Eternal Stone Virus Defense SoftwareIt is an immunity tool against the latest viruses. The ransomware virus has not disappeared yet, and the latest virus Eternal Stone has also arrived. Wave after wave has emerged. All you need to do is to prevent your computer from being infected with viruses. For this, the editor of Huajun has specially prepared the Eternal Stone virus defense software for everyone. Come and download the Eternal Stone virus defense software now!
Introduction to viruses
The aftermath of the ransomware virus WannaCry has not yet dissipated, and new and more terrifying viruses have emerged. Over the weekend, researchers discovered a new virus called EternalRocks, which got even worse and actually used seven vulnerabilities from the NSA at once. Security experts say that if the virus suddenly attacks, it will bring "apocalyptic" horrific consequences.
At the beginning of this month, the WannaCry virus paralyzed hospitals, schools and offices in many countries, affecting more than 300,000 computers. However, this virus only used two NSA vulnerabilities. A few days after WannaCry wreaked havoc, a new virus Adylkuzz, which shares a vulnerability with it, also appeared on the network. This virus does not extort Bitcoin, but uses users' computers to mine virtual currencies.
Now, it’s the turn of the “Eternal Stone” again. Miroslav, a cybersecurity expert from the Croatian Computer Emergency Response Team, first discovered the abnormality and introduced the virus on GitHub.
Most of the tools leaked by the NSA are related to standard document sharing technologies. They come from Microsoft Windows Server Message Block, which is also the main culprit for WannaCry's rapid spread. Microsoft blocked the vulnerability in March this year, but because people had not upgraded their computers, they were easily infected.
Unlike WannaCry, Eternal Stone is still in a quiet latent state. After infecting a computer, it downloads Tor (The Onion Router) personal browser and signals to the server where the virus hides.
This is followed by a 24-hour incubation period, during which the virus remains stationary. But after a day has passed, the server will start up, and the virus will start downloading and replicating itself, which means that the research progress of security experts will be slowed down for a day.
"Providing a 24-hour grace period shows that hackers want to remain as mysterious as possible," said Michael Patterson, CEO of security company Plixer. "It is now almost impossible to detect and stop all viruses."
At the moment, although the Stone of Eternity is spreading, it is still dormant. Miroslav warned that the virus could be weaponized at any time, and that its strategy was exactly the same as WannaCry's, infecting a large number of computers before concentrating the outbreak.
Because it has always been mysterious, it is still unclear how many computers the Eternity Stone infected, and what kind of attack weapon it could become is also a mystery. Plixer believes that this virus may become a ransomware or Trojan horse and launch attacks on banks.
How to use:
1. Download
360 Security GuardThe offline disaster relief version will automatically run the "NSA Arsenal Immune Tool" to prevent viruses from invading again:
2. After restarting the computer, perform a full scan to completely remove the ransomware virus (antivirus will not modify the desktop wallpaper left by the virus, you need to set your favorite wallpaper yourself). Then click the "Ransomware Recovery" icon on the main interface of 360 Security Guard, open the "360 Ransomware Worm File Recovery Tool V2", and click the scan button:
3. The recovery tool will scan the entire disk for recoverable files, and then display the file list after the scan is completed:
4. After the scan is completed, you will be prompted to select the directory to restore the files. It is recommended that you restore the files to a USB flash drive or mobile hard disk to increase the success rate:
5. Put the recovered files into the directory of your choice. You can find the files you need through this directory:
Based on in-depth research on virus encryption logic vulnerabilities, the number of files that 360 File Recovery Tool 2.0 can scan and recover is significantly better than other general-purpose data recovery software. After actual use by virus victims, a large number of files have been successfully recovered:
Useful
Useful
Useful