There is a mining Trojan on the pagoda panel
Publish: 2021-04-28 11:14:10
1. This trojan takes advantage of the "eternal blue" vulnerability to attack and spread in the local area network. It builds a robust botnet of the infected machine, supports the self-renewal of the intranet, and lurks in the computer for a long time to extract Monroe money. Because most ordinary personal computers have been patched by windows security update and Tencent computer manager and other security software, they are basically not affected by wanna miner. It is suggested that if the suspected wanna miner mining Trojan horse is found, the poisoned machine can be located and isolated in time. It can be judged by scanning port 26931. If the port is open, the host has been infected; If you need to patch the intranet, all the computers that have not been patched. It is suggested that professional terminal security management software should be installed in the whole network, such as Tencent Yudian. The administrator should carry out mass antivirus and patch installation for the whole network to avoid unnecessary losses.
2. Can try avast antivirus, occupy small, the 360 and computer housekeeper software such as deleted, this consumption of computer performance
3. You can open the Tencent Smart Security page
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
4. Computer poisoning is the most troublesome, and the virus in your computer seems to be very tricky, but now there are many kinds of anti-virus software, you can choose another one, boot and restart from the safe mode, I use Tencent computer housekeeper's, anti-virus effect is very good, web fire wall double defense, comprehensive interception of bad Web pages, network traffic monitoring function, new features, Comprehensive management of network use, faster and more free access to the Internet, more comprehensive garbage cleaning, more thorough cleaning of system garbage, making the system faster and easier, and occupying less memory, can well protect the security of the system
5. It's OK to use Tencent computer housekeeper. Every time I download a software, I open Tencent computer housekeeper, and then check if there is any abnormality in the software. If not, I use it. If there is, Tencent computer Housekeeper will kill it directly
6. In view of such Trojan invasion, it is recommended to install security software for protection
Download Tencent computer manager and turn on the real-time protection function
once you browse the virus webpage or download the virus software, you will give a security warning
if there is a virus invasion, you can immediately prompt and kill the virus
Download Tencent computer manager and turn on the real-time protection function
once you browse the virus webpage or download the virus software, you will give a security warning
if there is a virus invasion, you can immediately prompt and kill the virus
7. First of all, physical isolation, and then ask professional security vendors to determine the type of virus, and then repair the relevant system vulnerabilities, and then use special killing tools or anti-virus software for killing
Hot content