Position: Home page » Bitcoin » Computer virus breaks out bitcoin

Computer virus breaks out bitcoin

Publish: 2021-04-24 15:22:44
1. From May 12, bitcoin blackmail computer virus broke out all over the world. At present, 16 hospitals across the UK have been attacked on a large scale, and many Chinese universities have been recruited. Hackers blackmail users for ransom by locking computer files, and only charge bitcoin

in this global computer virus incident, mobile China also received a blackmail. Fortunately, the machine that received the email was a testing machine, which did not affect us. However, it's different for college students in the graation season. The thesis is locked, which is related to graation. So in the face of this outbreak of blackmail virus, how should we deal with it and what protective measures should we take<

first of all, let's understand the characteristics of this virus

the computer virus initiated by hackers will encrypt a large number of files on the system into files with. Onion suffix. After poisoning, they are required to pay bitcoin ransom to decrypt and recover the files, causing serious losses to personal data, and anti-virus software cannot decrypt these encrypted files. But we must not listen to the hacker's so-called "give money to decrypt" saying, because hackers do not necessarily keep their promises, in addition, bitcoin is expensive, and it is also a large number for ordinary users< Secondly, we need to pay attention to the background of the virus outbreak.

according to the domestic experts, according to the network security agencies, this is a virus attack event launched by lawless elements using the "eternal blue" leaked from NSA hacker's weapon library“ "Eternal blue" will scan windows machines with open 445 file sharing port, without any user operation. As long as the machine is turned on and connected to the Internet, criminals can plant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers

e to the previous outbreak of worms using port 445 in China, operators have blocked port 445 for indivial users, but the ecation network has no such restriction, and there are still a large number of machines exposing port 445. According to the statistics of relevant institutions, at present, more than 5000 machines in China are attacked by NSA "eternal blue" hacker weapons every day, and the ecation network is the hardest hit area

What are the coping methods

1. Close port 445, and you can search and query by yourself

2. At present, Microsoft has released a patch ms17-010 to fix the system vulnerability of "eternal blue" attack. You can install this patch for your computer as soon as possible

as for XP, 2003 and other Microsoft machines that no longer provide security updates, microblog professionals recommend using "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being attacked by blackmail software and other viruses
2.

In my opinion, I don't know if it's right. We still need criticism and correction. I don't think this virus has anything to do with which way you use to access the Internet, and it also has nothing to do with which kind of computer (PC or laptop) you use. He mainly aims at some loopholes in the Current Windows operating system. We all know that when a software is downloaded, it must have the highest administrator authority to install the software on this computer. This should be a security policy of the computer operating system. However, there are loopholes in everything, and the operating system is no exception. For example, this virus outbreak, in fact, the patch was released as early as March, but many users didn't pay attention to it and didn't fix it. So, now as long as you are connected to the network, and the system vulnerability is not repaired in time, you can scan the port, use the vulnerability of a port, directly install the encryption software (virus) to your computer in the background, and encrypt your important files, so as to achieve the purpose of blackmail. So it's better not to turn off the self-renewal function of windows for convenience. At the same time, it's also recommended to turn off some ports that are not often used but are very dangerous, such as 445, 135, 137, 138 and 139—— Finally, WiFi is just a way to access the Internet. It can also spread viruses. So, quickly update and patch it .... There is also a video here. I think it's very good, but I don't know if I can watch it http://weibo.com/tv/v/?fid=1034 :

3.

Internet security once again because of a large-scale outbreak of computer viruses and caused everyone's attention: bit virus. The emergence of this virus will make the computer's documents locked, hackers to coerce ransom, and most of the places are important units. For example, Chinese universities and British hospitals. The data of these units are very important. Most of the time, the school is not only an ecational unit, many key universities also undertake a lot of scientific research tasks. From a certain point of view, it also shows that hackers are very selective and targeted

Of course, the explanation given by Microsoft said that the virus was an attack against the vulnerability supplemented in March. In a way, hackers are also a test of users' security awareness. Microsoft has added software to the vulnerability in March. From this point of view, the hacker's attack is not brilliant. Because it is through the official patch, and then imagine no patch defects, so as to attack. Hackers also know the update awareness and security awareness of users. Of course, as a domestic company, 360 also seized this opportunity to quickly adjust the security housekeeper to check and kill the virus

from this point of view, Microsoft's vulnerability supplement is targeted and prescient, and the possible vulnerabilities should be supplemented in time

from the user's point of view, this virus attack is different from the previous one. In the past, it is generally in the form of camouflage and loading to ince customers to take the initiative to download. And this time the virus is mostly spread through the LAN, as long as you boot, the virus will invade. The document cannot be opened normally

if this virus attack has any inspiration for us to use computers and pay attention to Internet security, I think it can be inspired from at least two aspects: the first is to strengthen the security of computer systems, such as using official patches to repair vulnerabilities in time; the other is to install regular anti-virus software, update it in time, and strengthen the firewall


