Monroe coin mining hacker
Monroe can solve these privacy problems by automatically applying confidentiality technology to every transaction. You can rest assured that you can't have a "contaminated" Monroe. This is an economic concept, called "interchangeability", historically considered to be an important feature of all currencies
mining Trojan horse is now in the limelight, and its gold sucking power is catching up with blackmail virus. Recently, 360 security guard intercepted a Monroe coin mining Trojan horse spread by "eternal blue". Due to carrying heavy attack ammunition, the Trojan horse spread a large amount, reaching 100000 times a day at the peak, and 360 recently intercepted more than one million attacks
it is understood that this is a large-scale attack of mining Trojan horse carrying "eternal blue" against ordinary Internet users. In order to prevent computers from becoming the coolie of hackers mining, 360 reminds Internet users to ensure that they are well patched and immune to all kinds of attacks using "eternal blue", and at the same time, 360 security guard is opened to comprehensively defend against all kinds of mining Trojan horse
.
Recently: Zhejiang police arrested hackers, making illegal profits of more than 6000 yuan in less than a week. Since May 12, 2017, worm malicious code based on windows network sharing protocol has broken out all over the world, which is a network attack event initiated by lawless elements by modifying the "eternal blue" attack program in NSA hacker's weapon library leaked before. Within five hours, a number of University intranet, large enterprise intranet and government agency Intranet in Britain, Russia, the whole Europe and China were recruited. They were blackmailed to pay a high ransom to decrypt the recovery documents, causing serious losses to important data
bring criminals to justice as soon as possible, and maintain network information security
crazy currency speculation attracts more crazy hackers
(for reference picture: "2017 digital cryptocurrency trading platform attacked timeline" or "2017 digital cryptocurrency blackmail virus event timeline")
it is expected that in 2018, criminal activities around digital cryptocurrency will show a high incidence trend . However, users with a small amount of digital cryptocurrency may no longer be the main target of hackers. In 2018, there may be a large number of apt (advanced persistent thread) attacks against groups and users with a large number of digital cryptocurrency
and for ordinary Internet users, hackers are more likely to implant mining Trojan horse in their computers . Vulnerability exploitation, plug-in program, webpage hanging horse, weak password and so on are the main transmission ways of mining Trojan horse. Among them, vulnerability exploitation is an important means for criminals to obtain digital cryptocurrency because of its fast propagation speed and wide influence
According to the statistics of blockbeats, as of July 9, more than 30000 websites in the whole network have built-in "mining" codes. As long as users open the website for browsing and operation, the website will call the computing resources of computers or mobile phones to "mine"
if you have the habit of browsing "yellow" websites, you should also pay attention to it, because many "yellow" websites will add "mining" code in the future to increase revenue. In addition to the "mining" code added by the website owner, hackers hack other website services in the code and maliciously implant "mining" code Trojan horse. Is it terrible? Have you ever experienced the phenomenon of inexplicably hot cell phones