What is bitcoin blackmail virus patch
Publish: 2021-05-23 17:35:31
1. Wannacry (also known as wanna decryptor), a kind of "worm like" blackmail virus software, with a size of 3.3mb, is spread by criminals using the dangerous vulnerability "eternal blue" leaked by NSA (National Security Agency)
the malware will scan the TCP 445 port (server message block / SMB) on the computer, spread in a worm like way, attack the host and encrypt the files stored on the host, and then ask for ransom in the form of bitcoin. The amount of extortion ranged from $300 to $600
on May 14, 2017, a variant of wannacry blackmail virus appeared: wannacry 2.0, which cancelled the kill switch and spread faster. As of May 15, 2017, wannacry has caused cyber attacks in at least 150 countries, which has affected the financial, energy, medical and other instries, causing serious crisis management problems. Some windows operating system users in China are infected. Campus network users bear the brunt of the infection. A large number of laboratory data and graation projects are locked and encrypted.
the malware will scan the TCP 445 port (server message block / SMB) on the computer, spread in a worm like way, attack the host and encrypt the files stored on the host, and then ask for ransom in the form of bitcoin. The amount of extortion ranged from $300 to $600
on May 14, 2017, a variant of wannacry blackmail virus appeared: wannacry 2.0, which cancelled the kill switch and spread faster. As of May 15, 2017, wannacry has caused cyber attacks in at least 150 countries, which has affected the financial, energy, medical and other instries, causing serious crisis management problems. Some windows operating system users in China are infected. Campus network users bear the brunt of the infection. A large number of laboratory data and graation projects are locked and encrypted.
2. Open Tencent's computer manager toolbox to fix vulnerabilities, scan and repair them
it is recommended to set the automatic vulnerability repair function. After the function is turned on, the computer manager can automatically repair high-risk vulnerabilities (only including high-risk vulnerabilities, not including other vulnerabilities) at the first time, without user participation, so as to ensure the user's computer security to the greatest extent. It is especially suitable for the elderly, children or primary computer users. The opening method is as follows: enter the computer manager "fix vulnerability" mole - "Settings", and click to open the automatic repair vulnerability.
it is recommended to set the automatic vulnerability repair function. After the function is turned on, the computer manager can automatically repair high-risk vulnerabilities (only including high-risk vulnerabilities, not including other vulnerabilities) at the first time, without user participation, so as to ensure the user's computer security to the greatest extent. It is especially suitable for the elderly, children or primary computer users. The opening method is as follows: enter the computer manager "fix vulnerability" mole - "Settings", and click to open the automatic repair vulnerability.
3. System vulnerability will affect a wide range, including the system itself and its supporting software, network client and server software, network router and security firewall
Tencent computer manager can fix Windows operating system vulnerabilities, and can also intelligently filter out high-risk vulnerability patches and functional patches. Operation method: Tencent computer manager toolbox select "fix vulnerability".
Tencent computer manager can fix Windows operating system vulnerabilities, and can also intelligently filter out high-risk vulnerability patches and functional patches. Operation method: Tencent computer manager toolbox select "fix vulnerability".
4. In short, blackmail virus is a computer virus that uses Windows system vulnerability to maliciously encrypt user files and then extort money < / UL >
{rrrrrrr}
10
(3) in view of the current technical means, if blackmail virus can not be solved, it can only be completely formatted, Then, the system is reinstalled and the system vulnerability patch is made to prevent the secondary poisoning
5. blockchain technology is best known in the financial sector: its origins are integrated with cryptocurrencies that rely on blockchain transparency and unparalleled security to accelerate their success. In essence, through a decentralized distributed digital ledger, the blockchain can record any valuable transaction in the whole computer system, so that no record can be changed quietly without the consensus of the whole computer system
in the financial field, blockchain has been explored and actively used for financial transactions and even contract management. For the supply chain, the benefits are not limited to just keeping accurate records: the blockchain fundamentally reces the time spent on paperwork and authorization. At present, most of the proct or material delivery delays are e to these two points. However, in the blockchain, it does not take time to verify the previous records, only a digital signature is needed to ensure the accuracy and authenticity of digital paper records< At present, consumers have to rely on certificates to verify the authenticity of gemstones. A piece of paper can be easily changed. When many diamond owners value their diamonds with the intention of selling them, they will find that their perfect diamonds are only a little more valuable than glass or smaller diamonds
with the application of blockchain, diamonds can be used as raw stones for unique barcode coding when they are just mined from the vegetable market. While maintaining the integrity of their information, changes made and records handled, they can circulate in the whole supply chain. Throughout the supply chain, authenticity can be verified and there are no unauthorized changes, so the end buyer can track the origin of the diamond (in fact, any other material used to make the final proct) and its entire circulation
similarly, through the blockchain, we can trace the origin, service and ownership history of used cars, so as to rece service fraud (such as the place where the odometer is recalibrated) and the number of stolen vehicles in circulation, and also hope that these instries will be completely terminated
transparency and security
Security and transparency are not usually terms that go hand in hand, but they do on blockchains. As mentioned above, the security of blockchain does not allow any form of unauthorized changes and ensures the authenticity of data. By storing the same "block" information that needs to be collectively approved on its network, the blockchain can not be controlled by any single entity, and there will be no single point of failure, which makes it the most secure platform so far
blockchain can provide transparency, however, its programming mode only allows authorized entities to access information related to their specific interests. For example, buyers may be able to view transaction history, but will be denied access to sensitive or personal information, such as addresses
from a compliance perspective, this helps to ensure that all parties comply with laws, such as the EU's general data protection regulation (gdpr) and South Africa's Personal Information Protection Act (Popi), while still being able to share or access information related to their own parts of the supply chain
there are many application examples of blockchain technology, and supply chain is one of them. However, e to the complexity and number of parties involved in the supply chain, blockchain is considered to be the perfect solution to all the challenges so far, including security, delay and authenticity.