4. First of all, it's best to use AMD's graphics card for mining, and NVIDIA's graphics card has a low mining probability
secondly, the income you get from mining is not as much as your 24-hour power consumption, which is not cost-effective

believe it or not.
5. You can use Tencent computer housekeeper to check and kill viruses as follows
1. First, upgrade your antivirus software and update the virus library to the latest
2. Open Tencent computer Housekeeper - virus checking and killing
3. Select lightning, overall or designated location (three kinds of checking and killing modes, according to your own needs). During the process of killing, you will scroll the process description and display the progress bar. In its traditional interface, it displays the start status of the antivirus engine in the form of icons, and displays the identification times of suspicious behaviors, the number of files scanned safely and other information
4. Wait patiently for the end of the scanning, if there is any abnormality, you can click to deal with it and clean up the virus
5, You can also choose to turn on the Tencent computer manager in safe mode, and follow the above steps for antivirus
turn off the computer, cut off the network, and select the entry mode (press the F8 key to start the computer and select the first item to enter the mode. This mode only starts the basic driver, and does not load other software. Then open your virus software and clean it up
6. Blackmail virus can still be prevented, but its global outbreak also shows that there is no absolute security system in the world. On the evening of May 12, Microsoft system computers in nearly 100 countries around the world were attacked by a computer virus called wanna cry or wanna decryptor
if you want to unlock the infected computer, you can only pay the required bitcoin to the other party, otherwise the hard disk will be completely emptied. At present, the blackmail virus has ravaged many universities in China. The National Center for network and information security also released the anti blackmail virus patch address. This blackmail virus attack is fierce, just like an unprecedented disaster. Many media use "occupied" and "dangerous!" And so on
but in fact, as long as our computer system is constantly updated, we will not be attacked by this virus. Microsoft's security update in March this year included a security patch for the exploit of this blackmail virus. The global outbreak of the virus attack also shows two points: there is no absolutely safe system in the world; Don't say any backdoor, as long as it is in the hands of "good people", it is safe. The predecessor of this blackmail virus is the "eternal blue" attack program in NSA hacker's weapon library, which was leaked before. Now it has been transformed into blackmail software by criminals
it's the same as putting the virus into the society to spread if the biological virus in the laboratory is stolen and no money is paid. If you have any impression, you will remember that at the beginning of last year, there was a dispute between the FBI of the United States and Silicon Valley companies such as apple, that is, whether electronic procts should leave a "back door" for law enforcement departments in order to combat terrorists
now you should have the answer in mind. No one can create an absolute security system, and there is no absolute security "back door" only for "good people". As long as the tools are made, the bad guys will always have a way to get them - in this world, there are no weapons that can only be used by the "good guys". Tools are not good or bad. It's the people who use them that decide their pros and cons
system security is always relative. If hackers want to attack your electronic devices, you are not likely to survive. However, for similar computer viruses that are not targeted at specific indivials, ordinary users still have a way to escape. Although blackmail virus is difficult to cure, it can be prevented. As mentioned earlier, if the system is updated in time and patched for security vulnerabilities, this attack has nothing to do with you
for the domestic public, it is particularly important to update the system version and use the genuine system. After the attack, it will be found that many people's systems are still in Windows XP, a system that Microsoft has stopped supporting
Microsoft has to release a special patch this time to help users eliminate the threat. But if someone's system is pirated, it can only be solved in other ways. Now we are getting into the habit of paying for right support such as content and music. We might as well have this awareness in terms of system security. In addition, the backup system and data are also "necessary cultivation"
in fact, the laptops that people bought in the first place were all installed with the genuine system, but when there were various problems later and they could not or could not recover the system, they were directly re installed through the pirated system. And if you have the habit of backup, when something goes wrong, you can master some skills to restore the computer to the state at any time point, and you are not afraid of this blackmail virus.
7. Unfortunately, Windows users are attacked by wanacry blackmail virus. The current solution is as follows: (never pay ransom in any case. There is a lot of evidence that even if ransom files are paid, they cannot be decrypted.) Windows users can completely eliminate the wanacry blackmail virus on the device by formatting all hard disks. Indivial users can contact security manufacturers at home and abroad, such as Qihoo 360, Jinshan drug bully, Kaspersky, mcfel, Tencent security manager and other security centers for assistance in recovering important data. Use "blackmail virus immunity tool" to repair. Users download the offline version of Tencent computer manager "blackmail virus immunity tool" through other computers, and the files to a safe and non-toxic U disk; Then turn on the designated computer when WiFi is turned off, the network cable is unplugged and the network is disconnected, and back up important files as soon as possible; Then use the offline version of "blackmail virus immunity tool" to fix the vulnerability with one click through USB flash disk; Network can be normal use of the computer. Use the file recovery tool to recover. Users who have been infected with the virus can use the computer manager - file recovery tool for file recovery, with a certain probability of recovering your documents. Note: we should also pay attention to the handling methods of relevant security manufacturers and wait for more superior perfect unlocking.
8.

You can activate the mechanism and get the treasure box after putting it in the surrounding stone cage. For specific strategies, you can see the original God strategy here or search the original God in HaoYou kuaibuo. You can also see the strategy station. The content is relatively complete

9.

Shi Po is one of the most important breakthrough materials in proto gods. Many players need this breakthrough material. The special point of shipper is that most of the roles that need shipper's most breakthrough materials are relatively important. For example, carved clear and heavy cloud, a main C, a strong auxiliary. There is also the stone Po can be used as the material to strengthen the rock element damage alchemy potion, such as Ningguang, these players who are in charge of C will also have a demand. However, these special minerals are scattered quickly in the whole map, and they are not concentrated, which makes it impossible for Shipo to collect a large number of them. Today, I will bring you some places where it is more convenient to get the stone pox. In fact, the stone pox in these places are still relatively scattered, but compared with other areas, they are the best places to collect the stone pox



the area with the most abundant resources -- Huachi Yanxiu, aozang mountain Mt. ozang has always been a popular place for miners. They are about to catch up with two cities. It's like going home to return to Mt. ozang. There is no need for me to say more about Mt. Ordovician. This is a treasure mountain. There are all kinds of mineral resources. At that time, Shi Po, the protagonist of this issue, was no exception, so the miners could collect together with other mineral collection routes. The Shipo on Mount ozang is near Yanxiu in Huachi. Although it is very close, the terrain is a little complicated

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750