Position: Home page » Bitcoin » The mailbox was blackmailed with bitcoin

The mailbox was blackmailed with bitcoin

Publish: 2021-05-16 05:49:17
1.

bitcoin blackmail refers to an email received in the mailbox. The content of the email generally includes: malicious software on the computer has captured the recipient's indecent photos through the webcam, knows the recipient's real password, etc., which makes the recipient fear and demands to pay the sealing fee in the form of "bitcoin"


if the blackmailer passes the email, he will take the next step, and he does have a lot of important information. In any case, don't transfer bitcoin to blackmailers. It's a bottomless hole. It's a good choice to keep all the evidence and report to the police. The above personal opinions are welcome to be criticized and corrected. Agree with me, please click like before you go, thank you! Like me, please pay attention to me, thank you again

2. Bitcoin virus (bitcoin Trojan horse) & quot; Bitcoin blackmailer & quot; It was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, so that it can not be opened normally, and pop up the window & quot; Blackmail & quot; Victim, ask victim to pay 3 bitcoin as & quot; Ransom;, According to the recent price comparison of bitcoin found by the reporter from the Internet, 3 bitcoin is about 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail, and the name of the Trojan horse program is usually English, which means & quot; Order & quot& quot; Proct details & quot; And use fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
3.

Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen

if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control




extended information:

the constituent elements of the crime of extortion:

1. Subjective elements

this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion

The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private property

4. 1. Every server has a database backup, and some of them are backed up on other databases or other mobile hard disks. If hackers attack, they can recover
2. If you don't have a backup, you have to call the police
3. Contacting hackers without permission can't recover data, and they will only sink deeper and deeper
4. Pay attention to more backup and multiple ways in the future, and the daily responsibilities of the administrator should also be managed by someone.
5. no MLM is selling the concept and earning a head fee. The digital currency can be used to trade, it has its own value. There are a lot of people investing in digital currency now, but it is suggested to go to big trading platforms, such as hot money pro, which only has reliable digital currency online, so the risk can be reced.
6. Evgeniy
Mikhailovich
bogachev, the author of the "bitcoin blackmailer" Trojan family, is a Russian hacker, ranking second on the list of the top ten most wanted hackers by the FBI and the leader of a cyber criminal group.
7.

You can call 12377 to report a blackmail. In addition to maintaining personal privacy through "12377", we can also report "seven bottom line harmful information" such as "network blackmail and paid deletion", "violent and terrorist audio and video harmful information", violation of laws and regulations bottom line, and "illegal and bad information" such as obscenity and pornography

all citizens can report online illegal case clues and online illegal and bad information

the report website of the Ministry of public security will take every clue seriously. After verification, if the situation is true, the public security organ will deal with the reported website and relevant personnel in accordance with the law, and feed back the handling situation to the informant

extended information:

notes for reporting:

1. Real name reporting is advocated. Please fill in the contact information for real name reporting

2. Please fill in all columns in the report form truthfully and try to be detailed. Marked with & quot***& quot; Required items are required

3. For the convenience of query processing results, please register users. Registered users can query the processing results of previous reports after logging in, while non registered users can only query the investigation situation of a single report with the alarm code and query password

8. Personal information is obtained by hackers attacking some websites. Change the password. Those who receive this email don't care. It's all fraud. You may receive "last warning" in half a year.. Add a sentence, you these on the website can not be described is not a panic heart, ha ha ha ha
9. Hackers hacked, or encountered a liar master, they have a lot of telecom network liars, through some base station group email. In fact, you don't need to pay attention to these e-mails. You'd better change your password, encrypt some important e-mails and save important materials.
10. Maxthon is Aoyou browser. Your default browser is Aoyou. Possible situation is a Trojan horse, open Aoyou run
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750