Position: Home page » Bitcoin » Who did bitcoin blackmail virus do

Who did bitcoin blackmail virus do

Publish: 2021-05-28 10:57:25
1. In the evening of May 12, the wanna cry worm virus broke out in more than 74 countries around the world. At least 45000 machines have been infected. The network system of some colleges and universities in China has become a disaster area, and the network payment system of PetroChina gas station has also been affected
it is reported that the virus can spread rapidly in the local area network by taking advantage of the vulnerability of port 445 of windows system, but large local area networks such as schools have not done similar prevention, so it has become the target of attack
the success probability of brute force cracking is 0

a person in bitcoin instry said that bitcoin blackmail virus had existed as early as 2014. This time, the technology used by hackers is more high-end than last time, and the scope of influence is wider, but the identity of hackers is still unclear

moreover, the "variability" of this virus lies in the addition of automatic transmission for windows 445 port. As long as the windows system machine fails to upgrade the latest patch, making port 445 open, the virus can invade the machine

the virus requires the intruder to pay $300 worth of bitcoin ransom within six hours, and then the ransom will rise every other time
some netizens pointed out that it is difficult to crack the virus by violence. If bitcoin blackmail virus wants to crack by violence, the possibility is infinitely small, and it is impossible to complete it by virtue of personal ability
port 445 enables users to easily access all kinds of shared folders or shared printers in the LAN

port 445 gives an opportunity for malicious attackers. The normal home network has been limited by the operators to 445 port access, but the school and other large LAN did not do similar prevention, so it became the target of attack
in this virus attack, most of the domestic students who are affected are in Colleges and universities, and the seniors who are about to graate are affected, and the documents related to the design papers are locked. Many universities, including Shandong University, Nanchang University, Guangxi Normal University and Northeast University of Finance and economics, have issued emergency notices to remind teachers and students to take precautions
this virus is more accurately an encryption method. The virus will encrypt all the key files in the computer and make people pay for the unlock password, but whether the hacker will keep his promise and provide the unlock password is his problem
bitcoin blackmail virus has appeared many times

one of the characteristics of this type of virus is to ask the victim to pay bitcoin as ransom. According to many people in the instry, bitcoin is usually used as a tool for cross-border payment and remittance because of its global characteristics. In addition, as a kind of network encryption virtual currency, bitcoin has the characteristics of decentralization and anonymity. The flow of funds is not easy to track, so it is convenient for hackers to make use of its collection and payment, and it is more convenient for them to hide their identities
"if you transfer money to a hacker, you essentially give him a small string of encrypted codes that can be quickly transmitted on the Internet and stored in an electronic wallet." Some people in the instry told reporters that the anonymity of bitcoin is often the reason why computer fans, financial speculators and even drug dealers are fascinated by it
according to the current attacked computers, hackers ask for a ransom of $300 (about RMB 2069.16) worth of bitcoin for each computer

but the area of this virus infection is very large. If everyone pays the ransom, will malicious attackers be able to unlock it in time? Because it is not clear whether the virus will be unlocked manually or online. If it is handled manually, it is likely that it will be too late to handle. However, online processing is fully automatic. After bitcoin has paid, it will automatically collect money and then issue the unlock code
therefore, it is not recommended that the victim pay a ransom to the hacker, because even if you pay, the hacker may not know which computer you have

it is worth mentioning that the outbreak of bitcoin blackmail virus has pushed bitcoin to the top of the wave again. "Bitcoin virus" has become a hot search keyword, and many bitcoin insiders have expressed their concerns about bitcoin's "stigmatization"“ Good tools should not be blamed because they are used by bad people. " A person in the bitcoin instry said, "bitcoin is bitcoin, virus is virus, injustice has a head, debt has owner, so it is unnecessary to have hostility to bitcoin."
now, the most important thing is that the victims should install the patch released by Microsoft as soon as possible to prevent unfamiliar e-mail, and important files should be backed up to the cloud platform and local offline hard disk
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
2.

Once the computer is infected with this bitcoin blackmail virus, all the file data on the computer will be forcibly encrypted. If it is not delivered in the form of bitcoin to the virus maker & lt; Ransom;, Then these files can't be decrypted and retrieved. Even if the ransom is paid this time, they may be decrypted next time; Patronize & quot& mdash;& mdash; That is to say, this virus is very important to & lt; Pay attention to data & quot; It's hard to estimate the harm that can be caused by the users, especially the enterprise users

How to avoid the harm of bitcoin blackmail virus< p> As soon as bitcoin blackmail virus came into being, it immediately caused an uproar around the world. Major network security organizations and well-known anti-virus software began to pay attention to this problem

there is a lot about & lt; Manually set the firewall to close the sensitive port of the computer, so as to resist the bitcoin blackmail virus; But this kind of method is more suitable for those who know computer better; Non white people;, For example, for a third rate programmer like me, this method is more suitable for me. I can't even use antivirus software

but for the general public, it may be necessary to deal with it in a simpler way

it has been several years since the advent of bitcoin extortion virus. In order to help users' computers fight against bitcoin extortion virus attacks, many anti-virus software have certain defense mechanisms. For example, 360 launched a & lt; Anti blackmail service;, If your data is encrypted by bitcoin extortion virus when 360 is installed on your computer, 360 will compensate for your ransom and recover your data

users who don't know how to use computers can choose to install anti-virus software to defend you against such viruses, but it depends on their hobbies to choose which one

3.

