Chinese hackers and Bitcoin ransomware

Chinese hackers and Bitcoin ransomware

Comment: Although the attacks on US companies have temporarily stopped, there is still no reason to believe that the Bitcoin malware threat is over. Internet criminals use malware to attack individuals and companies in an attempt to control user computer access for ransom. It is said that the recent wave of ransomware attacks on US companies was carried out by Chinese hackers. Although US and Chinese corporate espionage and hacking are nothing new, the scale of this attack is unprecedented. Of course, this does not mean that Bitcoin ransomware will suddenly disappear, because Internet criminals still prefer this model of making money quickly.

Chinese hackers team up to deploy ransomware

Ransomware is rampant in the global market and can no longer be ignored. At the same time, government-sponsored hacker groups are not shy about it. Recent security reports from four companies all stated that Chinese hackers use Bitcoin ransomware to specifically attack American companies.

Most people have seen the dangers of ransomware because they have had their computers shut down. Restoring files from backups may not work because many Bitcoin ransomware strains delete shadow copies. And it’s not just your average basement nerd that’s attacking American businesses.

Instead, there have been multiple reports of attacks at a higher level, often with state sponsorship, that use remote control software and spread various malware across the Internet.

Although the inherent security vulnerabilities of application servers make them a prime target for hackers, it is not so easy to trick network computers into installing Bitcoin ransomware. An unnamed company said that one-third of its computers were attacked by ransomware.

Assuming the report is true, why did Chinese hackers choose Bitcoin ransomware for their attacks? One theory is that Chinese government-sponsored hackers see ransomware as a way to increase their income, as support for economic espionage has declined, reducing the need for industry personnel.

Another worrying possibility is that internet criminals may have gained access to attack toolkits from state-sponsored hackers, which could include new bitcoin ransomware and tools used to gain access to the internet and corporate infrastructure.

The Bitcoin ransomware threat is far from over

Although the current attack on US companies has paused, it does not mean the threat of Bitcoin malware has ended. Hackers gain access to computers and hold users ransomed.

As encryption technology continues to improve, it will be difficult for end users to regain access to files without paying the ransom. The amount demanded by hackers is not high, so paying the ransom is a better option. Following phishing software and online payment traps, ransomware will become the mainstream of cybercrime.


<<:  US Congressional Hearing Discusses Bitcoin Legislation

>>:  The irony of Bitcoin’s fading magic

Recommend

What is the second marriage line? The fortune of the second marriage line

In fact, Chinese people are still very traditiona...

What kind of facial features can a woman have to gather wealth?

Some women have particularly good looks. Not only...

What does a lucky person look like?

What does a lucky person look like? First, the fo...

The shape of your belly button determines your wealth

The shape of your belly button determines your we...

Crazy Ethereum! Miners collect $500,000 in mining fees in one hour

Ethereum miners are quietly making a fortune. Thi...

Lightning Network could solve Bitcoin's block size problem

Bitcoin’s block size is one of the hottest topics...

The peach blossom pattern on your palm interprets your love life

The peach blossom pattern on your palm interprets...

What kind of woman is destined to be rich?

Everyone hopes to become a rich person and live a...

What kind of face has good luck with noble people?

A noble person is someone who will help you when ...

Do men with short eyebrows have a short life span and are unhealthy?

The length of a person's life is related to m...

Characteristics of people who have difficulty getting promoted at work

Characteristics of people who have difficulty get...

How can a woman with phoenix eye lines have a smooth marriage?

Among the many lines on the hands, the phoenix ey...