Blackmail of bitcoin in 2017
some malware also make great use of the parallel computing power of graphics cards. In August 2011, botnet of bitcoin mining was discovered, and Mac OS X infected by Trojan horse was also discovered to mine bitcoin.
on June 19, 2011, security vulnerability of mt.gox (Magic: abbreviation of the gathering online exchange) bitcoin trading center caused the price of 1 bitcoin to drop to 1 cent (although other transactions were not affected). The reason is that a hacker stole the user's mtgox certificate from the computer infected with the Trojan horse, so he transferred bitcoin to his own account and sold it, resulting in a large number of "ask" requests at that price. A few minutes later, mtgox shut down and cancelled the abnormal transactions in the hacking incident, making the price of bitcoin rebound back to $15. In the end, the bitcoin exchange rate went back to what it was before the crash. Accounts equivalent to more than $8750000 were affected
in July 2011, the operator of bitomat, the world's third largest bitcoin trading center, announced the loss of access rights to the wallet.dat file that records 17000 bitcoins (about 220000 US dollars). At the same time, announced the decision to sell services to make up for the loss of users
in August 2011, mybitcoin, one of the processing centers of common bitcoin transactions, announced that it had been attacked by hackers and shut down. Involving 49% of customers' deposits, more than 78000 bitcoins (then equivalent to about $800000) are missing
in early August 2012, bitconica was sued in the San Francisco court for damages of about $460000. In 2012, bitconica was attacked twice by hackers, accused of ignoring the security of customers' funds and forging withdrawal applications
in late August 2012, bitcoin savings and trust was shut down by its owner, leaving about US $5.6 million in debt. At the same time, he was accused of operating the Ponzi scheme. In September 2012, the securities and Exchange Commission began to investigate the case
in September 2012, bitfloor trading center was also hacked, and 24000 bitcoins (about US $250000) were stolen. Bitfloor was suspended. Bitfloor resumed operations in the same month, and its founder said he had reported the theft to the FBI and that he was planning to compensate the victims, but the compensation schele was unclear
in June 2011, a hacker transferred 25000 bitcoins into his account, which is equivalent to 500000 US dollars. The whole transaction could not be traced. Although the owner of bitcoin announced the theft on the Internet, it was useless. The hacker became the first thief of bitcoin
in 2012, 46703 bitcoin worth US $228845 was stolen e to the disclosure of the super management password of the server of the website hosting provider linode. More than 43000 stolen bitcoins belong to bitcoinica, a bitcoin trading platform. Another 3094 bitcoins are owned by Marek palatinus, a Czech programmer. Gavin Andersen, the chief bitcoin programmer, also lost his five bitcoins.
In my opinion, I don't know if it's right. We still need criticism and correction. I don't think this virus has anything to do with which way you use to access the Internet, and it also has nothing to do with which kind of computer (PC or laptop) you use. He mainly aims at some loopholes in the Current Windows operating system. We all know that when a software is downloaded, it must have the highest administrator authority to install the software on this computer. This should be a security policy of the computer operating system. However, there are loopholes in everything, and the operating system is no exception. For example, this virus outbreak, in fact, the patch was released as early as March, but many users didn't pay attention to it and didn't fix it. So, now as long as you are connected to the network, and the system vulnerability is not repaired in time, you can scan the port, use the vulnerability of a port, directly install the encryption software (virus) to your computer in the background, and encrypt your important files, so as to achieve the purpose of blackmail. So it's better not to turn off the self-renewal function of windows for convenience. At the same time, it's also recommended to turn off some ports that are not often used but are very dangerous, such as 445, 135, 137, 138 and 139—— Finally, WiFi is just a way to access the Internet. It can also spread viruses. So, quickly update and patch it .... There is also a video here. I think it's very good, but I don't know if I can watch it http://weibo.com/tv/v/?fid=1034 :
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
on the evening of June 29, 2017, Petya, a new blackmail virus, was found in Ukraine, Russia, Spain, France, Britain, Denmark and other countries. On July 4, 2017, Ukrainian police confiscated the server of an accounting software company in Ukraine, which was suspected of spreading the blackmail virus that paralyzed the computer systems of many large companies around the world.
Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen
if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control
extended information:
the constituent elements of the crime of extortion:
1. Subjective elements
this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion
The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private propertyon January 7, 2014, Taobao announced that it would ban the sale of Internet virtual currencies such as bitcoin and lightcoin from January 14. On February 26, 2014, Democratic Senator Joe Manchin of West Virginia issued an open letter to a number of regulatory authorities of the US federal government, hoping that relevant institutions would pay attention to the current situation of bitcoin encouraging illegal activities and disrupting the financial order, and demanded that actions be taken as soon as possible to completely ban the electronic currency. On January 11, 2017), the Shanghai headquarters of the people's Bank of China and the Shanghai Municipal Finance Office carried out on-site inspection of bitcoin China, focusing on whether the enterprise carried out credit, payment, exchange and other related businesses without permission or license; Implementation of anti money laundering system; Fund security risks, etc. On January 12, 2017, the business management department of the people's Bank of China also entered the trading platforms such as "fire coin net" and "currency bank" in Beijing
on May 12, 2017, a global outbreak of bitcoin virus madly attacked public and commercial systems! More than 40 hospitals across the UK have been widely hacked, leaving the NHS in chaos. The campus networks of many colleges and universities in China were also occupied. Nearly 74 countries in the world have been seriously attacked! Thank you
Tencent computer housekeeper integrates "professional virus detection and killing, intelligent software management, and system security protection", and creates an innovative mode of "anti-virus + management"
Tencent computer manager is the first professional anti-virus software that adopts "4 + 1" core anti-virus engine in China,
using Tencent's second-generation anti-virus engine "eagle eye",
it takes less resources, and based on CPU virtual execution technology, it can eradicate stubborn viruses and greatly improve the ability of in-depth investigation and killing.
Start VB. Form Form1
Caption =" Form1"< br /> ClientHeight = 6165
ClientLeft = 60
ClientTop = 450
ClientWidth = 10035
LinkTopic = " Form1"< br /> ScaleHeight = 6165
ScaleWidth = 10035
StartUpPosition = 3 35;39; Start VB.CommandButton Command1
Caption =" "< After /> Height ===495<<<<<<> Left =3480<<<<
TabIndex ==10<<<<<<> //> eiHeiHeiHeiIndeIndeIndeIndex ====4920<<<
/> />> eieiHeight ===============Text = " 8" br /> Top = 1200
Width = 615
End
Start VB.TextBox Text3
Height = 495
Left = 3960
TabIndex = 6
Text = " 5" br /> Top = 1200
Width = 615
End
Start VB.TextBox Text2
Height = 495
Left = 4920
TabIndex = 5
Text = " 5" br /> Top = 480
Width = 615
End
Start VB.TextBox Text1
Height = 495
Left = 3960
TabIndex = 4
Text = " 3" Top ===480<<<<<<<<<<<<<<<<<<<> End<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<> Top ==2400<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>LabelLabel4
Caption ="" quot; The HeiHeight ===495<<<<<<< /> Left =4680<<<<<<<< /> TabIndex ===<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< /> TabIndeIndeIndeIndex <<<<<<<<<<<<<<<<<<<<<<< />>>>>>>>> />>>>> />>>> The eiHeiHeiHeiHeiHeiTop Top = 1920
Width = 2535
End
Start VB. Label Label3
Caption ="& quot; br /> Height = 495
Left = 4680
TabIndex = 2
Top = 720
Width = 135
End
Start VB. Label Label Label2
Caption = " "< br /> Height = 495
Left = 3000
TabIndex = 1
Top = 1320
Width = 855
End
Start VB. Label Label Label1
Caption = " "< br /> Height = 255
Left = 3000
TabIndex = 0
Top = 600
Width = 735
End
End
VB Attributes Form1"< br />Attributes of VB Global NameSpace = False
Attributes of VB Creatable = False
Attributes of VB to PredeclaredId = True
Attributes of VB Exposed = False
Private Sub Command1 Click()
Dim T1 As Integer, T2 As Integer, T3 As Integer
T1 = Val(Text1) * 60 + Val(Text2)
T2 = Val(Text3) * 60 + Val(Text4)
T3 = T2 - T1
Label5 = " " " T3
Label6 = " " " Int((T3 / 60 * 2.5) * 10 + 0.5) / 10
End Sub
