Bitcoin blackmail content post
bitcoin blackmail refers to an email received in the mailbox. The content of the email generally includes: malicious software on the computer has captured the recipient's indecent photos through the webcam, knows the recipient's real password, etc., which makes the recipient fear and demands to pay the sealing fee in the form of "bitcoin"
if the blackmailer passes the email, he will take the next step, and he does have a lot of important information. In any case, don't transfer bitcoin to blackmailers. It's a bottomless hole. It's a good choice to keep all the evidence and report to the police. The above personal opinions are welcome to be criticized and corrected. Agree with me, please click like before you go, thank you! Like me, please pay attention to me, thank you again
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
Call the police. If you receive a similar e-mail, you can directly pull the sender into the blacklist, and report the e-mail, so that you will not receive such e-mail. In addition, if the e-mail box can, you can set a receiving rule, set sensitive words, and then do not accept such e-mail, which can help to avoid such e-mail. Do not click any link above to avoid being stolen
if the threat of extortion is violence, the perpetrator claims that it will be carried out in the future; The threat of kidnapping violence was implemented at that time and on the spot. The perpetrator of the crime of extortion does not abct the victim to hide and control, while the crime of kidnapping should abct the victim to hide and control
extended information:
the constituent elements of the crime of extortion:
1. Subjective elements
this crime shows direct intention in subjective aspect, and must have the purpose of illegally extorting other people's property. If the actor does not have this purpose, or the purpose of obtaining property is not illegal, for example, the creditor uses threatening language to urge the debtor to speed up the repayment in order to repay the long overe debt, it does not constitute the crime of extortion
The object of this crime is a complex object, which not only infringes the ownership of public and private property, but also endangers the personal rights or other rights and interests of others. This is one of the distinctive characteristics of this crime which is different from larceny and fraud. The object of this crime is public and private property2. This kind of blackmail virus mainly infects windows system. It will use encryption technology to lock files, forbid users to access, and blackmail users
3. The attacker claimed that he could only unlock the file after asking for more than $300 worth of bitcoin. In fact, even if the ransom is paid, it may not be able to unlock the file
Why are they infected
once the blackmail worm attacks a user machine that can connect to the public network, it will scan the IP of the intranet and the public network. If the scanned IP has opened port 445, it will use the "enternal blue" vulnerability to install the back door. Once the backdoor is executed, a blackmailer virus named wana crypt0r will be released to encrypt all documents and files on the user's machine for blackmail
why use bitcoin
bitcoin is a kind of point-to-point network payment system and virtual pricing tool, commonly known as digital currency. Bitcoin is popular among cyber criminals because it is decentralized, unregulated and almost untraceable< Background of transmission and infection
this round of blackmailer worm virus mainly includes two family variants onion and wncry, which first broke out in Britain, Russia and other countries, and many enterprises and medical institutions were recruited in the system, resulting in heavy losses
global monitoring of security agencies has found that as many as 74 countries have suffered this blackmailer worm attack
since May 12, the spread of infection in China has also begun to increase sharply, and the outbreak has been intensified in many universities and enterprises
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
The content of the email is as follows:
my nickname in dark net is karlens62
I intruded into this mailbox more than six months ago. Through it, I infected your operating system with the virus (Trojan horse) I created, and have been monitoring you for a long time. If you don't believe me, please check the "from address" and you will see that I sent you an email from your email
even if you change your password after that -- never mind, my virus intercepts all the cache data on your computer and automatically saves my access rights. I can access all your accounts, social networks, email, browsing history. So I have all your contacts' data, files, photos and videos on your computer, and I'm most interested in the intimate content sites you visit occasionally
I tell you, your imagination is very rich! In your pastime and entertainment activities, I took a screenshot through the camera of your device to synchronize with what you are looking at. Oh, my God! You are so interesting and exciting! I don't think you want all your contacts to have these files, do you
if you have the same opinion, then I think $595 is a fairly fair price to destroy the dirt I created. Put the amount on my BTC wallet (bitcoin): I guarantee that the data will be deleted, I don't need it
otherwise, these files and the history of visiting the website will get all your contacts from your device. In addition, I will send you your contact information, visit your email and visit log, I have carefully saved it
since reading this letter, you have 50 hours! After you read this letter, I will automatically receive your notice of seeing it
I hope I taught you a lesson. Don't be so indifferent, please only visit the confirmed resources, and don't enter your password anywherethe requirements of financial services in the Internet age can be summarized as: providing financial services in any style at any time and anywhere. Obviously, this kind of requirement can only be realized on the Internet, and this kind of service demand also forces the large-scale adjustment of the traditional financial instry, which is mainly manifested in using and relying on the Internet to expand financial business in a larger scope and to a higher degree, and this kind of financial business must be a "big financial" service covering all fields such as banking, securities, insurance, financial management, etc< In fact, the Internet economy has been globalized from the very beginning, and the tide of Internet finance is not far away from us
in 2000, with the rapid development of Internet and e-commerce in Asia, the Internet financial business in many regions began to take substantial steps. For example, the Hong Kong and Macao Management Office of Bank of China, HSBC and Hang Seng Bank all indicated that they would launch online banking services; Standard Chartered Bank will launch online mortgage, foreign exchange trading, personal retail and corporate financing business in the first half of this year; East Asia and Wing Hang Bank said they plan to split up their e-bank and go public; Daxin bank also plans to use the banking license of its private bank, Anxin bank, to set up an independent e-bank. Obviously, online banking service has graally become one of the financial services that banks must provide, otherwise banks will be in a disadvantageous position in the competition
from the situation in the mainland of China, the development of online finance has started rapidly, and the online payment system of Bank of China and China Merchants Bank has been initially established. According to reports, the Everbright Bank Securities data network company, jointly established by China Everbright Securities and other members of Everbright Group, will start the online stock trading business in the mainland from April to May 2000. With the rapid development of the Internet economy in the mainland, Internet finance has become more and more close to China's financial instry
under the traditional conditions, the capital elements of commercial banks are composed of tangible assets and labor force. Based on the homogeneity of financial procts and the easy price identity, the traditional marketing strategies of commercial banks are generally large-scale and undifferentiated marketing strategies of increasing scale efficiency and expanding marketing channels. Due to the strengthening of economic globalization and financial market globalization, the emergence of Internet banking in the information age based on the Internet is inevitable. Taking tangible assets and intellectual capital as capital components, operating paperless, idealized and digitized financial procts has broken through the time and space restrictions under traditional conditions. In fact, unconsciously, we have already been in the network bank, and we have already realized the quickness of "no need to wait, no need to travel far" from e-money and network services.