Bitcoin Trojan Download
Publish: 2021-03-28 09:48:07
1. According to the network security agency, this is a virus attack launched by lawless elements using the "eternal blue" leaked from NSA hacker's weapon library“ "Eternal blue" will scan windows machines with open 445 file sharing port, without any user operation. As long as the machine is turned on and connected to the Internet, criminals can plant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers. This is to remind the majority of computer users: 1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible at the website of https://technet.microsoft.com/zh-cn/library/security/ms17-010; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses. The download address of immunization tool is: NSA / nsatool.exe. 2. Close ports 445, 135, 137, 138 and 139, and close network sharing. 3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email... 4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after backup. 5. It is suggested that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
2. In the bitcoin virus, 360 antivirus is useless, and even some paid antivirus software can not be used
bitcoin virus (bitcoin Trojan horse) "bitcoin blackmailer" was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, making it unable to open normally, and pop up windows to "blackmail" the victim, requiring the victim to pay 3 bitcoin as "ransom". According to the recent bitcoin price found by the reporter from the Internet, 3 bitcoin is almost 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail. The name of the Trojan horse program is usually in English, which means "order", "proct details", etc., and uses fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program.
bitcoin virus (bitcoin Trojan horse) "bitcoin blackmailer" was popular abroad in 2014, and was found in China in early 15 years. This kind of Trojan will encrypt 114 kinds of files in the infected computer, such as docx, PDF, xlsx, JPG and so on, making it unable to open normally, and pop up windows to "blackmail" the victim, requiring the victim to pay 3 bitcoin as "ransom". According to the recent bitcoin price found by the reporter from the Internet, 3 bitcoin is almost 5000 yuan or 6000 yuan. This kind of Trojan horse is generally spread through English mail. The name of the Trojan horse program is usually in English, which means "order", "proct details", etc., and uses fax or form icon, which is very confusing. The recipient easily mistakenly thinks that it is a working file and clicks to run the Trojan horse program.
3. Remember to install the latest version of the genuine patch to update from time to time
4. It is suggested that the building owner download and install Tencent computer manager to carry out anti-virus,
restart the computer, press F8 to enter the safe mode - Open Tencent computer manager - anti-virus - full scan - stubborn Trojan blocker - in-depth scan - complete the restart of the computer.
Tencent computer manager is the first professional anti-virus software in China to adopt "4 + 1" core anti-virus engine,
with Tencent's self-developed second-generation anti-virus engine "eagle eye",
it takes less resources, and can eradicate stubborn viruses based on CPU virtual execution technology,
greatly improve the ability of in-depth investigation and killing.
restart the computer, press F8 to enter the safe mode - Open Tencent computer manager - anti-virus - full scan - stubborn Trojan blocker - in-depth scan - complete the restart of the computer.
Tencent computer manager is the first professional anti-virus software in China to adopt "4 + 1" core anti-virus engine,
with Tencent's self-developed second-generation anti-virus engine "eagle eye",
it takes less resources, and can eradicate stubborn viruses based on CPU virtual execution technology,
greatly improve the ability of in-depth investigation and killing.
5. As long as you fail to repay after the repayment date, you will be recorded as overe, which will generate penalty interest. The overe record will have an impact on your future loan processing in Yixin, and may be included in the credit reference system. It is suggested that you form the habit of repayment on time and protect your personal credit records.
6. Low price is not necessarily good, but the cost-effective, or you can choose the interstellar cloud.
7. 1, this kind of software generally exists virus
2, install a computer housekeeper to kill virus for your computer
3, after installing, directly use the virus checking and killing function to completely delete the virus
2, install a computer housekeeper to kill virus for your computer
3, after installing, directly use the virus checking and killing function to completely delete the virus
8. If you choose professional strong, good quality, high income, and then cost-effective on the interstellar cloud.
9. Hello, the anti wana series of blackmailer Trojans introced on the Internet are as follows: first, download and patch to fix the system vulnerability in time; Then close 445 and other ports of network access, this is very important, can greatly prevent the invasion of the blackmailer Trojan horse, specific settings can be found online tutorial, a lot of. Finally, anti-virus software. Generally, our computers don't have anti-virus software. Take Tencent computer housekeeper as an example: turn on the housekeeper's active defense system. It can provide vulnerability defense, active interception, document protection, three layers of security protection, and file black detection, and prompt users to patch and repair vulnerabilities in time. I hope my answer can help you.
10. Anti virus expert: the damage caused by bitcoin virus is irreversible, and even if the ransom is paid, it may not be relieved.
