Symptoms of WannaCry poisoning:
Common files such as documents, pictures, compressed packages, and videos in systems infected by WannaCry will be encrypted by viruses, and then extort high Bitcoin ransoms from users.
WannaCry variants generally extort Bitcoins worth 300-600 US dollars, and Onion variants even require users to pay 3 Bitcoins, which is equivalent to about 30,000 RMB based on the current Bitcoin market.
WannaCry viruses generally use asymmetric algorithms such as RSA, and cannot decrypt files without the private key. The WNCRY blackmailer virus requires users to pay within 3 days, otherwise the decryption fee will be doubled, and if no payment is made within a week, the key will be deleted and cannot be recovered.
In a sense, this kind of blackmailer WannaCry is "preventable and unbreakable" and requires security vendors and users to jointly strengthen security defense measures and awareness.
What is a ransomware virus:
The so-called "ransomware" is malware used by hackers to attack users' computers, encrypt the information and resources inside the computer, and extort money from users in exchange for decryption. The ransom it collects is usually paid in "Bitcoin" in order to conceal the identity of the hacker. It is understood that according to the "exchange rate", 1 Bitcoin is approximately equal to 582 US dollars.
According to U.S. government statistics, in the United States, the frequency of “ransomware” attacks surged by 300% in 2016 alone, with 4,000 such ransomware cases occurring almost every day. The extent of its harm cannot be ignored.
"Ransomware" spreads rapidly. Once infected, users will be trapped in a dilemma with nowhere to escape. Whether to pay the ransom is a dilemma, so "prevention" is the only and best way.
WannaCry ransomware prevention methods:
1. Delete any suspicious emails you receive, especially those containing links or attachments.
2. Some Microsoft Office files will require users to activate "macro" to view their contents. You must be wary of such email attachments.
3. Regularly back up files on your computer.
4. Make sure the intrusion prevention security software on your computer is updated.
5. Keep your operating system and other software updated.
6. Once infected, immediately isolate the infected computer from the network and external storage devices. Do not open any files before removing the malware.
7. Paying ransom is not recommended.
8. To download software, use the official software download platform for mobile phones and computers.
it works
it works
it works