of course there are exceptions.

For example, Neon, the entire Neon Island does not have a red dot.Because Neon has no one now, of course it is impossible to be infected by the virus.

Also, there is not a single red dot in the southern country.It means that no computer in the entire southern country has been infected by the virus.

But the 'shadow middleman' doesn't matter. The southern country is so poor, there are not many people who use computers.

Moreover, those who have computers still use computers developed by their institutions, which are not Windows systems at all, and naturally cannot be infected by viruses developed for vulnerabilities in Windows systems.

In addition to the southern countries and some very poor countries, other developed and developing countries, all countries with a network foundation are marked with dense red dots.

Especially in Europe, Asan, East China, North and South America, there are almost only red dots left on the map.

If there is a large-scale virus infection, once it breaks out, the impact is absolutely world-class.

The 'Shadow Middleman' stared at the virus countdown on the computer.

"3"

"2"

"1"

It is exactly [-]:[-] noon on October [-]th, Mi Jian time.

All the computers in the world infected by the virus made by the 'shadow middleman' will be attacked at the same time as long as they are turned on. , , .

Chapter [-]: Global Infection

It arrived at [-]:[-] noon on October [-]th, Mi Jian time. All the computers that were infected by the virus and were still powered on were all captured by the virus.

At [-] noon, although it is lunch break, the people who work will not turn off the computer at all.

At this time, Mi Jian and Europe were all working during the day.That is to say, computers in these areas are almost always in working condition.

Therefore, all the computers infected by viruses in these areas are not spared by the virus.

And Asia, in fact, is not much better.

Although it is said that it is night in Asia, many people do not turn off their computers at all.

Or, some people who like to stay up late, although it is midnight, they are still fighting in front of the computer.

Thus, one billion infected computers.At this moment, at least more than [-]% of the computers have a virus outbreak.

On all computers that are still working, the virus runs automatically in the background without the computer user's knowledge.

Immediately after the virus runs, a window named 'WannaDecryptor' occupies the screen, making the computer user unable to operate the computer.

At the same time, the virus encrypts all files from the C drive of the system drive at a very fast speed and in a very complicated way.If the computer is not shut down immediately, the virus will encrypt all files on the computer.

Of course, shutting down the computer won't solve the problem either.Because when the computer starts up again, the virus will still run immediately, and then continue to encrypt the remaining files.

With such a large-scale virus infection, the news naturally spread on the Internet at an extremely fast speed.

It's just that with this encryption method, it is impossible to decrypt without knowing the key.

All major anti-virus manufacturers in the world have all acted quickly.

However, if you want to kill the virus easily, you only need to add the signature of the virus 'WannaDecryptor', so that the computer that has not been infected with the 'WannaDecryptor' virus can immediately clear the virus when it finds it.

But for those computers that have been infected with viruses, these antivirus vendors are helpless.

For those computers that have been running the virus, all the software on the computer will be forcibly shut down while the virus is running.Moreover, the user cannot operate the computer at all, so there is no antivirus.

For those computers that have been infected by viruses but have not been turned on, those antivirus software manufacturers have nothing to do.

Because the virus will start as soon as the computer is started, and then intercept the control of the computer, so that the user cannot control the computer, and then start to encrypt all the files in the computer.

In an instant, all walks of life were attacked by the 'WannaDecryptor' virus.The losses caused by the virus to all walks of life are becoming more and more immeasurable as time goes on.

In the window of the virus, it tells the user that if they want to close the virus and unlock the files encrypted by the virus, they have to pay $[-] worth of bitcoins to a specific bitcoin account.

Because of the anonymity of both parties in Bitcoin transactions, the 'shadow middleman' does not worry that someone will be able to find him through the transfer records.

Computers infected by viruses include personal computers, corporate computers, and even institutional computers.

Some computers do not have any important files, while others have very important files.

Therefore, when they saw that their computer was infected by a virus, and all the files were encrypted and could not be opened, some people really chose to follow the prompts in the virus window to transfer $[-] worth of bitcoins to the bitcoin account designated by the designated hacker.

Of course, it is impossible to remove the virus in the computers of those who have made money.A file encrypted by a virus cannot be decrypted at all.

Because of the anonymity of both parties in Bitcoin transactions, the police lost the way to find the virus developer from the transfer records.

In the same way, it is precisely because of the anonymity of the two parties in the Bitcoin transaction that the hacker who developed the virus does not know who sent the Bitcoin to him at all. 536 Literature www.536wx.com

So those who paid the hacker at the hacker's instructions only lost five hundred dollars bye bye.As for a computer infected by a virus, what should be the case or what.

Time passed little by little.The major antivirus software manufacturers have nothing to do with the 'WannaDecryptor' virus.

Since the outbreak of the virus, no one has discovered how the virus spreads.That is, through the 445 port vulnerability of Microsoft's system, directly invading the computer with this vulnerability, and then lurking.After a preset time, it will explode at the same time.

Then, the person who discovered this immediately announced the news.

However, this didn't do much.

Because of the vulnerabilities, the systems have all been infected with the 'WannaDecryptor' virus.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like