Extortion virus Petya hacker e-mail wowsmith123456@posteo.net be sealed, pay ransom get back document

  • Comments Off on Extortion virus Petya hacker e-mail wowsmith123456@posteo.net be sealed, pay ransom get back document
  • 126
  • A+
所属分类:Tech

According to CWCTV.COM's previous report, on June 27, a new type of extortion virus called Petya began to spread around the world, the virus Petya with the previous WannaCry, using the US National Security Agency (NSA) leaked "eternal Blue "loopholes. But with the extortion virus Petya hacker mailbox wowsmith123456@posteo.net was sealed, the victim to pay the ransom also get back the document.

As of the CWCTV.COM before the attack, launched the attack hackers have received a $ 7,000 ransom. But Petya hackers are ransommed as "very unprofessional" because usually hackers behind the hacker will create a special currency purse for the victim, so that you can know exactly who paid the ransom.

But the Petya hacker takes the ransom by giving the victim a ransom for the same bit of money, paying the money and sending it to wowsmith123456@posteo.net to confirm the success of the payment, and then the victim can successfully receive the unlock key. But now the victim to pay the ransom may not be able to get back their lost documents.Extortion virus Petya hacker e-mail wowsmith123456@posteo.net be sealed, pay ransom get back document

According to foreign media reports, the German e-mail provider Posteo directly blocked the Petya hackers to receive ransom when using the e-mail account, wowsmith123456 @ posteo.net.

Posteo said in a statement: "We will not tolerate the use of their own platform hackers, quickly seized e-mail account is a must."

Posteo's approach put a lot of victims into an awkward position, because if Petya is behind a conscience hacker, they are locked documents may still have to save, and now the hacker's e-mail is sealed, means that they can only think of their own way It is not an easy thing to retrieve the locked document by technical means.