file; 2
2. Download files through script files
3. Read remote server files
4. Collect computer information
5. Traverse the file
6. Call the encryption algorithm library.
1. Don't open strangers or unknown e-mails to prevent attacks through e-mail attachments
2. Try not to click the office macro running prompt to avoid virus infection from office components
3. Download the required software from the official website, do not double-click to open. JS,. VBS and other suffix files
4. Upgrade NGAF to the latest anti-virus and other security features library
5. Upgrade the anti-virus software to the latest anti-virus library to prevent the attack of existing virus samples
6. Regularly back up important data and files in different places, and recover them in case of virus< According to the characteristics of the blackmail virus, we can judge that its variants can usually hide features, but can not hide its key behavior. After summarizing, the behavior of the blackmail virus in the process of running mainly includes the following aspects:
1. HTTP request through script file; 2
2. Download files through script files
3. Read remote server files
4. Collect computer information
5. Traverse the file
6. Call the encryption algorithm library.
6. Recovery methods of bitcoin virus encrypted files
1. First, install the "bitcoin virus file repair tool" proced by 360, select vulnerability repair, make a good security patch, and prevent being attacked again
2. Use 360 Trojan horse killing function to remove all Trojans and prevent repeated infection
3. Download and use "bitcoin virus file repair tool" to recover encrypted files
select the drive where the encrypted file is located
after scanning, select the file to be recovered
it is strongly recommended that you choose to save the recovered file on a clean mobile hard disk or USB flash disk
the success rate of file recovery of this tool will be affected by the number of files, time, disk operation and other factors. Generally speaking, the earlier recovery after poisoning, the higher the probability of success.
1. First, install the "bitcoin virus file repair tool" proced by 360, select vulnerability repair, make a good security patch, and prevent being attacked again
2. Use 360 Trojan horse killing function to remove all Trojans and prevent repeated infection
3. Download and use "bitcoin virus file repair tool" to recover encrypted files
select the drive where the encrypted file is located
after scanning, select the file to be recovered
it is strongly recommended that you choose to save the recovered file on a clean mobile hard disk or USB flash disk
the success rate of file recovery of this tool will be affected by the number of files, time, disk operation and other factors. Generally speaking, the earlier recovery after poisoning, the higher the probability of success.
7. 1. Install a computer manager on your computer, and then open the toolbox to have a document guardian. Through this function, you can directly recover the virus encrypted files
8. The virus will run once on the computer, and then it will be deleted by itself. The damaged software cannot be recovered
9. After reloading the system, as long as the files in the system are not infected, there will be no virus
10. Bitcoin blackmail virus infected files, to be honest, it is difficult to recover
the virus will encrypt the file, and the encryption algorithm is not low
in other words, unless you have an encryption key, it is impossible to decrypt data, at least for ordinary users
so unless data is very important and you have to pay for it, you have to give up data and files.
the virus will encrypt the file, and the encryption algorithm is not low
in other words, unless you have an encryption key, it is impossible to decrypt data, at least for ordinary users
so unless data is very important and you have to pay for it, you have to give up data and files.
Hot content
