The first serious case of Trojan horse in mining
Publish: 2021-05-12 11:23:46
1. This trojan takes advantage of the "eternal blue" vulnerability to attack and spread in the local area network. It builds a robust botnet of the infected machine, supports the self-renewal of the intranet, and lurks in the computer for a long time to extract Monroe money. Because most ordinary personal computers have been patched by windows security update and Tencent computer manager and other security software, they are basically not affected by wanna miner. It is suggested that if the suspected wanna miner mining Trojan horse is found, the poisoned machine can be located and isolated in time. It can be judged by scanning port 26931. If the port is open, the host has been infected; If you need to patch the intranet, all the computers that have not been patched. It is suggested that professional terminal security management software should be installed in the whole network, such as Tencent Yudian. The administrator should carry out mass antivirus and patch installation for the whole network to avoid unnecessary losses.
2. Can try avast antivirus, occupy small, the 360 and computer housekeeper software such as deleted, this consumption of computer performance
3. Most mining software is deceptive
4. In view of such Trojan invasion, it is recommended to install security software for protection
Download Tencent computer manager and turn on the real-time protection function
once you browse the virus webpage or download the virus software, you will give a security warning
if there is a virus invasion, you can immediately prompt and kill the virus
Download Tencent computer manager and turn on the real-time protection function
once you browse the virus webpage or download the virus software, you will give a security warning
if there is a virus invasion, you can immediately prompt and kill the virus
5. It's the virus that will let your computer mine automatically.
the anti-virus software can kill the virus directly.
install a computer Housekeeper on your computer, and then use the virus to check and kill the virus to kill your computer
the anti-virus software can kill the virus directly.
install a computer Housekeeper on your computer, and then use the virus to check and kill the virus to kill your computer
6. The CPU didn't see it. The screenshot is too small. It's not a Trojan horse problem on your steam. You can download a steam Creative Workshop repairer from the Internet and open it. The trouble is that every time you log in to steam, you have to open the repairer.
7. When I registered, I didn't pay any fees. I could make money without recharging. I played for a long time and made more money. It's a very exciting game. I still like it very much.
8. Once the invasion is successful, it will upload toxic computer information, update virus mole, Download mining mole and execute network attack mole to spread worms. Because of its strong infectivity, fast transmission speed and wide range, it is easy to break out in the enterprise intranet, which needs to arouse the high vigilance of instry users and security instry. Can use Tencent computer housekeeper for defense
Hot content