Bitcoin blackmail office data recovery tool download Eternal Blue blackmail virus cracking tool download address
4hw.org: in recent years, computer blackmail virus has caused global panic, and some parts of China have also been infected. Fortunately, many anti-virus software companies timely release patches to fix the loopholes, not giving the virus a chance. Recently, the eternal blue Institute virus was attacked by a plus network company, which only needs to Download bitcoin blackmail office recovery tool to recover. Here's how to download the bitcoin blackmail office data recovery tool and deal with the virus.
Blackmail virus office recovery tool download
How to deal with blackmail virus
On May 14, the national network and information security information notification Center issued an urgent notice: the monitoring found that there was a variety of wannacry blackmail virus: wannacry 2.0, which was different from the previous version in that it cancelled the kill switch and could not close the transmission of the variant blackmail virus by registering a domain name. The transmission speed of the variant might be faster.
Please upgrade and install relevant patches of Windows operating system as soon as possible. Please disconnect the infected machine immediately to avoid further spread of infection.
Beijing Municipal Committee of the Communist Party of China, Beijing Municipal Public Security Bureau and Beijing Municipal Commission of economy and information technology jointly issued the notice on wannacry's suggestions on the emergence of variants of blackmail worms and their disposal. According to the notice, the relevant departments found that there was a variety of wannacry blackmail worm: wannacry 2.0. Different from the previous version, this variety cancelled the so-called kill switch and could not turn off the propagation of the mutant blackmail worm by registering a domain name. The propagation speed of the variant may be faster, and the disposal method of the variant is the same as that of the previous version. It is recommended to pay attention to and dispose of it immediately.
Notice on wannacry's blackmail worm varieties and suggestions on disposal
All relevant units:
According to the monitoring of relevant departments, there is a variety of wannacry blackmail worm: wannacry 2.0. Different from the previous version, this variety cancels the so-called kill switch and can't turn off the propagation of the mutant blackmail worm by registering a domain name. The propagation speed of the variant may be faster, and the disposal method of the variant is the same as that of the previous version. It is recommended to pay attention to and dispose of it immediately.
I. please organize intranet detection immediately to find all terminals and servers with 445 SMB service port open. Once the poisoned machine is found, disconnect the network immediately for disposal. At present, it seems that formatting the hard disk can remove the virus.
2. At present, Microsoft has released patch ms17-010 to fix the system vulnerability of the "eternal blue" attack. Please install this patch for your computer as soon as possible. The website is technet.microsoft.com/zh-cn/library/security/ms17-010. For XP, 2003 and other Microsoft machines that no longer provide security updates, it is recommended to upgrade the operating system version or close the port affected by the vulnerability to avoid being blackmailed Virus attack.
3. Once the poisoned machine is found, disconnect the network immediately.
4. Enable and open 'windows firewall', enter 'Advanced Settings', and disable' file and printer sharing 'related rules in inbound rules. Close ports udp135, 445, 137, 138 and 139, and close network file sharing.
V. strictly prohibit the use of U disk, mobile hard disk and other devices that can perform ferry attacks.
6. Back up the important documents in your computer to the storage device as soon as possible.
7. Update the operating system and application program to the latest version in time.
8. To enhance the security of e-mail and effectively block phishing e-mail can eliminate many hidden dangers. IX. install the genuine operating system, office software, etc.