Which suffix is not easy to be blackmailed by bitcoin
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
or take defensive measures directly in the server. And virus detection.
for people, the best way is to prevent the source of infection, do not open or run the unknown installation package, install a safe prevention attachment - bitcoin house
the best way to remove is to re install a system.
the Trojan uses encryption to lock the documents with suffix types such as TXT, Doc, PPT and XLS in the user's computer, resulting in the user's inability to use the program normally, thus blackmailing and requiring the user to submit a ransom before unlocking
at present, all major domestic security manufacturers have launched relevant security controls and patches
if you are unfortunately poisoned, do not pay the ransom, you can contact the security manufacturer to recover your data.
the FBI offered a huge reward for the arrest of bogchev. According to the reward order, those arrested for providing key information will receive a reward of $3 million, which is also the highest reward offered by the United States in the fight against cybercrime
according to Wang Liang, when the Trojan horse first paid for bitcoin, it didn't use anonymous network, which led to the exposure of the server, and the identity of the author of the virus was found out. Since the disclosure of bogchev's identity, the design of the "bitcoin blackmailer" family Trojan horse has become increasingly cunning, and the bitcoin payment link has been changed to Tor (onion network), which makes it more difficult for the police to arrest bogchev.