in the financial field, blockchain has been explored and actively used for financial transactions and even contract management. For the supply chain, the benefits are not limited to just keeping accurate records: the blockchain fundamentally reces the time spent on paperwork and authorization. At present, most of the proct or material delivery delays are e to these two points. However, in the blockchain, it does not take time to verify the previous records, only a digital signature is needed to ensure the accuracy and authenticity of digital paper records< At present, consumers have to rely on certificates to verify the authenticity of gemstones. A piece of paper can be easily changed. When many diamond owners value their diamonds with the intention of selling them, they will find that their perfect diamonds are only a little more valuable than glass or smaller diamonds
with the application of blockchain, diamonds can be used as raw stones for unique barcode coding when they are just mined from the vegetable market. While maintaining the integrity of their information, changes made and records handled, they can circulate in the whole supply chain. Throughout the supply chain, authenticity can be verified and there are no unauthorized changes, so the end buyer can track the origin of the diamond (in fact, any other material used to make the final proct) and its entire circulation
similarly, through the blockchain, we can trace the origin, service and ownership history of used cars, so as to rece service fraud (such as the place where the odometer is recalibrated) and the number of stolen vehicles in circulation, and also hope that these instries will be completely terminated
transparency and security
Security and transparency are not usually terms that go hand in hand, but they do on blockchains. As mentioned above, the security of blockchain does not allow any form of unauthorized changes and ensures the authenticity of data. By storing the same "block" information that needs to be collectively approved on its network, the blockchain can not be controlled by any single entity, and there will be no single point of failure, which makes it the most secure platform so far
blockchain can provide transparency, however, its programming mode only allows authorized entities to access information related to their specific interests. For example, buyers may be able to view transaction history, but will be denied access to sensitive or personal information, such as addresses
from a compliance perspective, this helps to ensure that all parties comply with laws, such as the EU's general data protection regulation (gdpr) and South Africa's Personal Information Protection Act (Popi), while still being able to share or access information related to their own parts of the supply chain
there are many application examples of blockchain technology, and supply chain is one of them. However, e to the complexity and number of parties involved in the supply chain, blockchain is considered to be the perfect solution to all the challenges so far, including security, delay and authenticity.
6. Petya blackmail virus is a new type of blackmail virus, which does great harm
you only need to install a computer housekeeper and fix all system vulnerabilities in time.
you can be immune to Petya blackmail virus attacks by not clicking suspicious attachments ring the Internet access
you only need to install a computer housekeeper and fix all system vulnerabilities in time.
you can be immune to Petya blackmail virus attacks by not clicking suspicious attachments ring the Internet access
7. In recent days, massive blackmail worm attacks have rapidly spread to more than 100 countries and regions around the world. The virus locks user data and computer files until the user pays a ransom of $300-600 worth of bitcoin. It is unprecedented for hackers to blackmail global computer users on such a large scale, which can be regarded as a threat to the whole world
specific behaviors and prevention methods
today we will have a deep understanding of what kind of virus this virus is, how it spreads, and why it causes such serious consequences<
the virus originated from the network weapon library leaked by the US National Security Agency (NSA) in the early stage
the "wannacry" virus spreading all over the world belongs to the worm type blackmail software, which actively infects the victims by using the windows vulnerability (known as "eternal blue") numbered ms17-010. Previously, the US National Security Agency (NSA) controlled almost all the banks and financial institutions in the Middle East through the "eternal blue" weapon
because this vulnerability information was leaked and exploited by hackers, it led to this global virus spreading event<
extortion worm virus broke out three times in four days, variant
version 0.1: hackers spread through network weapons, blackmail users, no worm function
version 1.0: worm function, large-scale spread, main spread from May 12 to May 14
version 2.0: blackmail virus, replacing and canceling the "suicide switch". The so-called "suicide switch" is a "switch" set by virus authors in order to prevent the outbreak of worms out of control. If a specific domain name is registered, it will not continue to be infected. On May 14, version 2.0 changed the switch domain name and was soon registered. On May 14, the second variant of blackmail virus 2.0 cancelled the suicide switch and continued to spread
regarding the current spread of the virus, sun Xiaojun, the person in charge of 360 security procts, said: from the perspective of indivial users, the infection rate of blackmail worm has slowed down. Among the 500 million users of 360 security guard, the vast majority of users repaired the vulnerability in March and were not affected. About 200000 users who did not patch their computers were attacked by viruses and almost all of them were intercepted
what lessons should we learn from the rampant blackmail worm incident
network security experts say: this virus exploits a vulnerability of Microsoft, which Microsoft has released a patch in March this year to fix. But some of our users are not in the habit of patching and did not fix the vulnerability in time, which led to the computer being attacked
the blackmail virus attack has once again sounded the alarm of network security. The rapid development of Internet and other information technology has brought great benefits to people, but also unprecedented network security challenges
it is suggested that we should pay attention to network security issues, install security protection software in time, upgrade security patches of operating system and various applications in time, set high security password and change it regularly, do not download and install application software with unknown origin, and take backup measures for particularly important data.
