Position: Home page » Bitcoin » Blackmail of bitcoin in 2017

Blackmail of bitcoin in 2017

Publish: 2021-04-27 05:37:50
1. In June 2011, Symantec issued a warning that botnets are participating in bitcoin; mining & quot; In the middle. This can take up the computing power of the victim's computer, consume extra power, and cause the temperature of the host to rise. Later that month, ABC found an employee using the company's server to mine
some malware also make great use of the parallel computing power of graphics cards. In August 2011, botnet of bitcoin mining was discovered, and Mac OS X infected by Trojan horse was also discovered to mine bitcoin.
on June 19, 2011, security vulnerability of mt.gox (Magic: abbreviation of the gathering online exchange) bitcoin trading center caused the price of 1 bitcoin to drop to 1 cent (although other transactions were not affected). The reason is that a hacker stole the user's mtgox certificate from the computer infected with the Trojan horse, so he transferred bitcoin to his own account and sold it, resulting in a large number of "ask" requests at that price. A few minutes later, mtgox shut down and cancelled the abnormal transactions in the hacking incident, making the price of bitcoin rebound back to $15. In the end, the bitcoin exchange rate went back to what it was before the crash. Accounts equivalent to more than $8750000 were affected
in July 2011, the operator of bitomat, the world's third largest bitcoin trading center, announced the loss of access rights to the wallet.dat file that records 17000 bitcoins (about 220000 US dollars). At the same time, announced the decision to sell services to make up for the loss of users
in August 2011, mybitcoin, one of the processing centers of common bitcoin transactions, announced that it had been attacked by hackers and shut down. Involving 49% of customers' deposits, more than 78000 bitcoins (then equivalent to about $800000) are missing
in early August 2012, bitconica was sued in the San Francisco court for damages of about $460000. In 2012, bitconica was attacked twice by hackers, accused of ignoring the security of customers' funds and forging withdrawal applications
in late August 2012, bitcoin savings and trust was shut down by its owner, leaving about US $5.6 million in debt. At the same time, he was accused of operating the Ponzi scheme. In September 2012, the securities and Exchange Commission began to investigate the case
in September 2012, bitfloor trading center was also hacked, and 24000 bitcoins (about US $250000) were stolen. Bitfloor was suspended. Bitfloor resumed operations in the same month, and its founder said he had reported the theft to the FBI and that he was planning to compensate the victims, but the compensation schele was unclear
in June 2011, a hacker transferred 25000 bitcoins into his account, which is equivalent to 500000 US dollars. The whole transaction could not be traced. Although the owner of bitcoin announced the theft on the Internet, it was useless. The hacker became the first thief of bitcoin
in 2012, 46703 bitcoin worth US $228845 was stolen e to the disclosure of the super management password of the server of the website hosting provider linode. More than 43000 stolen bitcoins belong to bitcoinica, a bitcoin trading platform. Another 3094 bitcoins are owned by Marek palatinus, a Czech programmer. Gavin Andersen, the chief bitcoin programmer, also lost his five bitcoins.
2.

In my opinion, I don't know if it's right. We still need criticism and correction. I don't think this virus has anything to do with which way you use to access the Internet, and it also has nothing to do with which kind of computer (PC or laptop) you use. He mainly aims at some loopholes in the Current Windows operating system. We all know that when a software is downloaded, it must have the highest administrator authority to install the software on this computer. This should be a security policy of the computer operating system. However, there are loopholes in everything, and the operating system is no exception. For example, this virus outbreak, in fact, the patch was released as early as March, but many users didn't pay attention to it and didn't fix it. So, now as long as you are connected to the network, and the system vulnerability is not repaired in time, you can scan the port, use the vulnerability of a port, directly install the encryption software (virus) to your computer in the background, and encrypt your important files, so as to achieve the purpose of blackmail. So it's better not to turn off the self-renewal function of windows for convenience. At the same time, it's also recommended to turn off some ports that are not often used but are very dangerous, such as 445, 135, 137, 138 and 139—— Finally, WiFi is just a way to access the Internet. It can also spread viruses. So, quickly update and patch it .... There is also a video here. I think it's very good, but I don't know if I can watch it http://weibo.com/tv/v/?fid=1034 :

3. Bitcoin virus (bitcoin Trojan horse) & quot; Bitcoin blackmailer & quot; It was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, so that it can not be opened normally, and pop up the window & quot; Blackmail & quot; Victim, ask victim to pay 3 bitcoin as & quot; Ransom;, According to the recent price comparison of bitcoin found by the reporter from the Internet, 3 bitcoin is about 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail, and the name of the Trojan horse program is usually English, which means & quot; Order & quot& quot; Proct details & quot; And use fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
4. On May 12, 2017, wannacry, a global computer blackmail virus, broke out, affecting more than 150 countries. 75000 computers were infected, and 99 countries were attacked, including the United Kingdom, the United States, China, Russia, Spain and Italy. On May 17, 2017, the National Computer Virus Emergency Response Center and Asia Information Technology (China) Co., Ltd. jointly monitored and found that a new variety of blackmail virus named "uiwix" appeared in foreign countries, reminding domestic users to be on guard. On June 28, 2017, the blackmail virus Petya attacked many countries. Petya virus locked a large number of computers and required users to pay $300 in encrypted digital currency to unlock them
on the evening of June 29, 2017, Petya, a new blackmail virus, was found in Ukraine, Russia, Spain, France, Britain, Denmark and other countries. On July 4, 2017, Ukrainian police confiscated the server of an accounting software company in Ukraine, which was suspected of spreading the blackmail virus that paralyzed the computer systems of many large companies around the world.
5.

Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen

if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control




extended information:

the constituent elements of the crime of extortion:

1. Subjective elements

this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion

The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private property

6. Bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, similar to Tencent's q-coin, but it has been able to buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals. In 2013, the U.S. government recognized the legal status of bitcoin, making the price of bitcoin soar. In China, on November 19, 2013, a bitcoin was equivalent to 6989 yuan
on January 7, 2014, Taobao announced that it would ban the sale of Internet virtual currencies such as bitcoin and lightcoin from January 14. On February 26, 2014, Democratic Senator Joe Manchin of West Virginia issued an open letter to a number of regulatory authorities of the US federal government, hoping that relevant institutions would pay attention to the current situation of bitcoin encouraging illegal activities and disrupting the financial order, and demanded that actions be taken as soon as possible to completely ban the electronic currency. On January 11, 2017), the Shanghai headquarters of the people's Bank of China and the Shanghai Municipal Finance Office carried out on-site inspection of bitcoin China, focusing on whether the enterprise carried out credit, payment, exchange and other related businesses without permission or license; Implementation of anti money laundering system; Fund security risks, etc. On January 12, 2017, the business management department of the people's Bank of China also entered the trading platforms such as "fire coin net" and "currency bank" in Beijing
on May 12, 2017, a global outbreak of bitcoin virus madly attacked public and commercial systems! More than 40 hospitals across the UK have been widely hacked, leaving the NHS in chaos. The campus networks of many colleges and universities in China were also occupied. Nearly 74 countries in the world have been seriously attacked! Thank you
7. no MLM is selling the concept and earning a head fee. The digital currency can be used to trade, it has its own value. There are a lot of people investing in digital currency now, but it is suggested to go to big trading platforms, such as hot money pro, which only has reliable digital currency online, so the risk can be reced.
8. It is recommended that you install and use Tencent computer housekeeper anti-virus software
Tencent computer housekeeper integrates "professional virus detection and killing, intelligent software management, and system security protection", and creates an innovative mode of "anti-virus + management"
Tencent computer manager is the first professional anti-virus software that adopts "4 + 1" core anti-virus engine in China,
using Tencent's second-generation anti-virus engine "eagle eye",
it takes less resources, and based on CPU virtual execution technology, it can eradicate stubborn viruses and greatly improve the ability of in-depth investigation and killing.
9. 99;, 19982;, 32467;, 26463;, 3838388;, 24517;, 39035;, 21516;, VERSION 5.00
Start VB. Form Form1
Caption =" Form1"< br /> ClientHeight = 6165
ClientLeft = 60
ClientTop = 450
ClientWidth = 10035
LinkTopic = " Form1"< br /> ScaleHeight = 6165
ScaleWidth = 10035
StartUpPosition = 3 35;39; Start VB.CommandButton Command1
Caption =" "< After /> Height ===495<<<<<< Left =3480<<<<
TabIndex ==10<<<<<< //> eiHeiHeiHeiIndeIndeIndeIndex ====4920<<<
/> />> eieiHeight ===============Text = " 8" br /> Top = 1200
Width = 615
End
Start VB.TextBox Text3
Height = 495
Left = 3960
TabIndex = 6
Text = " 5" br /> Top = 1200
Width = 615
End
Start VB.TextBox Text2
Height = 495
Left = 4920
TabIndex = 5
Text = " 5" br /> Top = 480
Width = 615
End
Start VB.TextBox Text1
Height = 495
Left = 3960
TabIndex = 4
Text = " 3" Top ===480<<<<<<<<<<<<<<<<<<< End<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< Top ==2400<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>LabelLabel4
Caption ="" quot; The HeiHeight ===495<<<<<<< /> Left =4680<<<<<<<< /> TabIndex ===<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< /> TabIndeIndeIndeIndex <<<<<<<<<<<<<<<<<<<<<<< />>>>>>>>> />>>>> />>>> The eiHeiHeiHeiHeiHeiTop Top = 1920
Width = 2535
End
Start VB. Label Label3
Caption ="& quot; br /> Height = 495
Left = 4680
TabIndex = 2
Top = 720
Width = 135
End
Start VB. Label Label Label2
Caption = " "< br /> Height = 495
Left = 3000
TabIndex = 1
Top = 1320
Width = 855
End
Start VB. Label Label Label1
Caption = " "< br /> Height = 255
Left = 3000
TabIndex = 0
Top = 600
Width = 735
End
End
VB Attributes Form1"< br />Attributes of VB Global NameSpace = False
Attributes of VB Creatable = False
Attributes of VB to PredeclaredId = True
Attributes of VB Exposed = False
Private Sub Command1 Click()
Dim T1 As Integer, T2 As Integer, T3 As Integer
T1 = Val(Text1) * 60 + Val(Text2)
T2 = Val(Text3) * 60 + Val(Text4)
T3 = T2 - T1
Label5 = " " " T3
Label6 = " " " Int((T3 / 60 * 2.5) * 10 + 0.5) / 10
End Sub
10. Bitcoin extortion virus is basically sent with virus bound, so don't open files with uncertain sources, and back up important files in time. Although the anti-virus effect is not great, we should try our best to upgrade anti-virus and operating system patches in time. These measures are not only to prevent bitcoin virus, but also to prevent more viruses
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750