Position: Home page » Bitcoin » North Korean hackers bitcoin

North Korean hackers bitcoin

Publish: 2021-05-24 15:56:15
1. bitcoin virus (bitcoin Trojan horse) & quot; Bitcoin blackmailer & quot; It was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, so that it can not be opened normally, and pop up the window & quot; Blackmail & quot; Victim, ask victim to pay 3 bitcoin as & quot; Ransom;, According to the recent price comparison of bitcoin found by the reporter from the Internet, 3 bitcoin is about 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail, and the name of the Trojan horse program is usually English, which means & quot; Order & quot& quot; Proct details & quot; And use fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
2. Bitcoin is invented by a hacker. It is generated by a large number of calculations on a computer, rather than issued by an institution. Therefore, bitcoin, as a virtual currency, is universal and its price is not affected by an institution or company. The process of procing bitcoin is the computer's incessant calculation. The process of procing bitcoin has an image called "mining", which is like a physical object. Therefore, its value has been growing, and it is favored by hackers (not only hackers, but also investors). In addition, the transaction of bitcoin is anonymous. If the hacker chooses a bank account, there is a risk of being traced, so the hacker will choose bitcoin for blackmail.
3. You can introce bitcoin on the Internet. The characteristics of bitcoin can explain your problem. Many criminals launder money through bitcoin. You can focus on points 2 and 4
1. Complete decentralization, without issuing institutions, it is impossible to manipulate the number of issues. Its distribution and circulation are realized through open-source P2P algorithm
2. Anonymity, tax exemption and supervision free
3. Robustness. Bitcoin is completely dependent on P2P network and has no distribution center, so it cannot be shut down externally. Bitcoin price may fluctuate and collapse, and many governments may declare it illegal, but bitcoin and its huge P2P network will not disappear
4. Borderless and cross-border. Cross border remittance will go through layers of exchange control agencies, and the transaction records will be recorded by many parties. But if you trade with bitcoin, enter the digital address directly, click the mouse and wait for the P2P network to confirm the transaction, a lot of money will pass. It does not go through any regulatory agencies and will not leave any cross-border transaction records
5. It is difficult for the cat to survive. Because bitcoin algorithm is completely open source, anyone can download the source code, modify some parameters, recompile, and create a new P2P currency. But these counterfeit currencies are fragile and vulnerable to 51% attacks. Any indivial or organization, as long as it controls 51% of the computing power of a P2P currency network, can manipulate transactions and currency value at will, which will be a devastating blow to P2P currency. Many Shanzhai coins die in this link. The bitcoin network is robust enough. If you want to control 51% of the computing power of the bitcoin network, the number of CPUs / GPUs required will be astronomical.
4. He should be hiding somewhere now. After all, he can't be found by the public.
5. Why do you give him the money? If the system doesn't have any important files, reload the system. Do you know how much a bitcoin costs
remember to back up important files next time for a rainy day
and now the virus has been cracked, just follow the process. You give money to help the tyrant
we are 15pb information security ecation, using hacker means to prevent hackers. If you are interested, you can learn about it
6.

at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known

However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers

1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">

in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen

in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion

on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy

on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000

in 2018, such a drama will only continue

in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient

All in all, the problems of exchanges are the problems of centralization

2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">

(1) the progress of the exchange itself

the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here

(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017

(3) decentralized exchange

some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading

bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well

later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced

in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem

At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency

However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralization

7.

There are several reasons as follows:

1. Foxconn was blackmailed by hackers for 1804 bitcoins. Foxconn's response is not a big problem< p> According to media reports, Foxconn was attacked by hackers who asked for 1804 bitcoins. For a while, everyone wanted to know what Foxconn would do, so Foxconn said, "it's not a big problem, it's being dealt with "


3. Bitcoin is a global currency< p> One of the most powerful aspects of bitcoin is that it can be used in any country. You don't have to worry about not being able to spend it or buy anything. In addition, bitcoin will increase in value at any time, will not shrink all of a sudden, it is not worth money

in a word, according to the above analysis, the advantage of bitcoin to hackers is that they only need bitcoin< otherwise, if you take other money, you will have to spend your life


8.

There should be a button to get rid of the jam

you can click Settings - log out on the left side of the map, or log out of the game and log in again

for a complete tutorial, you can see this strategy: how to get rid of the jam after tomorrow

9. Hello, this kind of virus is not easy to handle. It is recommended that the computer install the latest security patch. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible at the website of https://technet.microsoft.com/zh-cn/library/security/ms17-010; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immune tool" to detect whether there are loopholes in the system, and close the ports affected by the loopholes, so as to avoid being infringed by blackmail software and other viruses. Download address: http://dl.360safe.com/nsa/nsatool.exe
then close ports 445, 135, 137, 138 and 139 to turn off network sharing. So it's safe.
10.

"Uncertain" means that the final result of the transaction is uncertain

1. For the bank's real-time transfer, if the transaction status is uncertain and no dection is made, the transaction can be re initiated. The cause of this problem may be the failure of transaction caused by network interruption in the process of data transmission

2. For inter-bank transfer, if the transaction status is "uncertain" and the amount has not been dected, if it is a real-time transaction, the transaction can be re initiated when the balance is queried and the amount has not been dected. If the payee information needs to be manually added, the customer service needs to collect the customer's transfer information, submit it to the background for confirmation, and ask the customer to wait for the query result. Do not submit transfer request repeatedly without feedback

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750