Hayek studied business cycle theory and monetary theory with his teacher Mises early in his academic career. In 1931, he published "price and proction". Because the proposition in the book is contrary to Keynes's "on money" published a year ago, they launched a debate

The most typical example of

is gold and silver. For a long time, gold and silver were the common currency in the world. The hard currency of trade in all countries did not belong to any one country. Even in the era of gold standard, the state issues legal paper money, but legal paper money is still anchored by the free competition of gold. Gold circulates freely in the world and is more rigid than paper money

There are at least three reasons that lead to the existence of a large number of competitive currencies:

one is the existence of multi-level market, because the metal currency is not easy to cut, super zero denomination currency and silver currency coexist

In the 18th and 19th centuries, there were long-standing high-ranking gold coins in Bangladesh, such as mulu, Sika rupee, middle akut rupee, and low ranking copper coins and BEIBI coins. Because silver coins are not easy to cut, a large number of shell coins with zero denomination are needed in remote areas and small exchange

this situation existed for a long time in ancient China, and the copper coin standard lasted for more than a thousand years in ancient China, but the iron coin also circulated for a long time (such as the Song Dynasty), and the face value of iron coin was smaller than that of copper coin. In the Qing Dynasty, with the discovery of Potosi silver mine in South America, a large number of silver coins flowed into China. Around 1730, the use of silver and money accounted for half of the transactions. Compared with copper coin, silver coin has a larger denomination, which is convenient for large transaction and solves the problem that copper coin is not easy to transport

The second is seasonal deflation, and private coins balance market demand

in the agricultural era, the transaction volume of agricultural procts accounted for a large proportion, and a large amount of money was used for agricultural procts transaction. However, agricultural procts have obvious seasonality, and the transportation and supply of metal money is extremely inconvenient, so the problem of insufficient money often appears in the harvest season. In his book, Professor Kuroda cites the example of Quanzhou, Fujian Province, China in 1606. The original inventory management money could not meet the rice trade, so the private money was imported to meet the market demand to balance supply and demand. This kind of situation happens every year in China. Every year, it is the peak of money demand near the Spring Festival. The central bank will release part of liquidity to balance supply and demand

Thirdly, metal currency is a kind of deflation currency, which circulates a variety of currencies in regional and specific areas

In his book, Professor Kuroda cites Nadina Jebel's case, "the transactions of grains such as rice are used for sonoto silver coins, the transactions of oils and fats are only used for French akote rupees or British akote rupees, and the transactions of flax are only used for French akote rupees."

At the beginning of the 20th century, in China, all kinds of silver coins were circulated in Jiujiang, Jiangxi Province. Mexican silver coins were used for the export of tea and porcelain procts in Shanghai, and silver coins issued locally in Jiangsu Province were used for the trade of local markets such as tobacco or beans. There are also silver bills used in Shanxi business circle, and various copper coins used in the coin community around the China Sea, including Japan, North Korea, Southeast Asia and other countries

the problems of metal currency in multi-level market, seasonal deflation, regionality and specific fields do not exist in today's credit currency era. Many of the competitive currencies listed by Professor Kuroda also disappeared in the globalization of silver coins and the legal tender system

therefore, the monetary pattern of countries in the world we see today is one country one currency, which is legally issued by the state monopoly

Zhiben society is a hard core learning society that listens to hard lessons, reads hard books and reads hard texts. Wechat search "benshe" (ID: benshe0-1) to learn more in-depth content

4. If you want to dig a good mine, you have to dig deep
first dig a very deep place, preferably more than ten layers above the bedrock, and then, like in the picture, dig a corridor first, and then dig the corridor every two squares in a carpet style. Generally, you can dig some good mines. Also, don't use a low-grade chisel to dig high-grade ore, it won't drop things. Gold and diamond mines can only be g with iron. In addition, please ignore the red ore, red stone in PE version is just useless box.
5. Bitcoin extortion virus is basically sent with virus bound, so don't open files with uncertain sources, and back up important files in time. Although the anti-virus effect is not great, we should try our best to upgrade anti-virus and operating system patches in time. These measures are not only to prevent bitcoin virus, but also to prevent more viruses
6.

there are many ways for mages to swipe money. The simplest way is to swipe wild monsters and sell the items that come out. If you do not want to move so much, then squat trading line, buy low and sell high. In addition, it's also a good choice to join some gold groups to make money. These three methods should be the mainstream ways to make money in world of Warcraft

3. Gold group is indispensable if you want to earn more than ten thousand yuan a month however, the price of Jintuan is not very fixed. If you meet some owners, the price may be higher. If it's the price of the equipment, it's hard to say. But this is a way to make money after all. If you don't want to use the above two methods, you can try them

in addition, mages can also be thugs, but this risk is high, so it is not recommended

OK, that's all for this question. Please give me a compliment

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750