According to reports, the attackers have already acquired 8.93 Bitcoins amounting to approximately $350,000 in ransom from over 800 victims, based on twenty-two Bitcoin addresses used by the group. The targets of Qlocker are regular consumers and small-to-medium business owners using QNAP for network storage. The first attack was reported on April 19, 2021, and since then, the number of exploits have been rising. According to the ransom claims, hackers reportedly demanded a payment of 0.01 Bitcoin, amounting to around $550 per user to divulge the password to unlock the files.Īs the Qlocker ransomware seems to be targeting older vulnerable versions of QNAP devices, all users have been requested to update their software immediately. 7z storage, a ReadMe file with a ransom note, and an access key to the ransomware payment site. Once the files are locked, victims are left with a. It locks the user’s files in a 7-zip encrypted format, sealed by a password. The Qlocker ransomware exclusively targets QNAP devices, which are network-attached storage (NAS) systems. Qlocker is ransomware that invades users’ storage devices and acts as a file locker, by locking users out until a password is provided. Ransom notes were also dropped by the ransomware gang onto compromised devices, in their latest campaign. The attackers exploited a hard-coded credentials vulnerability in the HBS 3 Hybrid Backup Sync application to gain access into users' devices to encrypt their files. : On January 6, QNAP Network Attached Storage (NAS) devices worldwide began to be targeted once again by the threat actors behind the QLocker ransomware. This new strain began surfacing across QNAP devices in April 2021 and exploited CVE-2021-28799.Īttackers used a 7-zip utility to lock away files from the user, and demanded a ransom for providing the decryptor. Researchers at Cyber Security Works (CSW) have been tracking Qlocker, a recently discovered ransomware family. The Qlocker ransomware exploited an unpatched vulnerability to launch its attacks. We urge organizations to patch the vulnerability immediately to avoid more devices being targeted by QLocker and other ransomware gangs.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |