Bitcoin ransomware virus various systems Microsoft official vulnerability repair patch download address (full)

Bitcoin ransomware virus various systems Microsoft official vulnerability repair patch download address (full)

On the evening of May 12, the "Bitcoin ransomware" virus broke out around the world. The hackers locked the victim's computer files, and they could only be unlocked after paying a certain ransom to the hackers.

At present, statistics show that more than 28,000 institutions in China have been infected, mainly in intranet environments such as enterprises and universities, resulting in the locking of many laboratory data and graduation projects. At the same time, some gas stations and railway ticketing systems have also become targets of ransomware attacks.

Unfortunately, security experts say that there is currently no way to recover files after being infected except to pay a ransom. If the files are particularly important, you can try to pay the ransom to avoid them being "destroyed" after the ransom expires, but no one can guarantee that they can be recovered.

If an infected computer wants to completely eradicate the ransomware, there is no safer way except to reinstall the system, and it is necessary to install the emergency security repair patch for the Bitcoin ransomware released by Microsoft in time after reinstalling.

【Defense measures recommended】

1. Install anti-virus software and keep the security defense function turned on . For example, Kingsoft Antivirus can intercept (download address http://www.duba.net), and Microsoft's built-in Windows Defender can also be used.

Kingsoft Antivirus detects and kills WNCRY blackmailer worm virus

Kingsoft Internet Security Blackmailer Virus Defense intercepts WNCRY virus to encrypt user files

2. Turn on Windows Update automatic updates and upgrade the system in time.

In March, Microsoft released the MS17-010 upgrade patch for the vulnerabilities leaked by the NSA, including the "EternalBlue" vulnerability exploited by the blackmailer worm virus. At the same time, it also released special repair patches for Windows XP, Windows Server 2003, and Windows 8, which have stopped supporting them.

The latest version of Windows 10 1703 Creators Update no longer has this vulnerability and does not require a patch.

The official download addresses of each system patch are as follows:

KB4012598 】:http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598

For Windows XP 32-bit/64-bit/Embedded, Windows Vista 32-bit/64-bit, Windows Server 2003 SP2 32-bit/64-bit, Windows 8 32-bit/64-bit, Windows Server 2008 32-bit/64-bit/Itanium

KB4012212 】:http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012212

For Windows 7 32-bit/64-bit/Embedded, Windows Server 2008 R2 32-bit/64-bit

KB4012213 】:http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012213

Applicable to Windows 8.1 32-bit/64-bit, Windows Server 2012 R2 32-bit/64-bit

KB4012214 】:http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4012214

For Windows 8 Embedded, Windows Server 2012

KB4012606 】:http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012606

For Windows 10 RTM 32-bit/64-bit/LTSB

KB4013198 】:http://www.catalog.update.microsoft.com/Search.aspx?q=KB4013198

For Windows 10 1511 November Update 32/64 bit

KB4013429 】:http://www.catalog.update.microsoft.com/Search.aspx?q=KB4013429

Applicable to Windows 10 1607 Anniversary Update 32/64 bit, Windows Server 2016 32/64 bit

3. Windows XP and Windows Server 2003 system users can also close port 445 to avoid being infected by the blackmailer worm virus.

Here are the steps:

(1) Enable system firewall protection. Control Panel -> Security Center -> Windows Firewall -> Enable.

Enable system firewall protection

(2) Close the system port 445.

(a) Press the shortcut key WIN+R to start the Run window, enter cmd and execute it. Open the command line operation window and enter the command " netstat -an " to check whether port 445 is open.

(b) As shown in the figure above, if port 445 is open, enter the following commands in sequence to close it:

net stop rdr / net stop srv / net stop netbt

The effect after work is as follows:

4. Be cautious when opening websites and emails from unknown sources, and disable macros when opening Office documents. Internet Trojans and phishing emails have always been important channels for the spread of ransomware at home and abroad.

The ransomware virus is hidden in the phishing email document, inducing the user to enable the macro to run the virus

5. Develop good backup habits and use network disk or mobile hard disk to back up important personal files in time.

In this blackmail worm outbreak, many domestic universities and enterprises were attacked, and a lot of key and important information was encrypted and ransomed by the virus. We hope that users will raise their awareness of the security of backing up important files.

If you are unfortunately infected with the Bitcoin ransomware virus, it doesn’t matter. The editor has also provided you with the download of the Bitcoin ransomware virus immune detection and killing and file recovery tool (Kingsoft Antivirus) to help you solve the problem.

<<:  5.14 Belt and Road Summit VS Bitcoin Ransomware

>>:  Researchers: Bitcoin price volatility will reach legal tender standards in the next two years (Download the full report)

Recommend

Which other countries in the world are cracking down on Bitcoin?

With Russia announcing that mining is legal a few...

"Plump" women are the most blessed

"Plump" women are the most blessed Aest...

Bitpush Visa CEO: Cryptocurrency could become mainstream within five years

Visa CEO: Cryptocurrency could be mainstream in f...

What kind of face indicates good fortune?

Each face has its own different fortune. Of cours...

Exploring the Centralization Risks of Bitcoin’s Lightning Network

The Lightning Network is seen by the vast majorit...

Learn the formula for bone formation

Learn the formula for bone formation If a certain...

How does a man with a bulbous nose look like?

The garlic nose is caused by the large separation...

Teach you how to read the mysteries of physiognomy

Physiognomy has a long history in my country. It ...

Marriage line bifurcation diagram

What exactly is the marriage line? What does the ...

Physiognomy analysis: eyebrows

Nowadays, many people can directly analyze a pers...

Gavin Anderson: Ethereum will not replace Bitcoin, but it is more decentralized

Gavin Andresen, former Bitcoin Core lead develope...

How to tell a man's character flaws from his face

In fact, most of a person's personality will ...