natasha jewelry wholesale What is the harm of Bitcoin extortion

natasha jewelry wholesale

1 thought on “natasha jewelry wholesale What is the harm of Bitcoin extortion”

  1. bali artisan jewelry wholesale The "Bitcoin Black" virus can be stolen for personal privacy again

    The first appearance in China's "Bitcoin Blame" virus that has appeared in China for the first time. The virus has a crazy variant, and the number of new variants on May 7 has reached 130,000, not only extracting users, but also stealing personal privacy. Tencent Anti -Virus laboratory analysis, from the perspective of attack sources, this is a storm initiated by the botnet controlled by hackers with network emails as a transmission carrier.

    "Bitcoin Black" is exponentially outbreak

    Bitcoin is a new network virtual currency. Handling. At the same time, a "Bitcoin Extinction" virus called "CTB-LOCKER" also rays the world through documents, pictures and other documents in remote encrypted user computers to extort the ransom of users. Otherwise, these encrypted documents will be Destroyed permanently at the specified time.

    The zombie network to help the "Bitcoin Extract" increasingly rampant

    Colidate monitoring according to the Tencent Anti -Virus laboratory, most of the sources of attacks from Bitcoin extorters come from the United States, Following France, Turkey, etc. From the perspective of IP, these sources of attacks come from a hacker -controlled zombie network, and the hacker uses this zombie network to initiate an email storm. Most of the mail content is to receive invoices and the like, inducing users to click to download the attachment.

    "Bitcoin Blame" attack source distribution

    The so -called zombie network refers to the use of one or more communication methods to infect the BOT program (zombie zombies Program) Virus, so as to form a pair of multi -controlled networks between the controller and the infected host. The attacker spreads a large number of hosts on the Internet through various channels, and the infected host will receive a zombie network through a control channel to receive the attacker.

    It is understood that the name of the zombie network is to make people realize the characteristics of this kind of harm: many computers are unknowingly like the zombie group in ancient Chinese legend unknowingly It is also driven and commanded by people, becoming a tool to be used.

    The zombie network to help the "Bitcoin Extract" increasingly rampant

    The latest data monitoring of the Internet Emergency Center of the National Internet shows that in the first half of 2014, 6.25 million The remaining consoles are used by hackers as the control of Trojan or zombie network. 15,000 website links are used to spread malicious code. More than 25,000 websites have been implanted into the backdoor program. There are 1243 high -risk vulnerabilities in the information system.

    The safety experts of Tencent Anti -Virus Labs said that the zombie network constitutes an attack platform that can effectively launch a variety of attack behaviors by using this platform, which can lead to the entire basic information network or important application system Paralysis can also lead to a large number of secrets or personal privacy leaks, and can also be used to engage in other illegal and criminal activities such as cyber fraud. Whether it is to the entire network or the user itself, it has caused more serious harm. The "Bitcoin Black" uses the zombie network to launch email storms to conduct various attacks.

    "Bitcoin Black" crazy variants can steal privacy

    It is understood that the "Bitcoin extorters" virus extortion process has high concealment, high -tech crimes, extortion amounts The "five highs" characteristics of high, attack high -end people, and high harm. Once the user is recruited, the virus will browse all documents (suffixes .txt, .doc, .zip and other files) and pictures (suffix. Jpg, .png and other files), and encrypted these files so that the user could not open it. It is necessary to pay a certain number of "Bitcoin" as a ransom to restore the content of the file.

    The user must pay the ransom to unlock the file

    The monitoring data of the Tencent Anti -Virus Laboratory show that starting in April this year, the "Bitcoin Extract" epidemic situation is the most serious. In order to last and effective attacks and avoid the killing of static feature codes, the virus is constantly evolving. The icons are mostly document icons (such as DOC, PDF, etc.), and their own shells are constantly deformed and mutated. Among them, the new variant on May 7 reached the highest value, as high as 130,000 on the day!

    "Bitcoin Extract" mutation trends

    Tencent anti -virus laboratory safety experts said that the recently discovered "Bitcoin extorters" virus not only extortion users, but also new After adding the characteristics of numbers, it will silently collect the password configuration files in the user's computer, such as: e -mail, chat tools, online banking accounts, Bitcoin wallets, etc., threatening user property security. At present, the Tencent Security Team has conducted in -depth analysis of the virus for the first time, and can perfectly kill such viruses and all variants.

    The redemption documents requires thousands of yuan security experts. Evgeniy Bogachev (Evgeniy Bogachev), with this type of ransoma virus, caused more than one million computer infections in 12 countries, and economic losses exceeded $ 100 million. According to the FBI's official website (FBI), Borgchv ranked second in the Top Ten Matrix's list of FBI, and was the leader of a certain network criminal group. The FBI reward is $ 3 million to wanted Polkv, which is also the highest bounty provided by the United States in cracking down on cyber crimes.

    The experts emphasized that because of the greater harm, the FBI will reward such a high bonus to arrest the virus author. Once the user is recruited, it means that the electronic version of the contract, the old photos of the years, and the newly written plan, the design drawings just made, are all unable to open under the encryption of the virus. The virus maker mainly uses the user's eager recovery of the psychological implementation of the file to extract, and the success rate is extremely high. It is reported that although Bitcoin has recently been sluggish, a single transaction price is also around 1391 yuan (updated data on April 20). Therefore, although it is a few Bitcoin extortion, it is not a small number for users.

    Im experts remind you not to easily download the unknown files, especially the suffix .exe, the executable file of .sCR. Do not judge the security of the file by the icon. In addition, we usually develop backup habits and back up some important documents to mobile hard disks and network disks. Once they are infected by Trojans, they can also be remedied in time.

Leave a Comment