手里有台NGINX 27刀的服务:
配置:
Plan base price | $45.00 | |
IPv4 | /29 IP Block (8 Ips, 5 usable) | $0.00 |
Processor | 2x E5520 @ 2.27GHz | $0.00 |
Bandwidth | 1Gbit Port: 200TB Transfer | $0.00 |
Ram | 24 GiB | $0.00 |
Operating System | HP – Windows 2019 English Standard (Evaluation) | $0.00 |
Disk | 240 GB 3 TB |
看到这个画面我就知道这服务器保不住了。只有割肉
只有先找服务商。看是否可以搞定。如果搞不定。到时候估计只有重新安装系统。
回复速度快,
nocix :我们不提供对第三方应用程序的支持,也没有用于解锁程序(例如clearlock)的密码。
Hello
Server is locked
Can you unlock it.
Thank you
答:We do not provide support for third party applications and do not have passwords for unlocking programs such as clearlock.
问:Can you clear this program for me? .
Thank you
答:We provide unmanaged servers (which means we handle any hardware problems with our 24 hours staff), but users are required to manage all software related maintenance.
If you buy a unmanaged server, many of our customers hire a third party system administrator from websites like odesk.com or freelancer.com and have them assist them with administering software aspects of the server for setup, config, backup, moving wordpress, and maintenance.
看来沟通无效。只有重新安装系统。
2021年3月21日 22点
重装系统后发现文件都被一个邮箱地址锁住:
百度搜索了一圈。发现这个病毒还挺有名的。
该勒索病毒家族的定名比较混乱,也常被称作CryptON、Nemesis、Cry36等。我们称其为X3M勒索病毒是因为其加密文件后添加的后缀使用过x3m(该后缀还被Globe勒索病毒家族使用过)。该勒索病毒从2017年开始传播,之前国内传播量极少,但在去年年底开始该勒索病毒在国内的传播量开始上涨。目前在国内的传播主要还是通过弱口令爆破获取用户机器远程桌面密码,手动投毒。目前该勒索病毒暂无技术破解方法,只能支付赎金解密。
附解密截图:
![图片[5]-windows server 2019 服务器被锁 (cock.li 勒索病毒)-栗子博客](https://pic1.zhimg.com/80/v2-a6951f7078dcf7980874f171e7320fac_720w.jpg)