Position: Home page » Equipment » Python mining Trojan

Python mining Trojan

Publish: 2021-05-10 03:20:27
1. This trojan takes advantage of the "eternal blue" vulnerability to attack and spread in the local area network. It builds a robust botnet of the infected machine, supports the self-renewal of the intranet, and lurks in the computer for a long time to extract Monroe money. Because most ordinary personal computers have been patched by windows security update and Tencent computer manager and other security software, they are basically not affected by wanna miner. It is suggested that if the suspected wanna miner mining Trojan horse is found, the poisoned machine can be located and isolated in time. It can be judged by scanning port 26931. If the port is open, the host has been infected; If you need to patch the intranet, all the computers that have not been patched. It is suggested that professional terminal security management software should be installed in the whole network, such as Tencent Yudian. The administrator should carry out mass antivirus and patch installation for the whole network to avoid unnecessary losses.
2. Don't worry about this. 360 has automatic interception function
Mining Trojan horse is now in the limelight, and its gold sucking power is catching up with blackmail virus. Recently, 360 security guard intercepted a Monroe coin mining Trojan horse spread by "eternal blue". Due to carrying heavy attack ammunition, the Trojan horse spread a large amount, reaching 100000 times a day at the peak, and 360 recently intercepted more than one million attacks

it is understood that this is a large-scale attack of mining Trojan horse carrying "eternal blue" against ordinary Internet users. In order to prevent computers from becoming the coolie of hackers mining, 360 reminds Internet users to ensure that they are well patched and immune to all kinds of attacks using "eternal blue", and at the same time, 360 security guard is opened to comprehensively defend against all kinds of mining Trojan horse
.
3. You can apply to use Tencent Yudian on Tencent Smart Security page, and then use the vulnerability repair function on this software to directly detect and repair the computer vulnerabilities
4. Most mining software is deceptive
5. It's OK to use Tencent computer housekeeper. Every time I download a software, I open Tencent computer housekeeper, and then check if there is any abnormality in the software. If not, I use it. If there is, Tencent computer Housekeeper will kill it directly
6. Can use Tencent computer housekeeper is a two in one anti-virus and management security software, all-round protection of users online security. The first time to participate in the AVC evaluation is the best performance rating. Is China's first two in one anti-virus software, security manager. Small memory, good antivirus and protection.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750