Position: Home page » Bitcoin » Website blackmailed by hackers for bitcoin

Website blackmailed by hackers for bitcoin

Publish: 2021-03-29 08:21:35
1.

bitcoin is safe, has a large rising space, circulates globally and is easy to preserve

01, bitcoin is relatively safe< p>

this actually happened in Foxconn's overseas factories. The hackers broke into their systems and stole their unencrypted files. Then the hackers locked the files with their own passwords

the contents of these files are more important to Foxconn, and then Foxconn is required to exchange 1804 bitcoins for password keys, which is about 35 million US dollars according to the current market value. If you pay attention to this aspect of news, you may find that now hackers extort bitcoins instead of US dollars, euro and RMB

and bitcoin is relatively easy to save, just need to save to their own virtual account, bitcoin has another advantage, that is, it does not exist counterfeit money

2. Bitcoin virus (bitcoin Trojan horse) & quot; Bitcoin blackmailer & quot; It was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, so that it can not be opened normally, and pop up the window & quot; Blackmail & quot; Victim, ask victim to pay 3 bitcoin as & quot; Ransom;, According to the recent price comparison of bitcoin found by the reporter from the Internet, 3 bitcoin is about 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail, and the name of the Trojan horse program is usually English, which means & quot; Order & quot& quot; Proct details & quot; And use fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
3.

Wanacry blackmail virus is a kind of worm computer virus with blackmail nature written by the professional criminal group of "shadow broker"

because of the wanacry blackmail virus, the windows-445 series port vulnerability ms17-010 is used to attack, which covers all versions of windows and has a huge audience. After wanacry attacks the computer, it will encrypt a large number of users' documents / data / files / photos, and require payment of bitcoin ransom to unlock

< H2 > unfortunately, Windows users are attacked by wanacry blackmail virus. The current solutions are as follows: (never pay ransom in any case, there is a lot of evidence that even if ransom is paid, the file cannot be decrypted.) < UL >

  • Windows users can completely eliminate wanacry blackmail virus on devices by formatting all hard disks

  • indivial users can contact domestic and foreign security manufacturers, such as Qihoo 360, Jinshan drug bully, Kaspersky, mcfel, Tencent security manager and other security centers for assistance in recovering important data

  • use "blackmail virus immune tool" to repair. Users download the offline version of Tencent computer manager "blackmail virus immunity tool" through other computers, and the files to a safe and non-toxic U disk; Then turn on the designated computer when WiFi is turned off, the network cable is unplugged and the network is disconnected, and back up important files as soon as possible; Then use the offline version of "blackmail virus immunity tool" to fix the vulnerability with one click through USB flash disk; Network can be normal use of the computer

  • use the file recovery tool to recover. Users who have been infected with the virus can use the computer manager - file recovery tool for file recovery, with a certain probability of recovering your documents

  • < / UL >

    note: we will continue to pay attention to the handling methods of relevant security manufacturers, waiting for more superior perfect unlocking

    4.

    Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen

    if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control




    extended information:

    the constituent elements of the crime of extortion:

    1. Subjective elements

    this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion

    The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private property

    5.

    There are several reasons as follows:

    1. Foxconn was blackmailed by hackers for 1804 bitcoins. Foxconn's response is not a big problem< p> According to media reports, Foxconn was attacked by hackers who asked for 1804 bitcoins. For a while, everyone wanted to know what Foxconn would do, so Foxconn said, "it's not a big problem, it's being dealt with "


    3. Bitcoin is a global currency< p> One of the most powerful aspects of bitcoin is that it can be used in any country. You don't have to worry about not being able to spend it or buy anything. In addition, bitcoin will increase in value at any time, will not shrink all of a sudden, it is not worth money

    in a word, according to the above analysis, the advantage of bitcoin to hackers is that they only need bitcoin< otherwise, if you take other money, you will have to spend your life


    6. 1. Every server has a database backup, and some of them are backed up on other databases or other mobile hard disks. If hackers attack, they can recover
    2. If you don't have a backup, you have to call the police
    3. Contacting hackers without permission can't recover data, and they will only sink deeper and deeper
    4. Pay attention to more backup and multiple ways in the future, and the daily responsibilities of the administrator should also be managed by someone.
    7. Bitcoin (bitcoin: bitcoin) was originally a kind of network virtual currency, similar to Tencent's q-coin, but it has been able to buy real-life goods. It is characterized by decentralization, anonymity, and can only be used in the digital world. It does not belong to any country or financial institution, and is not subject to geographical restrictions. It can be exchanged anywhere in the world. Therefore, it is used as a money laundering tool by some criminals. In 2013, the U.S. government recognized the legal status of bitcoin, making the price of bitcoin soar. In China, on November 19, 2013, a bitcoin was equivalent to 6989 yuan
    on January 7, 2014, Taobao announced that it would ban the sale of Internet virtual currencies such as bitcoin and lightcoin from January 14. On February 26, 2014, Democratic Senator Joe Manchin of West Virginia issued an open letter to a number of regulatory authorities of the US federal government, hoping that relevant institutions would pay attention to the current situation of bitcoin encouraging illegal activities and disrupting the financial order, and demanded that actions be taken as soon as possible to completely ban the electronic currency. On January 11, 2017), the Shanghai headquarters of the people's Bank of China and the Shanghai Municipal Finance Office carried out on-site inspection of bitcoin China, focusing on whether the enterprise carried out credit, payment, exchange and other related businesses without permission or license; Implementation of anti money laundering system; Fund security risks, etc. On January 12, 2017, the business management department of the people's Bank of China also entered the trading platforms such as "fire coin net" and "currency bank" in Beijing
    on May 12, 2017, a global outbreak of bitcoin virus madly attacked public and commercial systems! More than 40 hospitals across the UK have been widely hacked, leaving the NHS in chaos. The campus networks of many colleges and universities in China were also occupied. Nearly 74 countries in the world have been seriously attacked! Thank you
    8. At present, there is an unpopular way to use bug to get your character into the wall, so that you won't be attacked by monsters, but you can't get out. If you insist on going to three-layer mining, the best way is to form a team to go down mining together
    9. The leader of Jiaozuo blockchain is Wang Molu
    10. Camouflage global IP address to attack foreign websites, and then wordy, bitcoin is illegal at home.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750