Position: Home page » Bitcoin » What about bitcoin virus

What about bitcoin virus

Publish: 2021-05-20 15:20:40
1. 1. Reload the system, but the infected files cannot be recovered< Prevent file loss and virus invasion:
(1) data backup and recovery measures are the important work to recover the loss in the event of blackmail, so it is necessary to make remote backup of important file data in time to prevent losses caused by virus infection
(2) make sure the firewall is on
(3) don't open unknown email or link easily.
2. Wannacry virus is spread based on Windows system, and smartphone users will not be affected. To prevent viruses, please open the system control panel - system and security - install system patches. If you do not open the system patch function, please open and repair all vulnerabilities immediately. It is recommended to upgrade the system for systems below Windows 7. Thank you for your support and trust in Tencent housekeeper.
3. 1、 Prepare a U-disk or mobile hard disk. Before going to work on Monday, you can download 360 security guard [offline disaster relief version] under the safe network environment at home. 2. After arriving at the company, first unplug the network cable of the office computer, turn off the wireless network switch, and then turn on the computer. 3. Insert the prepared U-disk or mobile hard disk into the office computer, and install 360 security guard [offline disaster relief version]. 4 The NSA Arsenal immune tool of 360 security guard [offline disaster relief version] will run automatically, and detect whether there is a vulnerability in your computer. 5. Please wait patiently ring the process of repairing the vulnerability, which generally takes 3-5 minutes. After the repair is successful, you will be prompted by a pop-up window. Please [restart computer] so that the repair operation will take effect completely. 7、 After restarting the computer, you can run the NSA defense tool again through the desktop shortcut [blackmail virus relief] to ensure that your system has been repaired.
4. The concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's idea, open source software was designed and released, and P2P network was built on it. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system

unlike most currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to 21 million

bitcoin can be cashed and converted into the currency of most countries. Users can use bitcoin to buy some virtual items, such as clothes, hats and equipment in online games. As long as someone accepts it, they can also use bitcoin to buy real-life items< On February 26, 2014, Joe Manchin, a Democratic senator from West Virginia, issued an open letter to a number of regulatory authorities of the US federal government, hoping that relevant institutions would pay attention to the status quo of bitcoin's encouraging illegal activities and disrupting the financial order, and demanded that actions be taken as soon as possible to completely ban the electronic currency.
5. In short, blackmail virus is a computer virus that uses Windows system vulnerability to maliciously encrypt user files and then extort money