Mr. Li in Cheng recently encountered a strange thing. His computer seems to be under the control of hackers, and all the files can't be opened. There is also a mysterious English conversation on the computer screen. It turned out that Mr. Li's computer was kidnapped by a bitcoin virus, and the "kidnapper" proposed to use three bitcoins as a "ransom" to buy decryption software. Anti virus experts warned that the damage caused by this blackmail virus is irreversible and should be carefully prevented
after an English recitation, all the computer files were encrypted
"on the afternoon of October 4, my children used the computer to do their English homework. After that, the computer didn't turn off. After about an hour, the computer suddenly made a sound in English, just like recitation." "Because the child was doing English homework, he didn't think much about it at that time. As a result, he saw that the computer desktop had been modified," Mr. Li recalled
six days later, Mr. Li's desktop still looks the same as it did in the afternoon. The background of the desktop turns white and there are several lines of green English in the middle of the screen. Every file on the desktop, including word documents, JPG images and videos, has been changed in format“ These files can't be opened. After clicking open, there will be a prompt that there is no corresponding software. "
Mr. Li realized that there might be a virus in the computer, so he quickly tried to translate the English on the desktop“ Files and data have been encrypted. The only way to decrypt files safely is to pay three bitcoins to buy a decrypted file. If you use third-party software to decrypt files, you will suffer irreparable losses. " Mr. Li said
several web addresses are attached to the text. You can buy the decryption software in English by clicking on these web addresses“ I didn't click on these links. I'm worried that there will be more trouble after I click on them. " Mr. Li told reporters that when he first encountered such a strange thing, he couldn't figure out what was going on
it's impossible to crack a bitcoin with 4100 yuan, but it's painful to pay for it.
with doubts, Mr. Li asked the relevant experts of UESTC for advice. After looking at Mr. Li's computer, experts concluded that the one implanted in Mr. Li's computer is most likely bitcoin virus“ This virus, also known as bitcoin Trojan horse, encrypts 114 kinds of files in the infected computer, making it unable to open normally, and "blackmail" the owner by pop-up windows. "
it is understood that bitcoin virus appeared abroad as early as 2014 and began to appear in China in early 2015. The reason why it is called bitcoin virus is that the virus will ask the victim to pay 3 bitcoins as ransom for the purchase of decryption software. Bitcoin, a virtual currency, can only be used in the digital world, making transactions difficult to track
not only that, the encryption method of this virus is quite complex, "it takes hundreds of thousands of years for brute force cracking, and it also takes more than ten years or even decades for supercomputer cracking."“ I have also consulted several IT experts. They all said that this virus is difficult to decrypt. They also suggested that I negotiate with hackers to buy decryption software at an appropriate price. " Mr. Li said helplessly< In other words, Mr. Li needs to spend 12000 yuan to buy decryption software“ The documents I have stored in my computer for more than 10 years, as well as the photos of my life and work in recent years, have all been illegally destroyed. " When Mr. Li thought of it, he felt distressed< At present, Mr. Li has reported the case to the local police station and is waiting for the police to investigate and deal with it<
blackmail viruses are good at camouflage, and the damage caused by them is irreversible
Li Tiejun, an anti-virus expert of Jinshan company, told reporters that recently, such as bitcoin Trojan horse and other kinds of blackmail viruses are more common“ This kind of virus uses the encryption processing inside the system, and it is an irreversible encryption, so it is possible to crack it only when you get the secret key of decryption. In other words, in addition to the virus developers themselves, other people are impossible to decrypt
according to reports, blackmail viruses are usually spread through e-mail, disguised as working documents inside the computer system, incing computer users to open documents“ If the user does not pay attention to the security warning, the virus program may run Li Tiejun said,
"in the early version of blackmail virus, the decryption key may exist in the registry of the system, but we have analyzed the current popular virus version, which can't be removed." Li Tiejun said that what is more serious is that the principles and methods of bitcoin virus have been disclosed on the Internet for a long time, "many hackers carry out transformation and develop more virus variants."
as for Mr. Li's claim of spending money to buy decryption software, Li Tiejun said that the statement of virus developers is not credible“ Virus encryption is an irreversible encryption, and the damage caused by it is also irreversible. " Li Tiejun said, "and do not know who the other party is, even if the ransom, it may not be able to lift."
