The world’s largest extortion virus attacks the 74 country designated bitcoin for ransom
This Friday, a virus attacks extortion by far the largest global. According to Kabasiji, in the past ten hours, a total of at least 45 thousand Windows computer system hit 74 countries around the world. The antivirus software Avast statistical data is more alarming: the virus has infected at least 57 thousand global computer, and is still in the rapid spread of.
The United States, Japan, Russia, Chinese, Britain and other countries have an important attack phenomenon, which is the most serious attack in russia. The British attack mainly concentrated in the British national health service system (NHS), at least 25 hospital computer system paralysis, unable to send an ambulance flag, is likely to delay treatment, causing the sorrow of life.
According to the British Financial Times and the disclosure of New York Times, publisher of the virus is the use of the U.S. National Security Agency stolen last year (NSA) designed by Windows system Eternal Blue hacking tools, to February this year a blackmail virus upgrade. The infected Windows users have 7 days to pay the ransom in bitcoin, otherwise the computer data will be deleted and can not be repaired.
According to foreign media reports, and extortion virus connected bitcoin account has a lot of money. Due to pay extortion also highlights the characteristics of bitcoin regulatory authorities cannot be tracked, bitcoin dollar on Friday fell $121 or 6.6% to around $1710. While bitcoin Thursday was also stand on the $1800 record high.
WannaCry: the value of the dollar to pay extortion virus bitcoin for ransom
Using the Windows system users beware: This blackmail virus will lure you click on the seemingly normal e-mail, attachments or documents, download and install the virus and complete, called “phishing” (phishing). After the installation of the virus will lock the user computer, put all the files into encrypted format, and modify the user desktop background, pop-up boxes to pay the ransom to inform the way.
The following is the virus attacks the screenshots, containing “my computer what” and “how to fix my files” and “how to pay the ransom and other information. The user can attempt to repair a small part of the data, as the virus and “antidote” proven evidence.
The virus requires the user to pay the equivalent of $300 bitcoin in the infected after three days, three days after the ransom will be doubled. Computer data will be deleted without ransom payment within seven days, the inability to pay someone $300 is also provided with a period of six months of “humanization” special repayment channels. That is the timer box on the left, on the right with the payment and the payment effective inspection method.
The British NHS officially announced that the attack of the system for virus called WannaCry (want to cry) or Wanna Decryptor (to unlock). Spain computer security company (Panda Security) said the Panda Security, has been upgraded to blackmail virus can infect all computer LAN, instead of just a single point of attack.
Microsoft has released a security patch update system users suffer
Microsoft Corp said in a statement, this blackmail virus file name is Ransom:Win32.WannaCrypt. In March 14th, Microsoft has provided the system security updates, the purpose is to prevent a virus attack. The user is now running Microsoft’s free anti-virus software, and update the security package is not dangerous.
But Microsoft’s statement also confirmed from the side of the attack was related to the NSA hacking tools, or at least the attack from the leaked NSA tools. Last year, a self proclaimed hacker (Shadow Brokers) the shadow organization announced the NSA for the Windows file and printer sharing system vulnerabilities hackers programming code on the Internet, but NSA has never acknowledged the positive.
CNBC analysis, because not every user — including government agencies, have regularly upgraded Windows system used, the virus is spotted to blackmail this loophole, and to upgrade the computer system for the neglect of the hospital system to bear the brunt of the violent impact.
The attack to many of the world’s major commercial institutions in Britain have been investigating
The network attack occurs on the eve of the British general election in June 8th, but British Prime Minister May said that the existing evidence that this is a global network attacks are not specific to the UK, not specifically for the health care system in britain. The UK’s national cyber security center and the British version of “FBI” National Crime Investigation Bureau (NCA) has already started the investigation.
The United States Federal Express and the Russian interior ministry also said in a statement by the attack, the Spanish telecommunications giant Telefonica and Iberdrola electric power company also allegedly have been affected. But there is no user data loss or disclosure of trade secrets and other substantive damage.
The network security research organization MalwareTech The Intercept said on the media industry, so large-scale network attack is reminiscent of 2008 “attack” global Conficker worms, there were nearly 200 countries at least 9 million of the infected computer.