The influence of Trojan horse mining on mobile phone
Publish: 2021-04-21 14:00:23
1. This trojan takes advantage of the "eternal blue" vulnerability to attack and spread in the local area network. It builds a robust botnet of the infected machine, supports the self-renewal of the intranet, and lurks in the computer for a long time to extract Monroe money. Because most ordinary personal computers have been patched by windows security update and Tencent computer manager and other security software, they are basically not affected by wanna miner. It is suggested that if the suspected wanna miner mining Trojan horse is found, the poisoned machine can be located and isolated in time. It can be judged by scanning port 26931. If the port is open, the host has been infected; If you need to patch the intranet, all the computers that have not been patched. It is suggested that professional terminal security management software should be installed in the whole network, such as Tencent Yudian. The administrator should carry out mass antivirus and patch installation for the whole network to avoid unnecessary losses.
2. Most mining software is deceptive
3. It will greatly rece the life of mobile phone hardware.
4. Enter the activity interface! That's it
5. It's the virus that will let your computer mine automatically.
the anti-virus software can kill the virus directly.
install a computer Housekeeper on your computer, and then use the virus to check and kill the virus to kill your computer
the anti-virus software can kill the virus directly.
install a computer Housekeeper on your computer, and then use the virus to check and kill the virus to kill your computer
6. As long as you don't escape, don't trust unknown enterprise applications or description files. It's not toxic.
Hot content