{rrrrrrr}

  • 10

    (3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning

  • < / UL >
    6. It is suggested that the building owner download and install Tencent computer manager to carry out anti-virus,
    restart the computer, press F8 to enter the safe mode - Open Tencent computer manager - anti-virus - full scan - stubborn Trojan blocker - in-depth scan - complete the restart of the computer.
    Tencent computer manager is the first professional anti-virus software in China to adopt "4 + 1" core anti-virus engine,
    with Tencent's self-developed second-generation anti-virus engine "eagle eye",
    it takes less resources, and can eradicate stubborn viruses based on CPU virtual execution technology,
    greatly improve the ability of in-depth investigation and killing.
    7. Anti virus expert: the damage caused by bitcoin virus is irreversible, and even if the ransom is paid, it may not be relieved.
    Mr. Li in Cheng recently encountered a strange thing. His computer seems to be under the control of hackers, and all the files can't be opened. There is also a mysterious English conversation on the computer screen. It turned out that Mr. Li's computer was kidnapped by a bitcoin virus, and the "kidnapper" proposed to use three bitcoins as a "ransom" to buy decryption software. Anti virus experts warned that the damage caused by this blackmail virus is irreversible and should be carefully prevented
    after an English recitation, all the computer files were encrypted
    "on the afternoon of October 4, my children used the computer to do their English homework. After that, the computer didn't turn off. After about an hour, the computer suddenly made a sound in English, just like recitation." "Because the child was doing English homework, he didn't think much about it at that time. As a result, he saw that the computer desktop had been modified," Mr. Li recalled
    six days later, Mr. Li's desktop still looks the same as it did in the afternoon. The background of the desktop turns white and there are several lines of green English in the middle of the screen. Every file on the desktop, including word documents, JPG images and videos, has been changed in format“ These files can't be opened. After clicking open, there will be a prompt that there is no corresponding software. "
    Mr. Li realized that there might be a virus in the computer, so he quickly tried to translate the English on the desktop“ Files and data have been encrypted. The only way to decrypt files safely is to pay three bitcoins to buy a decrypted file. If you use third-party software to decrypt files, you will suffer irreparable losses. " Mr. Li said
    several web addresses are attached to the text. You can buy the decryption software in English by clicking on these web addresses“ I didn't click on these links. I'm worried that there will be more trouble after I click on them. " Mr. Li told reporters that when he first encountered such a strange thing, he couldn't figure out what was going on
    it's impossible to crack a bitcoin with 4100 yuan, but it's painful to pay for it.
    with doubts, Mr. Li asked the relevant experts of UESTC for advice. After looking at Mr. Li's computer, experts concluded that the one implanted in Mr. Li's computer is most likely bitcoin virus“ This virus, also known as bitcoin Trojan horse, encrypts 114 kinds of files in the infected computer, making it unable to open normally, and "blackmail" the owner by pop-up windows. "
    it is understood that bitcoin virus appeared abroad as early as 2014 and began to appear in China in early 2015. The reason why it is called bitcoin virus is that the virus will ask the victim to pay 3 bitcoins as ransom for the purchase of decryption software. Bitcoin, a virtual currency, can only be used in the digital world, making transactions difficult to track
    not only that, the encryption method of this virus is quite complex, "it takes hundreds of thousands of years for brute force cracking, and it also takes more than ten years or even decades for supercomputer cracking."“ I have also consulted several IT experts. They all said that this virus is difficult to decrypt. They also suggested that I negotiate with hackers to buy decryption software at an appropriate price. " Mr. Li said helplessly< In other words, Mr. Li needs to spend 12000 yuan to buy decryption software“ The documents I have stored in my computer for more than 10 years, as well as the photos of my life and work in recent years, have all been illegally destroyed. " When Mr. Li thought of it, he felt distressed< At present, Mr. Li has reported the case to the local police station and is waiting for the police to investigate and deal with it<
    blackmail viruses are good at camouflage, and the damage caused by them is irreversible
    Li Tiejun, an anti-virus expert of Jinshan company, told reporters that recently, such as bitcoin Trojan horse and other kinds of blackmail viruses are more common“ This kind of virus uses the encryption processing inside the system, and it is an irreversible encryption, so it is possible to crack it only when you get the secret key of decryption. In other words, in addition to the virus developers themselves, other people are impossible to decrypt
    according to reports, blackmail viruses are usually spread through e-mail, disguised as working documents inside the computer system, incing computer users to open documents“ If the user does not pay attention to the security warning, the virus program may run Li Tiejun said,
    "in the early version of blackmail virus, the decryption key may exist in the registry of the system, but we have analyzed the current popular virus version, which can't be removed." Li Tiejun said that what is more serious is that the principles and methods of bitcoin virus have been disclosed on the Internet for a long time, "many hackers carry out transformation and develop more virus variants."
    as for Mr. Li's claim of spending money to buy decryption software, Li Tiejun said that the statement of virus developers is not credible“ Virus encryption is an irreversible encryption, and the damage caused by it is also irreversible. " Li Tiejun said, "and do not know who the other party is, even if the ransom, it may not be able to lift."
    therefore, Li Tiejun reminded that important files should be backed up in time. In addition, special care should be taken when dealing with e-mail, "for suspicious programs, do not open them on your own computer."“ There is also the installation of security software on the local computer. Now some security software can intercept the new blackmail virus. Even if the virus features are not found, the virus can intercept the encryption action in the process of encrypting files. " Dong Xingsheng, reporter of West China Metropolis Daily
    8. Unknown_Error
    9. Direct use of anti-virus software can directly kill the virus, but the file is encrypted, the algorithm can not crack, can only recognize the bad luck
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750