Position: Home page » Bitcoin » Sexual bitcoin blackmail

Sexual bitcoin blackmail

Publish: 2021-05-19 16:42:05
1.

bitcoin blackmail refers to an email received in the mailbox. The content of the email generally includes: malicious software on the computer has captured the recipient's indecent photos through the webcam, knows the recipient's real password, etc., which makes the recipient fear and demands to pay the sealing fee in the form of "bitcoin"


if the blackmailer passes the email, he will take the next step, and he does have a lot of important information. In any case, don't transfer bitcoin to blackmailers. It's a bottomless hole. It's a good choice to keep all the evidence and report to the police. The above personal opinions are welcome to be criticized and corrected. Agree with me, please click like before you go, thank you! Like me, please pay attention to me, thank you again

2. Bitcoin virus (bitcoin Trojan horse) & quot; Bitcoin blackmailer & quot; It was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, so that it can not be opened normally, and pop up the window & quot; Blackmail & quot; Victim, ask victim to pay 3 bitcoin as & quot; Ransom;, According to the recent price comparison of bitcoin found by the reporter from the Internet, 3 bitcoin is about 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail, and the name of the Trojan horse program is usually English, which means & quot; Order & quot& quot; Proct details & quot; And use fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
3. Bitcoin extortion viruses are basically sent by mail, and are bound with viruses. Therefore, do not open files with uncertain sources, and back up important files in time. Although antivirus software has little effect, it is still necessary to upgrade antivirus software and operating system supplements as soon as possible. These measures are not only to prevent bitcoin viruses, but also to prevent more viruses
4.

Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen

if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control




extended information:

the constituent elements of the crime of extortion:

1. Subjective elements

this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion

The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private property

5. In short, blackmail virus is a computer virus that uses Windows system vulnerability to maliciously encrypt user files and then extort money

{rrrrrrr}

  • 10

    (3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning

  • < / UL >
    6. no MLM is selling the concept and earning a head fee. The digital currency can be used to trade, it has its own value. There are a lot of people investing in digital currency now, but it is suggested to go to big trading platforms, such as hot money pro, which only has reliable digital currency online, so the risk can be reced.
    7. What is blackmail virus< Different from other similar blackmail viruses, wannacry virus is a kind of worm that can infect other computers automatically and spread rapidly e to chain reaction
    2. This kind of blackmail virus mainly infects windows system. It will use encryption technology to lock files, forbid users to access, and blackmail users
    3. The attacker claimed that he could only unlock the file after asking for more than $300 worth of bitcoin. In fact, even if the ransom is paid, it may not be able to unlock the file
    Why are they infected
    once the blackmail worm attacks a user machine that can connect to the public network, it will scan the IP of the intranet and the public network. If the scanned IP has opened port 445, it will use the "enternal blue" vulnerability to install the back door. Once the backdoor is executed, a blackmailer virus named wana crypt0r will be released to encrypt all documents and files on the user's machine for blackmail
    why use bitcoin
    bitcoin is a kind of point-to-point network payment system and virtual pricing tool, commonly known as digital currency. Bitcoin is popular among cyber criminals because it is decentralized, unregulated and almost untraceable< Background of transmission and infection
    this round of blackmailer worm virus mainly includes two family variants onion and wncry, which first broke out in Britain, Russia and other countries, and many enterprises and medical institutions were recruited in the system, resulting in heavy losses
    global monitoring of security agencies has found that as many as 74 countries have suffered this blackmailer worm attack
    since May 12, the spread of infection in China has also begun to increase sharply, and the outbreak has been intensified in many universities and enterprises
    wannacry blackmail virus prevention method:
    1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
    2. Close ports 445, 135, 137, 138 and 139, and close network sharing
    3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
    4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
    5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
    8. 1. Don't give money. Even if you hand it in, you may not be able to recover the data
    2. 3. Install anti extortion protection tools, do not visit the website, do not open suspicious mail and files
    4. Turn off the computer, including TCP and UDP protocol ports 135 and 445. Pay special attention to win7 system, do not use campus network, nor CMCC
    5. If you still can't understand it, cut off the network
    [how to prevent bitcoin blackmailer virus] some suggestions on Security:
    backup important personal data. Pay attention to personal computer security maintenance, regularly update system patches, safe and reliable antivirus software.
    9. Personal information is obtained by hackers attacking some websites. Change the password. Those who receive this email don't care. It's all fraud. You may receive "last warning" in half a year.. Add a sentence, you these on the website can not be described is not a panic heart, ha ha ha ha
    10. How to prevent bitcoin extortion virus
    1. Don't open strangers or unknown e-mails to prevent attacks through e-mail attachments
    2. Try not to click the office macro running prompt to avoid virus infection from office components
    3. Download the required software from the official website, do not double-click to open. JS,. VBS and other suffix files
    4. Upgrade NGAF to the latest anti-virus and other security features library
    5. Upgrade the anti-virus software to the latest anti-virus library to prevent the attack of existing virus samples
    6. Regularly back up important data and files in different places, and recover them in case of virus< According to the characteristics of the blackmail virus, we can judge that its variants can usually hide features, but can not hide its key behavior. After summarizing, the behavior of the blackmail virus in the process of running mainly includes the following aspects:
    1. HTTP request through script file; 2
    2. Download files through script files
    3. Read remote server files
    4. Collect computer information
    5. Traverse the file
    6. Call the encryption algorithm library.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750