Bitcoin virus invades Zhejiang
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
The virus in the "bitcoin virus" incident is known as "ransomware". By encrypting the files in the victim's computer, you can't open them completely to ask for ransom. This is a virus attack launched by lawless elements by using "eternal blue" leaked from NSA hacker's weapon library. It does not need any operation of users. As long as it is turned on and connected to the Internet, lawless elements can implant blackmail software into computers and servers
What's more terrible is that this is just the beginning. Now this blackmail virus has spread to all over the world, including many colleges and universities in China. You can see many students on the Internet showing pictures of their computers being attacked. I have to say that hackers are really well intentioned, even in simplified Chinese
(1) data backup and recovery measures are the important work to recover the loss in the event of blackmail, so it is necessary to make remote backup of important file data in time to prevent losses caused by virus infection
(2) make sure the firewall is on
(3) don't open unknown email or link easily.
with this tool, your computer won't have to worry about the virus problem
Intrusion methods:
-
mainly spread in the form of mail and malicious chain Trojan horse
-
spread mainly through email attachments, phishing email Group Download URL links, users downloading virus files in malicious sites and web pages hanging horse
-
the virus is of bad nature and great harm. Once infected, it will bring incalculable losses to users
1. Some mobile phones support intelligent manager (memory manager), which can scan the device through the device security, detect the device memory, and find out whether the device has threats or malicious software
2. Try to download more secure mobile security software and scan the mobile phone
if the mobile phone detects a virus, it is recommended that you:
1. Back up the important data (contacts, photos, memos, etc.) and restore the factory settings
2. If the above operation is invalid, please bring the purchase invoice, warranty card and the machine to the service center for inspection.
you can download a Tencent computer manager to check, kill and repair the computer virus
this is a free anti-virus software. The cloud master defense and TVA anti-virus engine can more thoroughly detect and kill viruses
and this is an anti-virus software with integrated protection. It occupies small memory and saves a lot of space for the computer
open the main page of Housekeeper - lightning Antivirus - overall search and kill
the virus can be detected and killed by intelligent scanning; Enter the virus killing interface
cloud killing technology has a strong ability to identify and clean up viruses
Tencent mobile phone housekeeper, enter the home page,
in the home page, you can see the "virus killing" option, and then click the "virus scanning" button below to carry out virus killing on the mobile phone.