Sihai network

What about wechat payment blackmail virus? How to prevent the invasion of blackmail virus

Recently, a 'WeChat pay' extortion virus is spreading rapidly. Virus groups invade and use the C C server of the bean paste. In addition to locking the victim's files to ransom ransom (payment channel has been closed), they also steal Alipay and other passwords. So everyone must be careful when using Alipay.

As of December 3, more than 20000 users have been infected with the virus, and the number of infected computers is growing. The virus (ransom / bcrypt) is a new type of blackmail virus. After intruding into the computer, it encrypts the user's files, but does not charge bitcoin. Instead, it requires the victim to scan the popped up wechat QR code to pay 110 yuan for ransom and obtain the decryption key. This is the first blackmail virus in China that requires wechat to pay for ransom.

@Tencent's computer Butler said that users of the computer Butler were not affected.

According to Li Tiejun, unlike other blackmail viruses, the blackmail virus did not change the file suffix. Once infected, the blackmail virus encrypts the valuable data such as txt and office documents on the user's computer, and releases a shortcut of "your computer files have been encrypted, click this to decrypt", then the decryption tutorial and the two-dimensional code for collection pop up, and finally forces the victim to pay the decryption fee by hand transfer.

At present, tools such as' account operation v3.1 'used by virus propagator will be directly killed by antivirus software, but it is precisely because virus propagator often ignores the interception prompt of antivirus software that the blackmail virus is very effective for the targeted transmission of ash industry practitioners.

Although the blackmail virus showed a small growth trend, the scope of influence was relatively small, and the account involving blackmail collection was included in the abnormal list on the night of December 2.

Interestingly, with the popularity of QR code, mobile payment, etc., these high technologies that bring you convenient life are also becoming the target of siege and utilization of black ash production.

Li Tiejun told reporters that at present, the number of users recruited in the whole network is between 5000 and 7000. 'in the field of Internet, the number of extortion viruses has grown rapidly in recent years. The level of many extortion viruses is not very high, but the impact will be greater. '

In the above cases, the extortion virus is not advanced, but it is the first extortion virus in China that requires wechat to pay, and the ransom is only 110 yuan, which is likely to hit the psychological tactics of netizens' breaking money to avoid disaster '. If users have to pay a ransom in a hurry, the accumulated amount should not be underestimated.

'the blackmailer asked for the 110 yuan. It felt like a novice was playing a prank and challenging the law and order. "At present, although it is not clear the total amount of ransom, the author should not have made much money because the decryption scheme of the security manufacturer is free," Li Tiejun said. '

The reporter learned that after emergency treatment, for the users who have been recruited, the computer Butler team has cracked the encryption mechanism of the blackmail virus, and can download and use the cracking tool to decrypt the documents directly.

Generally speaking, the ransom of this blackmail virus is not high, but it brings a wake-up call to netizens: the more advanced it is, the more dangerous it may be--

With the popularity of IOT and intelligent terminals, the distance between devices and account payment is becoming shorter and shorter. It is difficult for fingerprint locks, mechanical keyboards and other hackers to be alone. If the security foundation of future oriented artificial intelligence is not solid, it is likely to become "attack" intelligence.

If you're used to mechanical keyboards, be careful with a 'black technology' called keytap. This technology has become popular in foreign countries. It can monitor the sound of you tapping the keyboard, complete the task of acoustic wave collection, and restore the content you input. Whether it's a bank password or a private affair, it can be 'monitored'. At present, this code has been open-source.

In addition, according to the latest disclosure of foreign scientific and technological media, apple is considering the use of off screen fingerprint technology, which will be applied to the next generation of iPad by users as soon as possible. In fact, before Apple, fingerprint technology has been applied in various scenarios such as smart door lock, mobile payment, etc.

However, foreign researchers have found a manufacturing method of 'omnipotent fingerprint', with the highest cracking rate of 76.67%.

Technology offers convenience, but just like two sides of a coin, between 'use' and 'don't use', you will have to balance convenience and security in the future. Many listed companies have deployed for the information security needs of the IOT era.