therefore, Li Tiejun reminded that important files should be backed up in time. In addition, special care should be taken when dealing with e-mail, "for suspicious programs, do not open them on your own computer."“ There is also the installation of security software on the local computer. Now some security software can intercept the new blackmail virus. Even if the virus features are not found, the virus can intercept the encryption action in the process of encrypting files. " Dong Xingsheng, reporter of West China Metropolis Daily
Mr. Li in Cheng recently encountered a strange thing. His computer seems to be under the control of hackers, and all the files can't be opened. There is also a mysterious English conversation on the computer screen. It turned out that Mr. Li's computer was kidnapped by a bitcoin virus, and the "kidnapper" proposed to use three bitcoins as a "ransom" to buy decryption software. Anti virus experts warned that the damage caused by this blackmail virus is irreversible and should be carefully prevented
after an English recitation, all the computer files were encrypted
"on the afternoon of October 4, my children used the computer to do their English homework. After that, the computer didn't turn off. After about an hour, the computer suddenly made a sound in English, just like recitation." "Because the child was doing English homework, he didn't think much about it at that time. As a result, he saw that the computer desktop had been modified," Mr. Li recalled
six days later, Mr. Li's desktop still looks the same as it did in the afternoon. The background of the desktop turns white and there are several lines of green English in the middle of the screen. Every file on the desktop, including word documents, JPG images and videos, has been changed in format“ These files can't be opened. After clicking open, there will be a prompt that there is no corresponding software. "
Mr. Li realized that there might be a virus in the computer, so he quickly tried to translate the English on the desktop“ Files and data have been encrypted. The only way to decrypt files safely is to pay three bitcoins to buy a decrypted file. If you use third-party software to decrypt files, you will suffer irreparable losses. " Mr. Li said
several web addresses are attached to the text. You can buy the decryption software in English by clicking on these web addresses“ I didn't click on these links. I'm worried that there will be more trouble after I click on them. " Mr. Li told reporters that when he first encountered such a strange thing, he couldn't figure out what was going on
it's impossible to crack a bitcoin with 4100 yuan, but it's painful to pay for it.
with doubts, Mr. Li asked the relevant experts of UESTC for advice. After looking at Mr. Li's computer, experts concluded that the one implanted in Mr. Li's computer is most likely bitcoin virus“ This virus, also known as bitcoin Trojan horse, encrypts 114 kinds of files in the infected computer, making it unable to open normally, and "blackmail" the owner by pop-up windows. "
it is understood that bitcoin virus appeared abroad as early as 2014 and began to appear in China in early 2015. The reason why it is called bitcoin virus is that the virus will ask the victim to pay 3 bitcoins as ransom for the purchase of decryption software. Bitcoin, a virtual currency, can only be used in the digital world, making transactions difficult to track
not only that, the encryption method of this virus is quite complex, "it takes hundreds of thousands of years for brute force cracking, and it also takes more than ten years or even decades for supercomputer cracking."“ I have also consulted several IT experts. They all said that this virus is difficult to decrypt. They also suggested that I negotiate with hackers to buy decryption software at an appropriate price. " Mr. Li said helplessly< In other words, Mr. Li needs to spend 12000 yuan to buy decryption software“ The documents I have stored in my computer for more than 10 years, as well as the photos of my life and work in recent years, have all been illegally destroyed. " When Mr. Li thought of it, he felt distressed< At present, Mr. Li has reported the case to the local police station and is waiting for the police to investigate and deal with it<
blackmail viruses are good at camouflage, and the damage caused by them is irreversible
Li Tiejun, an anti-virus expert of Jinshan company, told reporters that recently, such as bitcoin Trojan horse and other kinds of blackmail viruses are more common“ This kind of virus uses the encryption processing inside the system, and it is an irreversible encryption, so it is possible to crack it only when you get the secret key of decryption. In other words, in addition to the virus developers themselves, other people are impossible to decrypt
according to reports, blackmail viruses are usually spread through e-mail, disguised as working documents inside the computer system, incing computer users to open documents“ If the user does not pay attention to the security warning, the virus program may run Li Tiejun said,
"in the early version of blackmail virus, the decryption key may exist in the registry of the system, but we have analyzed the current popular virus version, which can't be removed." Li Tiejun said that what is more serious is that the principles and methods of bitcoin virus have been disclosed on the Internet for a long time, "many hackers carry out transformation and develop more virus variants."
as for Mr. Li's claim of spending money to buy decryption software, Li Tiejun said that the statement of virus developers is not credible“ Virus encryption is an irreversible encryption, and the damage caused by it is also irreversible. " Li Tiejun said, "and do not know who the other party is, even if the ransom, it may not be able to lift."
therefore, Li Tiejun reminded that important files should be backed up in time. In addition, special care should be taken when dealing with e-mail, "for suspicious programs, do not open them on your own computer."“ There is also the installation of security software on the local computer. Now some security software can intercept the new blackmail virus. Even if the virus features are not found, the virus can intercept the encryption action in the process of encrypting files. " Dong Xingsheng, reporter of West China Metropolis Daily
Hot content