Position: Home page » Bitcoin » Bitcoin virus mode

Bitcoin virus mode

Publish: 2021-03-26 02:16:06
1.

Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money

so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening

a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...

hope to catch criminals as soon as possible and give them severe punishment by law

this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers

some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code

the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus

2. Wannacry virus is spread based on Windows system, and smartphone users will not be affected. To prevent viruses, please open the system control panel - system and security - install system patches. If you do not open the system patch function, please open and repair all vulnerabilities immediately. It is recommended to upgrade the system for systems below Windows 7. Thank you for your support and trust in Tencent housekeeper.
3. Install a computer manager on your computer and then open the toolbox to find the blackmail virus immunity tool
with this tool, your computer won't have to worry about the virus problem
4. digital currency is legal. You can rest assured that with the rapid rise of bitcoin, digital currency has entered an era of barbaric growth. My own investment in digital currency in the digital asset exchange of the Republic of China does not cut leeks, and it is very timely to deal with problems
5. "CTB Locker" virus is mainly spread through email attachments. Due to the high amount of extortion, this kind of Trojan horse is put accurately, aiming at "rich people", and spread through large enterprise mailbox, senior restaurant official website, etc. Please update the latest version of 360 security guard in time, and find "NSA Arsenal immunity tool" in it, which has good protection effect
6. What is blackmail virus< Different from other similar blackmail viruses, wannacry virus is a kind of worm that can infect other computers automatically and spread rapidly e to chain reaction
2. This kind of blackmail virus mainly infects windows system. It will use encryption technology to lock files, forbid users to access, and blackmail users
3. The attacker claimed that he could only unlock the file after asking for more than $300 worth of bitcoin. In fact, even if the ransom is paid, it may not be able to unlock the file
Why are they infected
once the blackmail worm attacks a user machine that can connect to the public network, it will scan the IP of the intranet and the public network. If the scanned IP has opened port 445, it will use the "enternal blue" vulnerability to install the back door. Once the backdoor is executed, a blackmailer virus named wana crypt0r will be released to encrypt all documents and files on the user's machine for blackmail
why use bitcoin
bitcoin is a kind of point-to-point network payment system and virtual pricing tool, commonly known as digital currency. Bitcoin is popular among cyber criminals because it is decentralized, unregulated and almost untraceable< Background of transmission and infection
this round of blackmailer worm virus mainly includes two family variants onion and wncry, which first broke out in Britain, Russia and other countries, and many enterprises and medical institutions were recruited in the system, resulting in heavy losses
global monitoring of security agencies has found that as many as 74 countries have suffered this blackmailer worm attack
since May 12, the spread of infection in China has also begun to increase sharply, and the outbreak has been intensified in many universities and enterprises
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
7. Blackmail virus is a new type of computer virus, which mainly spreads in the form of mail, Trojan horse and web page. The nature of the virus is bad, great harm, once infected will bring immeasurable losses to users

  • . This virus uses a variety of encryption algorithms to encrypt the file, the infected person is generally unable to decrypt, must get the private key to decrypt it is possible to crack

  • attack target: blackmail viruses generally do not attack anyone, but some of them are targeted at enterprise users (such as xtbl, wallet) and some of them are targeted at all users

  • this type of virus is highly targeted and mainly spread by e-mail

  • once the blackmail virus file is opened by the user, it will use the C & amp; Then upload the local information and download the encrypted public key and private key. Then, the encrypted public key and private key are written into the registry, and the office documents, pictures and other files in all local disks are traversed, and the format of these files is tampered and encrypted; After encryption is completed, blackmail prompt files will be generated at obvious locations such as the desktop to guide users to pay ransom

  • this type of virus can cause important files to be unreadable and key data to be damaged, which has a very serious impact on the normal work of users

  • 8. Hard bifurcation is defined as permanent divergence in the blockchain. After the release of the new consensus rules, some nodes that have not been upgraded cannot verify the blocks proced by the upgraded nodes, and usually hard bifurcation occurs. It doesn't matter whether blockchain hard forking is good or bad. This problem depends on how to treat it. Blockchain itself is just a technology that anyone can use. This technology is not mature at present, and there are not many mature projects. Yuanying China is just trying a new mode of blockchain crowdfunding.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750