2 thoughts on “The ransomware uses system vulnerabilities to ravage the world, should Microsoft should”

  1. According to the analysis of the 360 ​​Security Center, the campus network ransomware was transmitted by the "Eternal Blue" hacker weapon leaked by NSA. "Eternal Blue" can remotely attack port 445 of Windows (file sharing). If the system is not installed in March this year's Microsoft patch, it does not need to be operated by users. , Plant ransomware and other malicious procedures.nDue to the many times in China, the worm virus transmitted by port 445 times, some operators sealed port 445 ports to individual users. However, there is no such limit for the Education Network. There are a large number of machines exposed to port 445, so it has become the hardest hit area for criminals to use NSA hackers. At the time of college graduation season, the extortion virus has caused some of the papers of some fresh graduates to be tampered with, which directly affects graduation defense.nAt present, the ransom virus disseminated by "Eternal Blue" is mainly on the two families of ONION and WNCRY. The disk files of the victim machine will be tampered with the corresponding suffix. All kinds of materials such as pictures, documents, videos, compression packages cannot be opened normally normally Only pay the ransom can we decrypt and recover. The two types of ransomware are 5 Bitcoin and $ 300, respectively, equivalent to more than 50,000 yuan and more than 2,000 yuan, respectively.n360's monitoring data on campus network ransomware incidents show that the first domestic virus appears in China, with an average attack of about 200 times per hour. Global attacks have spread rapidly on the Chinese campus network, attacking about 4,000 times per hour during the night peak.nSafety experts have found that onion ransomware will also spread with mining machines (operations generated virtual currencies) and remote control Trojan groups to form a "big gift package" of Trojan horses that integrate mining, remote control, and extortion. High -performance server mining is profitable, and ordinary computers will encrypt files to extract money to maximize the economic value of the victim machine.nFor the Windows system vulnerability used by NSA hackers, Microsoft has released patches for fixation in March this year. Earlier, the 360 ​​Security Center has also launched the "NSA Weapon Rank Immune Tool" (download connection: DL/NSA/NSATool.exe), which can detect the loopholes of NSA hackers attack; Immune tools can turn off the ports used by vulnerabilities to prevent computers from implanting malicious programs such as NSA hackers.nWhat are the tips for everyone:n1. Back up important documents in advance.n2. Open the 360 ​​security guard anti -ransom service.n3. Strengthen security awareness, do not point unknown links, do not download unknown files, do not open unknown emails.

  2. Apply for Tencent Smart Security to apply for a royal dot terminal security system
    In application, open the Tencent royal point, choose to repair the vulnerability

Leave a Comment

Shopping Cart