Position: Home page » Bitcoin » Bitcoin virus invades Zhejiang

Bitcoin virus invades Zhejiang

Publish: 2021-03-23 21:05:28
1.

Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money

so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening

a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...

hope to catch criminals as soon as possible and give them severe punishment by law

this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers

some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code

the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus

2.

The virus in the "bitcoin virus" incident is known as "ransomware". By encrypting the files in the victim's computer, you can't open them completely to ask for ransom. This is a virus attack launched by lawless elements by using "eternal blue" leaked from NSA hacker's weapon library. It does not need any operation of users. As long as it is turned on and connected to the Internet, lawless elements can implant blackmail software into computers and servers

What's more terrible is that this is just the beginning. Now this blackmail virus has spread to all over the world, including many colleges and universities in China. You can see many students on the Internet showing pictures of their computers being attacked. I have to say that hackers are really well intentioned, even in simplified Chinese

3. 1. Reload the system, but the infected files cannot be recovered< Prevent file loss and virus invasion:
(1) data backup and recovery measures are the important work to recover the loss in the event of blackmail, so it is necessary to make remote backup of important file data in time to prevent losses caused by virus infection
(2) make sure the firewall is on
(3) don't open unknown email or link easily.
4. Generally, they won't go to jail. They are talents that the state will reuse
5. I'm kidding. According to the international practice, it's forbidden for life. At that time, there was a "student talent" in Taiwan. Now I don't know what the result is.
6. Install a computer manager on your computer and then open the toolbox to find the blackmail virus immunity tool
with this tool, your computer won't have to worry about the virus problem
7.

Intrusion methods:

  1. mainly spread in the form of mail and malicious chain Trojan horse

  2. spread mainly through email attachments, phishing email Group Download URL links, users downloading virus files in malicious sites and web pages hanging horse

  3. the virus is of bad nature and great harm. Once infected, it will bring incalculable losses to users

8. If you need to identify whether the mobile phone has a virus, it is recommended that you:
1. Some mobile phones support intelligent manager (memory manager), which can scan the device through the device security, detect the device memory, and find out whether the device has threats or malicious software
2. Try to download more secure mobile security software and scan the mobile phone

if the mobile phone detects a virus, it is recommended that you:
1. Back up the important data (contacts, photos, memos, etc.) and restore the factory settings
2. If the above operation is invalid, please bring the purchase invoice, warranty card and the machine to the service center for inspection.
9. Data dissemination, the computer is not regularly antivirus, check whether the computer has been virus, malware intrusion
you can download a Tencent computer manager to check, kill and repair the computer virus
this is a free anti-virus software. The cloud master defense and TVA anti-virus engine can more thoroughly detect and kill viruses
and this is an anti-virus software with integrated protection. It occupies small memory and saves a lot of space for the computer
open the main page of Housekeeper - lightning Antivirus - overall search and kill
10. You can choose to download Tencent mobile phone housekeeper in the app or the official website. It has complete functions of antivirus, protection and backup
the virus can be detected and killed by intelligent scanning; Enter the virus killing interface
cloud killing technology has a strong ability to identify and clean up viruses
Tencent mobile phone housekeeper, enter the home page,
in the home page, you can see the "virus killing" option, and then click the "virus scanning" button below to carry out virus killing on the mobile phone.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750