<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>bitcoin Archives - CritchCorp Computers Ltd</title>
	<atom:link href="https://www.cc-computers.com/tag/bitcoin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cc-computers.com</link>
	<description>Complete Computer Support</description>
	<lastBuildDate>Thu, 10 Sep 2020 22:05:27 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.cc-computers.com/wp-content/uploads/2020/07/favicon.ico</url>
	<title>bitcoin Archives - CritchCorp Computers Ltd</title>
	<link>https://www.cc-computers.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Crypto-mining takes over from ransomware as fastest growing threat</title>
		<link>https://www.cc-computers.com/crypto-mining-takes-over-from-ransomware-as-fastest-growing-threat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=crypto-mining-takes-over-from-ransomware-as-fastest-growing-threat</link>
					<comments>https://www.cc-computers.com/crypto-mining-takes-over-from-ransomware-as-fastest-growing-threat/#comments</comments>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Thu, 03 Jan 2019 12:36:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto currency]]></category>
		<category><![CDATA[crypto-mining]]></category>
		<category><![CDATA[ransom ware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://cc-computers.com/?p=1431</guid>

					<description><![CDATA[<p>&#160; With the invention of bitcoin, Ransomware was made possible. Prior to bitcoin it was difficult for the bad guys to get paid as it was easy to follow the money back to them. With bitcoin it is very difficult to impossible to follow the money back. Ransomware is a form of virus or malware [&#8230;]</p>
The post <a href="https://www.cc-computers.com/crypto-mining-takes-over-from-ransomware-as-fastest-growing-threat/">Crypto-mining takes over from ransomware as fastest growing threat</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>With the invention of bitcoin, Ransomware was made possible. Prior to bitcoin it was difficult for the bad guys to get paid as it was easy to follow the money back to them. With bitcoin it is very difficult to impossible to follow the money back. Ransomware is a form of virus or malware that infects a computer and encrypts all of your documents, pictures and even music and videos on your computer and generally will then go out over the network and encrypt any other resources that it can find. They then ask for money to give you the keys to unencrypt your information. This has been the single biggest problem for a number of years and there are many of knock-off versions of the original which were not as well written as the first and have caused even more problems in that, even after paying the ransom, people have not got their data back due to several errors in the process.</p>
<p><span id="more-1431"></span></p>
<p>Whilst Ransomware is still a very big problem and will continue to be for the foreseeable future, there is a new malware around that is taking over from ransomware in terms of the size of the problem. Instead of going through the process of encrypting your data and getting you to do something to pay them, which is also becoming more and more difficult due to people taking regular backups, and anyone using our Cloud accounts or Backup will have ShareSync, which gives you Ransomware protection for all the backed up files. They cannot be sure they will get any money for each installation making it an expensive and less fruitful endeavour. Now they are just stealing your computer processor, memory and electricity to make crypto currency themselves.</p>
<h2>What do they do?</h2>
<p>Well they install a virus on your computer, and then it sets about making crypto currency on your computer for them. This means that they do not have to pay for the computer or electricity, which is very expensive in creating crypto currency, in fact most of the time the amount you pay for the electricity is more than what you make in the currency itself. This makes it very lucrative to use other people&#8217;s computers and electricity to generate crypto currency for them. Some even use websites to this for them. When you visit a website, it downloads as part of the page a crypto-miner that mines crypto currency for the bad guys. This makes it lucrative to hack websites and install malware on it so when someone visits the website they are infected. It is important to look for the malware checking services such as <strong>SiteLock</strong>, which we use ourselves and you can get FREE copy of SiteLock Lite with every Feature Rich Hosting account, <a href="https://shop.cc-computers.com/cart.php?gid=1">here</a>.</p>
