[RANSOMWARE] >>READ 1st Post<< Deadbolt
-
- New here
- Posts: 3
- Joined: Wed May 24, 2017 3:01 am
Re: [RANSOMWARE] Deadbolt
At long last, the Emsisoft decryptor is chugging through some 150 thousand files that got deadbolted mid-June. I had been skeptical but am finally recovering the files successfully. I'd never dealt in cryptocurrency, so learning about bitcoin, verifying an account, waiting for my balance to come available for transfer, fretting whether I got the thieves' address correct (were those 1s or ls in the address??), gritting my teeth to pay the ransom, then waiting for the return transaction with the decryption key, made for a long, painful process. Thank you to all the helpful contributors on this forum for guiding us through this ordeal and advising how to avoid such nightmares next time.
I want to alert folks to a problem I caused via Qsync through ignorance and confusion about its Space-Saving Mode options. I had been using the QNAP to backup files saved on local hard drive and to access them remotely. [Now I know better to make extra backups and turn off port-forwarding.] Soon after I detected deadbolt on the NAS, I hastily, stupidly changed some folder pair setting in Qsync, thinking I could restore the backup from the local files. I can't remember for sure which mode I enabled (locally available or always available), but when it got through syncing, it had done exactly the reverse of what I'd hoped, and now those local files were overwritten with encrypted deadbolt versions! Be careful with paired folders and Space-Saving modes.
I want to alert folks to a problem I caused via Qsync through ignorance and confusion about its Space-Saving Mode options. I had been using the QNAP to backup files saved on local hard drive and to access them remotely. [Now I know better to make extra backups and turn off port-forwarding.] Soon after I detected deadbolt on the NAS, I hastily, stupidly changed some folder pair setting in Qsync, thinking I could restore the backup from the local files. I can't remember for sure which mode I enabled (locally available or always available), but when it got through syncing, it had done exactly the reverse of what I'd hoped, and now those local files were overwritten with encrypted deadbolt versions! Be careful with paired folders and Space-Saving modes.
-
- New here
- Posts: 9
- Joined: Thu Nov 24, 2016 9:20 pm
Re: [RANSOMWARE] Deadbolt
Did this failing company ever sent an apology to its users?
- dolbyman
- Guru
- Posts: 37324
- Joined: Sat Feb 12, 2011 2:11 am
- Location: Vancouver BC , Canada
Re: [RANSOMWARE] Deadbolt
Just more security bulletins and hopefully less prominent "private cloud" buzzwords.. nothing otherwise.
What exactly do you expect them to do .. or are you just here to 'stir the pot'?
What did other manufacturers do about deadbolt?
https://www.asustor.com/knowledge/detail/?group_id=630
What exactly do you expect them to do .. or are you just here to 'stir the pot'?
What did other manufacturers do about deadbolt?
https://www.asustor.com/knowledge/detail/?group_id=630
-
- New here
- Posts: 2
- Joined: Wed Jul 13, 2022 2:10 pm
Re: [RANSOMWARE] Deadbolt
Hello,
we have a similar problem deadbolt caught us.
I have the key for which we made the payment - unfortunately it was a bit higher 0.05080000 BTC.
Can someone help, has the deactivation key been provided to us?
Deadbolt - bc1q0ms068nwy8977s3ynehcay0dpkrsj6e4dug3r4
Thank you in advance for your help.
Adam
we have a similar problem deadbolt caught us.
I have the key for which we made the payment - unfortunately it was a bit higher 0.05080000 BTC.
Can someone help, has the deactivation key been provided to us?
Deadbolt - bc1q0ms068nwy8977s3ynehcay0dpkrsj6e4dug3r4
Thank you in advance for your help.
Adam
You do not have the required permissions to view the files attached to this post.
- OneCD
- Guru
- Posts: 12790
- Joined: Sun Aug 21, 2016 10:48 am
- Location: "... there, behind that sofa!"
Re: [RANSOMWARE] Deadbolt
I think this is Deadbolt v2. The previous version requests 0.03 BTC, and the screens look different.problem2022 wrote: ↑Wed Jul 13, 2022 2:15 pm I have the key for which we made the payment - unfortunately it was a bit higher 0.05080000 BTC.
How long has it been since you paid? It can take a few hours for the decryption key to be published.
-
- New here
- Posts: 2
- Joined: Wed Jul 13, 2022 2:10 pm
Re: [RANSOMWARE] Deadbolt
We paid yesterday morning - this sh*t happens yesterday morning about 5 a.m. - we paid 9 a.m., before was 0.03 BTC, right now increase as you can see - up to 0.05 BTC
-
- Experience counts
- Posts: 2307
- Joined: Tue May 29, 2018 3:02 am
- Location: Everywhere I go, there I am.
Re: [RANSOMWARE] Deadbolt
I presume the ransom has gone up as the value of Bitcoin has gone down.problem2022 wrote: ↑Wed Jul 13, 2022 2:44 pm We paid yesterday morning - this sh*t happens yesterday morning about 5 a.m. - we paid 9 a.m., before was 0.03 BTC, right now increase as you can see - up to 0.05 BTC
It has received a total of 0.05080000 BTC ($1,001.31)
QNAP TS-563-16G 5x10TB Seagate Ironwolf HDD Raid-5 NIC: 2x1GB 1x10GbE
QNAP TS-231P-US 2x18TB Seagate Exos X18 HDD Raid-1
[Deadbolt and General Ransomware Detection, Prevention, Recovery & MORE]
How to reset my NAS password, network and security settings
QNAP TS-231P-US 2x18TB Seagate Exos X18 HDD Raid-1
[Deadbolt and General Ransomware Detection, Prevention, Recovery & MORE]
How to reset my NAS password, network and security settings
- OneCD
- Guru
- Posts: 12790
- Joined: Sun Aug 21, 2016 10:48 am
- Location: "... there, behind that sofa!"
Re: [RANSOMWARE] Deadbolt
I've just rechecked and there's now the expected transaction for +0.00005460 BTC shown.problem2022 wrote: ↑Wed Jul 13, 2022 2:15 pm I have the key for which we made the payment - unfortunately it was a bit higher 0.05080000 BTC.
Can someone help, has the deactivation key been provided to us?
Deadbolt - bc1q0ms068nwy8977s3ynehcay0dpkrsj6e4dug3r4
Your decryption key is: 67a045b357f5d700fec426d6402964cb
-
- First post
- Posts: 1
- Joined: Sat Jul 16, 2022 2:46 am
Re: [RANSOMWARE] Deadbolt
Hello, everyone.
Maybe someone cares where all the money ends up or can we do something?
A friend of mine got it, too. and I ve just looked from boredom where the money now goes.
It wanders long:D
37Tqm71HdSpGCqXUBzbAzhLuDGhpnUntL5 ( one of the Account )
38JyV1kPHPcGo3W2YXiZ5fT8WPhaQFmtiE ( A Big Main Account )
32yWE85WtzSeuEtCZgHKTBC1zsuhnF2Jar ( A second )
bc1q2frckgjcnk3hnsm7j4gycqpup8ad6ljkcn9nxe ( Maybe a small private )
1CtUASFxYRaWKg3RH6aAn6YHtqfRALhzTH
3Lgdy2QWpWgmPETwgb8VKxMfaCpjwPfyz8
3HGGfNtkwKHFDjzhKRH4Mty2UUTvXt64hm
bc1q5ch73jv88czngker5s73wwmkljwpfupfw9cj96 ( here they copie everytime to another accounts)
But i think the money didn't come back
So much money
Or it is simply the accounts of the services with which they rotate the money.
Maybe someone cares where all the money ends up or can we do something?
A friend of mine got it, too. and I ve just looked from boredom where the money now goes.
It wanders long:D
37Tqm71HdSpGCqXUBzbAzhLuDGhpnUntL5 ( one of the Account )
38JyV1kPHPcGo3W2YXiZ5fT8WPhaQFmtiE ( A Big Main Account )
32yWE85WtzSeuEtCZgHKTBC1zsuhnF2Jar ( A second )
bc1q2frckgjcnk3hnsm7j4gycqpup8ad6ljkcn9nxe ( Maybe a small private )
1CtUASFxYRaWKg3RH6aAn6YHtqfRALhzTH
3Lgdy2QWpWgmPETwgb8VKxMfaCpjwPfyz8
3HGGfNtkwKHFDjzhKRH4Mty2UUTvXt64hm
bc1q5ch73jv88czngker5s73wwmkljwpfupfw9cj96 ( here they copie everytime to another accounts)
But i think the money didn't come back

