欧美视频一区在线_色狠狠狠狠综合影视_另类欧美视频二区_国产精品电影久久久久电影网,国产精品久久久久久久久久久,a级韩国乱理论片在线观看,久久99精品久久久久久三级

Telephone

Enquiry telephone:
400-8386-678
Welcome to Shandong Tairui Automotive Machinery & Electrical Co., Ltd.!

Select language version

Company news
High Vigilance for Global Outbreak of Computer Ransomware
2017-05-15
Event Summary 
On the evening of May 12th, many college students in China reported that their computers were attacked by malicious viruses and their documents were encrypted. The source comes from the dark web, and the attack has compatibility and multilingual support, affecting multiple industries. Domestic ATMs, train stations, self-service terminals, postal services, hospitals, government service terminals, and video surveillance may all be attacked. According to reports, PetroChina gas stations in many parts of the country are unable to make online payments and can only make cash payments. The relevant person in charge of PetroChina expressed suspicion of being attacked by a virus, and the specific situation is still under investigation. As of now, some public security systems have been hacked. Common files such as documents and image materials in the recruitment system are encrypted by viruses, which then charge users a high amount of Bitcoin ransom. The virus uses RSA asymmetric algorithm, and without a private key, files cannot be decrypted.
There are two main phenomena of winning the bid:
1. A Bitcoin dialog box pops up in the user system of China National Recruitment Corporation;
2. The user files are encrypted with the suffix "wncry".
The software launched a virus attack using the Eternal Blue, which was leaked from the US Security Agency's hacker arsenal. The remote exploitation of code is related to the use of hacker toolkits by Equation Group, as announced by the hacker organization Shadow Brokers on April 14th. The ETernaLBLUE module is an SMB vulnerability exploiter that can attack Windows machines with port 445 open, enabling remote command execution. Worm software exploits server vulnerabilities and infiltrates unpatched Windows XP versions of computers through 2008 R2, achieving large-scale and rapid propagation. Once a computer in your organization is attacked, the worm will quickly search for other vulnerable computers and launch an attack.
Disposal measures
Step 1: Immediately fix vulnerabilities and upgrade patches
Please install the MS17-010 vulnerability patch on your computer as soon as possible, website: https://technet.microsoft.com/zh-cn/library/security/MS17-010 For machines such as XP and 2003 that Microsoft no longer provides security updates, install XP and some server versions of Windows Server 2003 special security patches:
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/ If patch upgrade is not possible at the moment, please take the following emergency measures: close ports 445, 137, 138, 139, and disable network sharing; Or use immune tools: http://dl.360safe.com/nsa/nsatool.exe
Step 2: Software self check and kill
It is recommended to directly upgrade the antivirus software virus library for detection and killing. Other auxiliary detection methods include worm terminal self inspection and killing tool download address: http://www.antiy.com/response/wannacry/ATScanner.zip 
Step 3: If successful, attempt to recover the file
If unfortunately hit, you can use the 360 Le worm virus file recovery tool to try file recovery. Tool download address: https://dl.360safe.com/recovery/RansomRecovery.exe
主站蜘蛛池模板: 祁阳县| 共和县| 微博| 集安市| 雅安市| 阿拉善左旗| 平度市| 高州市| 嘉义市| 涿鹿县| 囊谦县| 湟中县| 南和县| 霍林郭勒市| 大田县| 封开县| 肥西县| 济南市| 山东省| 满洲里市| 黄浦区| 白城市| 淮北市| 新昌县| 尚志市| 牙克石市| 措勤县| 华容县| 闽侯县| 鲁甸县| 茶陵县| 乐安县| 盘山县| 深水埗区| 南充市| 临西县| 乌兰县| 杭州市| 宁河县| 六枝特区| 安福县|