In the past few days, a roller coaster was staged in the penny market

Source: Internet
Author: User
Keywords Bitcoin hacker Bitcoin trading
Tags 360 security center bitcoin bitcoin trading computer control digging graphics graphics card

In recent days, the sharp plunge, Bitcoin market "roller coaster", and Bitcoin investment boom latent hacker risk is also increasingly apparent.

High computer to become hackers dug mine "broiler", the large number of Bitcoin coins stolen ... According to the 360 Security Center's third quarter 2013 security report, bitcoin investors are facing the "mining Trojan Horse", Investment account theft and the fall of the trading market three types of threats, but no investment bitcoin, or even completely do not understand Bitcoin, there is a Trojan control computer "digging" the risk. It is understood that the current Bitcoin "mining Trojan" family is rapidly expanding, the recent one-month Trojan has reached nearly million varieties.

Hackers can make hundreds of bitcoin every month.

Bitcoin is a network virtual currency, mainly based on a set of password coding, through the complex algorithm, anyone can download the running Bitcoin client to participate in the production of Bitcoin, this process is also known as "mining." and bitcoin "Mining Trojan", is by hackers control a large number of broiler computer, for its manufacturing bitcoin malicious program.

"Assuming that the Trojan controls 10,000 home computers with high graphics cards, such as AMD HD6990, and 12-hour daily" digging ", hackers can dig up to 100 bitcoin a month. "360 Aspects said, reference to the latest market, the value of about more than 400,000 yuan, Trojan hackers for a very lucrative."

Security sources said that the production of Bitcoin requires computer networking for a long time operation, and graphics card GPU mining efficiency is far higher than the computer CPU, so equipped with a stand-alone graphics computer to become bitcoin "mining Trojan" the focus of attack targets. These Trojans generally have three characteristics: first, the detection of whether the computer has an independent graphics card, the priority to use the GPU "mining"; second, detect whether the computer has been installed Bitcoin client, such as the existence of Bitcoin electronic wallet key files, the direct theft sent to the hacker server; Trojan will set itself up to boot, in the computer after the network started to "Dig mine."

and was implanted bitcoin "mining trojan" computer, system performance will be greatly affected, computer operation will be significantly slower, cooling fan crazy turn; another danger is that "mining Trojan" will be a large amount of power consumption, and cause graphics, CPU and other hardware sharp loss. However, 360 security experts said, bitcoin "mining Trojan" protection and detection is not high, as long as the user in accordance with the security software alarm prompts operation, can prevent the computer recruit.

Invest in Bitcoin or face the risk of theft

It is understood that the Bitcoin has an anonymous property, the transaction process is also irreversible, stolen after the search is who is stolen, where, so also become the focus of hackers to steal objects.

"Hackers, in addition to using Trojans and botnets to control a large number of computer ' mining ', tend to aim directly at Bitcoin investors and even trading markets. "360, the current common means of hacking attacks are direct attacks on Bitcoin trading market." "There have been a number of cases in which the bitcoin market has been hacked, and many investors have managed to lose their bitcoin." Another risk is that the Bitcoin market does not have any security, all by credit to attract investors to open an account, also can not exclude the possibility of closing the volume. ”

Not long ago, Hong Kong Bitcoin trading Market GBL Web site can not enter, home display hacker blackmail message. News once released, most investors think this is a GBL self-directed scam, and quickly organized the rights of QQ Group, trying to GBL conduct detailed investigation, but so far has not recovered losses. News shows, GBL 500 victims lost more than 20 million yuan, so also by netizens called "the first large-scale virtual currency fraud case."

The report shows that, in the world, Bitcoin transactions and other links do not have any relevant laws and regulations and government regulation, Bitcoin trading market has no threshold. Foreign countries have been a number of bitcoin stolen and trading market volume of the incident, the highest loss of tens of millions of dollars. However, after the loss of the bitcoin, the victim usually has no compensation and can only consider himself unlucky.

"Miners" need to watch their electronic wallets.

In the industry, because Bitcoin has a highly anonymous characteristics, many trading markets are not binding mobile phone number, only need to login password and payment password can transfer. Therefore, in the forum, the exchange market more active investors should pay attention to the trading account to set up a separate password, so as to avoid other sites password leakage caused Bitcoin trading market accounts were hackers cracked.

At present, a large number of bitcoin "mining Trojan" is usually disguised as a popular movie, game plug to spread, users should pay attention to download files should be careful to check the virus before running. If the computer abnormal card slow, you should install security software, the overall scan of the "mining Trojan."

And for Bitcoin traders and miners, to pay attention to the market in a timely manner to extract the excess Bitcoin back to their own Bitcoin wallet, trading market account set up a separate complex password, not with any other website account password is the same; In addition, Bitcoin wallet is best to use a U disk or a reliable e-mail to backup, Lest file loss cannot be recovered.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.