<p>Some of these crypto miners will only be active when you are on the site and others will download to your computer and remain there and carry on working after you leave the site. Either way you need to be careful with your computer and make sure that you check, if your computer suddenly starts running slow as you may have picked up one of these viruses. Thousands of sites are infected every day so just because it was ok yesterday, doesn&#8217;t mean it will necessarily be ok today. That is why it is important as a website owner to make sure you have a virus scanner that checks your website files as frequently as possible. If you can afford it you should also upgrade to get more protection in the form of advanced checks to check your site is free from cross site scripting and other vulnerabilities, which SiteLock can help you with.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-946 size-full" src="https://cc-computers.com/wp-content/uploads/2018/08/SiteLock_Customers_rectangle_720x300_v1-white-b.png" alt="" width="720" height="300" srcset="https://www.cc-computers.com/wp-content/uploads/2018/08/SiteLock_Customers_rectangle_720x300_v1-white-b.png 720w, https://www.cc-computers.com/wp-content/uploads/2018/08/SiteLock_Customers_rectangle_720x300_v1-white-b-600x250.png 600w, https://www.cc-computers.com/wp-content/uploads/2018/08/SiteLock_Customers_rectangle_720x300_v1-white-b-300x125.png 300w, https://www.cc-computers.com/wp-content/uploads/2018/08/SiteLock_Customers_rectangle_720x300_v1-white-b-500x208.png 500w" sizes="(max-width: 720px) 100vw, 720px" />If you notice that your website or computer are running slower than you think they should be then make sure you run a virus check and possibly get professional help. Another issue is that once you get one of these viruses in to your system, you are then left open as they can then sell space on your computer to other crypto miners or banking Trojans or worms and you then become the conduit for infecting other people&#8217;s computers on your network and occasionally on other websites,</p>
<p><em>If you think you have a problem on your computer then get in touch with your IT department or whoever looks after your computer. If you have no-one or would like a second opinion submit a support ticket <a href="https://shop.cc-computers.com/submitticket.php?step=2&amp;deptid=3">here</a> and we will call you to see if we can help you. (Charges will apply and will be fully discussed and agreed before any work commences so you will know the costs).</em></p>
<h2>Why are these viruses not picked up by antivirus software?</h2>
<p>Crypto miners themselves are not viruses, they are legitimate pieces of software that you can go and get yourself and install and mine for crypto currencies. All the bad guys do is take a copy of the crypto currency miner that they want and install it on your computer and then add their account details so any mined currency goes to them and then they tell it to run in the background and not to disturb you. Generally speaking this means that they will not ever be seen as bad software by antivirus software.</p>
<p>[ink-ad-creator ad=&#8221;1327&#8243;][/ink-ad-creator]</p>The post <a href="https://www.cc-computers.com/crypto-mining-takes-over-from-ransomware-as-fastest-growing-threat/">Crypto-mining takes over from ransomware as fastest growing threat</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.cc-computers.com/crypto-mining-takes-over-from-ransomware-as-fastest-growing-threat/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Update to the new Ransomware</title>
		<link>https://www.cc-computers.com/update-to-the-new-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=update-to-the-new-ransomware</link>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Wed, 11 Dec 2013 17:46:27 +0000</pubDate>
				<category><![CDATA[Informational]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Urgent Attention]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[data encrypted]]></category>
		<category><![CDATA[data encryption]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[lose data]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[police hit]]></category>
		<category><![CDATA[ransom]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">http://www.cc-computers.biz/Blog/?p=250</guid>

					<description><![CDATA[<p>For the original post see: https://www.cc-computers.com/ransomware-takes-hold/ In the original post I talked about the new ransomware that it taking hold all over the world. It has even hit a police station in America that had to pay the &#8220;fee&#8221; to get back their data. The latest version of this virus now takes advantage of all [&#8230;]</p>
The post <a href="https://www.cc-computers.com/update-to-the-new-ransomware/">Update to the new Ransomware</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p>For the original post see: https://www.cc-computers.com/ransomware-takes-hold/</p>
<p>In the original post I talked about the new ransomware that it taking hold all over the world. It has even hit a police station in America that had to pay the &#8220;fee&#8221; to get back their data.</p>
<p>The latest version of this virus now takes advantage of all the help that has been available on line to &#8220;improve their product&#8221;. Now if you thought that you could get your data back through shadow copies (Also known as previous versions), think again. The virus now encrypts those too.</p>
<p>Here is what it does now, which is the same as before but better.</p>
<p>Currently the infection vector is through email as an attachment; usually a zip file or pdf that is actually an exe file but as most people have the &#8220;Hide extension of known file types&#8221; ticked on you would not normally see it. You will see filename.pdf when the actual filename is filename.pdf.exe. I expect that this will change or be improved on as well with links in email and other file types, etc.</p>
<p>When you open this file it infects your computer and immediately contacts a server from a list of around 1000 possible domain names generated through an algorithm. When it finds a live server it exchanges details with it and starts the encryption process. At this point it doesn&#8217;t let you know that you have been infected and is not picked up by most antivirus software. The first version would finish its work without interruption of antivirus software.</p>