specific behaviors and prevention methods
today we will have a deep understanding of what kind of virus this virus is, how it spreads, and why it causes such serious consequences<
the virus originated from the network weapon library leaked by the US National Security Agency (NSA) in the early stage
the "wannacry" virus spreading all over the world belongs to the worm type blackmail software, which actively infects the victims by using the windows vulnerability (known as "eternal blue") numbered ms17-010. Previously, the US National Security Agency (NSA) controlled almost all the banks and financial institutions in the Middle East through the "eternal blue" weapon
because this vulnerability information was leaked and exploited by hackers, it led to this global virus spreading event<
extortion worm virus broke out three times in four days, variant
version 0.1: hackers spread through network weapons, blackmail users, no worm function
version 1.0: worm function, large-scale spread, main spread from May 12 to May 14
version 2.0: blackmail virus, replacing and canceling the "suicide switch". The so-called "suicide switch" is a "switch" set by virus authors in order to prevent the outbreak of worms out of control. If a specific domain name is registered, it will not continue to be infected. On May 14, version 2.0 changed the switch domain name and was soon registered. On May 14, the second variant of blackmail virus 2.0 cancelled the suicide switch and continued to spread
regarding the current spread of the virus, sun Xiaojun, the person in charge of 360 security procts, said: from the perspective of indivial users, the infection rate of blackmail worm has slowed down. Among the 500 million users of 360 security guard, the vast majority of users repaired the vulnerability in March and were not affected. About 200000 users who did not patch their computers were attacked by viruses and almost all of them were intercepted
what lessons should we learn from the rampant blackmail worm incident
network security experts say: this virus exploits a vulnerability of Microsoft, which Microsoft has released a patch in March this year to fix. But some of our users are not in the habit of patching and did not fix the vulnerability in time, which led to the computer being attacked
the blackmail virus attack has once again sounded the alarm of network security. The rapid development of Internet and other information technology has brought great benefits to people, but also unprecedented network security challenges
it is suggested that we should pay attention to network security issues, install security protection software in time, upgrade security patches of operating system and various applications in time, set high security password and change it regularly, do not download and install application software with unknown origin, and take backup measures for particularly important data.
8. Wannacry blackmail virus prevention methods:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
9. This blackmail virus has a very romantic name, wanna crypt (eternal blue), also known as "want to cry". However, it is such a blackmail virus that affects nearly 100 countries around the world, including the British medical system, the express company FedEx and the Russian Telecom Company megafon
in order to expand the success of the war, the organization behind the blackmail virus will only decrypt the documents after collecting 300 yuan ransom from the victims. If the ransom is not paid in three days, it will rise to 600 US dollars; Seven days later, if you don't pay the ransom, you tear up the ticket; But for those who haven't paid in half a year, they will draw lottery. Blackmail virus uses one machine and one secret. After payment, the corresponding code is sent to the virus author through anonymous network. After verification, the file can be decrypted< Since the blackmail virus broke out on May 12, more than 99 countries, institutions and indivials have been attacked. Under the blessing of 360 security guard, the vast majority of 500 million users have fixed the vulnerability in March and will not be affected; There are about 200000 users whose computers have not been patched and have been attacked by viruses, and almost all of them have been intercepted. It highlights the responsibility of 360 security guards in an emergency
in order to expand the success of the war, the organization behind the blackmail virus will only decrypt the documents after collecting 300 yuan ransom from the victims. If the ransom is not paid in three days, it will rise to 600 US dollars; Seven days later, if you don't pay the ransom, you tear up the ticket; But for those who haven't paid in half a year, they will draw lottery. Blackmail virus uses one machine and one secret. After payment, the corresponding code is sent to the virus author through anonymous network. After verification, the file can be decrypted< Since the blackmail virus broke out on May 12, more than 99 countries, institutions and indivials have been attacked. Under the blessing of 360 security guard, the vast majority of 500 million users have fixed the vulnerability in March and will not be affected; There are about 200000 users whose computers have not been patched and have been attacked by viruses, and almost all of them have been intercepted. It highlights the responsibility of 360 security guards in an emergency
Hot content