Position: Home page » Bitcoin » Bitcoin virus news update

Bitcoin virus news update

Publish: 2021-05-20 13:10:45
1.

Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money

so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening

a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...

hope to catch criminals as soon as possible and give them severe punishment by law

this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers

some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code

the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus

2.

The virus in the "bitcoin virus" incident is known as "ransomware". By encrypting the files in the victim's computer, you can't open them completely to ask for ransom. This is a virus attack launched by lawless elements by using "eternal blue" leaked from NSA hacker's weapon library. It does not need any operation of users. As long as it is turned on and connected to the Internet, lawless elements can implant blackmail software into computers and servers

What's more terrible is that this is just the beginning. Now this blackmail virus has spread to all over the world, including many colleges and universities in China. You can see many students on the Internet showing pictures of their computers being attacked. I have to say that hackers are really well intentioned, even in simplified Chinese

3.

In my opinion, I don't know if it's right. We still need criticism and correction. I don't think this virus has anything to do with which way you use to access the Internet, and it also has nothing to do with which kind of computer (PC or laptop) you use. He mainly aims at some loopholes in the Current Windows operating system. We all know that when a software is downloaded, it must have the highest administrator authority to install the software on this computer. This should be a security policy of the computer operating system. However, there are loopholes in everything, and the operating system is no exception. For example, this virus outbreak, in fact, the patch was released as early as March, but many users didn't pay attention to it and didn't fix it. So, now as long as you are connected to the network, and the system vulnerability is not repaired in time, you can scan the port, use the vulnerability of a port, directly install the encryption software (virus) to your computer in the background, and encrypt your important files, so as to achieve the purpose of blackmail. So it's better not to turn off the self-renewal function of windows for convenience. At the same time, it's also recommended to turn off some ports that are not often used but are very dangerous, such as 445, 135, 137, 138 and 139—— Finally, WiFi is just a way to access the Internet. It can also spread viruses. So, quickly update and patch it .... There is also a video here. I think it's very good, but I don't know if I can watch it http://weibo.com/tv/v/?fid=1034 :

4.

Internet security once again because of a large-scale outbreak of computer viruses and caused everyone's attention: bit virus. The emergence of this virus will make the computer's documents locked, hackers to coerce ransom, and most of the places are important units. For example, Chinese universities and British hospitals. The data of these units are very important. Most of the time, the school is not only an ecational unit, many key universities also undertake a lot of scientific research tasks. From a certain point of view, it also shows that hackers are very selective and targeted

Of course, the explanation given by Microsoft said that the virus was an attack against the vulnerability supplemented in March. In a way, hackers are also a test of users' security awareness. Microsoft has added software to the vulnerability in March. From this point of view, the hacker's attack is not brilliant. Because it is through the official patch, and then imagine no patch defects, so as to attack. Hackers also know the update awareness and security awareness of users. Of course, as a domestic company, 360 also seized this opportunity to quickly adjust the security housekeeper to check and kill the virus

from this point of view, Microsoft's vulnerability supplement is targeted and prescient, and the possible vulnerabilities should be supplemented in time

from the user's point of view, this virus attack is different from the previous one. In the past, it is generally in the form of camouflage and loading to ince customers to take the initiative to download. And this time the virus is mostly spread through the LAN, as long as you boot, the virus will invade. The document cannot be opened normally

if this virus attack has any inspiration for us to use computers and pay attention to Internet security, I think it can be inspired from at least two aspects: the first is to strengthen the security of computer systems, such as using official patches to repair vulnerabilities in time; the other is to install regular anti-virus software, update it in time, and strengthen the firewall


5. In case of computer poisoning or Trojan horse, it is suggested to kill the virus quickly.
it is suggested that the building owner download and install Tencent computer housekeeper to kill the virus,
restart the computer, press F8 to enter the safe mode - Open Tencent computer Housekeeper - lightning anti-virus - full scan - restart the computer.
Tencent computer housekeeper is an anti-virus software
Tencent computer housekeeper anti-virus management two in one, 16 layers of real-time protection, with xiaohongsan, Jinshan and other four virus search engines, can timely intercept phishing websites and Trojan viruses
it takes up less resources and does not affect the owner's office and entertainment.
6. blockchain technology is best known in the financial sector: its origins are integrated with cryptocurrencies that rely on blockchain transparency and unparalleled security to accelerate their success. In essence, through a decentralized distributed digital ledger, the blockchain can record any valuable transaction in the whole computer system, so that no record can be changed quietly without the consensus of the whole computer system
in the financial field, blockchain has been explored and actively used for financial transactions and even contract management. For the supply chain, the benefits are not limited to just keeping accurate records: the blockchain fundamentally reces the time spent on paperwork and authorization. At present, most of the proct or material delivery delays are e to these two points. However, in the blockchain, it does not take time to verify the previous records, only a digital signature is needed to ensure the accuracy and authenticity of digital paper records< At present, consumers have to rely on certificates to verify the authenticity of gemstones. A piece of paper can be easily changed. When many diamond owners value their diamonds with the intention of selling them, they will find that their perfect diamonds are only a little more valuable than glass or smaller diamonds
with the application of blockchain, diamonds can be used as raw stones for unique barcode coding when they are just mined from the vegetable market. While maintaining the integrity of their information, changes made and records handled, they can circulate in the whole supply chain. Throughout the supply chain, authenticity can be verified and there are no unauthorized changes, so the end buyer can track the origin of the diamond (in fact, any other material used to make the final proct) and its entire circulation
similarly, through the blockchain, we can trace the origin, service and ownership history of used cars, so as to rece service fraud (such as the place where the odometer is recalibrated) and the number of stolen vehicles in circulation, and also hope that these instries will be completely terminated
transparency and security
Security and transparency are not usually terms that go hand in hand, but they do on blockchains. As mentioned above, the security of blockchain does not allow any form of unauthorized changes and ensures the authenticity of data. By storing the same "block" information that needs to be collectively approved on its network, the blockchain can not be controlled by any single entity, and there will be no single point of failure, which makes it the most secure platform so far
blockchain can provide transparency, however, its programming mode only allows authorized entities to access information related to their specific interests. For example, buyers may be able to view transaction history, but will be denied access to sensitive or personal information, such as addresses
from a compliance perspective, this helps to ensure that all parties comply with laws, such as the EU's general data protection regulation (gdpr) and South Africa's Personal Information Protection Act (Popi), while still being able to share or access information related to their own parts of the supply chain
there are many application examples of blockchain technology, and supply chain is one of them. However, e to the complexity and number of parties involved in the supply chain, blockchain is considered to be the perfect solution to all the challenges so far, including security, delay and authenticity.
7. Wannacry blackmail virus is also known as bitcoin virus. When the bitcoin virus broke out, the price of bitcoin also went up by leaps and bounds, but bitcoin has gone down in recent days
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
8.
  1. many countries suffered from network attacks

  2. < / OL >

    on May 12, many countries around the world suffered from large-scale network attacks. After the computers of the attackers were locked, they were required to pay bitcoin to unlock. The spread of malware began in the UK. At present, no hacker organization has claimed the attack

    According to a report released by Kaspersky laboratory, a Russian network security enterprise, on the 12th, it was found that 74 countries and regions around the world had suffered the attack, and the actual scope may be wider. The agency said that in the 20 most attacked countries and regions, Russia was far more vulnerable than other victims, and Chinese mainland ranked fifth. p>
9.

Around 20:00 on May 12, 2017, bitcoin blackmail computer virus broke out in the world, which is a global blackmail software infection event


5.360 security guard has provided "NSA Arsenal immunization tool", which can be downloaded and installed

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750