<p>It encrypts all user content that it can find on your PC, mapped network drives and any shares that it can find on the network and file sharing programs data such as box.net and drop box. It also encrypts any shadow copies and backups that it can get to. When it has finished its work it pops up a message to tell you what it has done, it even gives you a list of the files that it has encrypted so that you can verify that they are your files. It then gives you a countdown timer starting around 72 hours. You have this amount of time to pay the fee and get your files back. Now where the old version used to just delete the key if you didn&#8217;t pay up in time the new version will give you a discount for paying within the time frame. Currently it is 1/2 bit coin (which is now about £500). If you fail to pay in time then it goes up to 10 bit coin (About £5000). This &#8220;service&#8221; is available for an extended amount of time.</p>
<p>In short get yourself protected and keep offline backups and redundant copies.</p>
<p>CritchCorp Computers Ltd.</p>
<p>&nbsp;</p>The post <a href="https://www.cc-computers.com/update-to-the-new-ransomware/">Update to the new Ransomware</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New ransomware takes hold</title>
		<link>https://www.cc-computers.com/ransomware-takes-hold/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware-takes-hold</link>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Fri, 25 Oct 2013 16:14:38 +0000</pubDate>
				<category><![CDATA[Informational]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Urgent Attention]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[encrypted data]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[lose data]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[viruses]]></category>
		<guid isPermaLink="false">http://www.cc-computers.biz/Blog/?p=241</guid>

					<description><![CDATA[<p>New ransomware has been taking hold of businesses and households around the world. Be very careful with the email attachments that you open, although this is probably only the first wave; they will find other ways to get to you. What&#8217;s new about this virus then? This virus; actually it is a malware strain named [&#8230;]</p>
The post <a href="https://www.cc-computers.com/ransomware-takes-hold/">New ransomware takes hold</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p>New ransomware has been taking hold of businesses and households around the world. Be very careful with the email attachments that you open, although this is probably only the first wave; they will find other ways to get to you.</p>
<p>What&#8217;s new about this virus then? This virus; actually it is a malware strain named ransomware, named that for a very good reason, is an example of modern encryption done right. They have created a perfect system that can encrypt your data using public key technology that cannot be cracked!!</p>
<p>How does it work? Well, at the moment you get an email about something that is relevant to you (that&#8217;s how they trick you in to opening the attachment, or clicking the link). Once the software is running, it quickly establishes a connection to its command and control server, where it generates a random encryption key specifically for your system. This type of encryption is particularly cleaver as the key that encrypts it cannot be used to decrypt it without the other part that is held on the command and control server (it never gets sent to your computer, so there is no record of it for you to find). it then searches your computer and network, any backup drives you have access to, in fact, any resource that contains user created or user data and encrypts them all! Any evidence of the key locally is then destroyed and a page pops up to inform the user that they have been robbed! It can show you a list of the files you once had so that you can verify the threat is real and then gives you the ultimatum of pay $300 or 300 of your local currency or lose your data, you have 72 hours to make your mind up. After 72 hours have passed the only key that could decrypt your data, which is on the command and control server, is deleted, permanently!</p>
<p>If you do not have any backups of your data and you need it, then you have no choice but to pay up, and thousands of people and businesses have done so. They have also been very cleaver with the payment method as they cannot be tracked through the payment either. When law enforcement find the servers and take them offline, the only people hurt are the people who now cannot get their data back. The ad guys have their command and control servers moving around and are not needed for the payment loop; they just create and hold the keys to your data.</p>
<p>The other point on this is that they seems to have written the encryption part exceptionally well, not so good is the decryption side of the program with reports that not all and in some cases none of the data is returned and there is nothing you can do to get it back.</p>
<p>Be careful and watch this space as it will only get worse!!</p>The post <a href="https://www.cc-computers.com/ransomware-takes-hold/">New ransomware takes hold</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