So much money

Or it is simply the accounts of the services with which they rotate the money.
- dolbyman
- Guru
- Posts: 37324
- Joined: Sat Feb 12, 2011 2:11 am
- Location: Vancouver BC , Canada
Re: [RANSOMWARE] Deadbolt
Probably laundered trough exchanges and larger wallets
-
- New here
- Posts: 8
- Joined: Sun Jul 17, 2022 3:40 pm
Re: [RANSOMWARE] Deadbolt
* Need to track down the elusive HTML page with the crypto details *
Another one here, who's only just discovered the bad news.
And just spent the last few hours reading all 69 pages on here, and making plenty of notes.
Thanks to lots of you for some really good info!
I'll have to pay the ransom sadly. 5TB of data, only backed up to an attached USB drive - with the files also encrypted.
Problem is, I've also lost the HTML page with the details for the crypto transfer.
Have submitted a ticket to QNAP, but doubt I'll hear until Monday.
Their link for how to get it back had been posted numerous times, but is now dead.
One person even very kindly posted a cached version - but that no longer works.
Does anyone happen to have the proper instructions from QNAP for recovering the index html page?
Many thanks all.
Another one here, who's only just discovered the bad news.
And just spent the last few hours reading all 69 pages on here, and making plenty of notes.
Thanks to lots of you for some really good info!
I'll have to pay the ransom sadly. 5TB of data, only backed up to an attached USB drive - with the files also encrypted.
Problem is, I've also lost the HTML page with the details for the crypto transfer.
Have submitted a ticket to QNAP, but doubt I'll hear until Monday.
Their link for how to get it back had been posted numerous times, but is now dead.
One person even very kindly posted a cached version - but that no longer works.
Does anyone happen to have the proper instructions from QNAP for recovering the index html page?
Many thanks all.
- OneCD
- Guru
- Posts: 12790
- Joined: Sun Aug 21, 2016 10:48 am
- Location: "... there, behind that sofa!"
Re: [RANSOMWARE] Deadbolt
Hi and welcome to the forum.
Here's the current Google-cached copy (I'll paste it into this post so we don't lose it again, along with a few corrections):

Looks like QNAP have lost the FAQ page again.
Here's the current Google-cached copy (I'll paste it into this post so we don't lose it again, along with a few corrections):
How do I restore deadbolt page for decrypting the files if I have the correct password?
Applicable Products:
Important: After carrying out the steps below, but failing to access the deadbolt page, please contact QNAP customer service.
- Malware
- Security
Follow the steps to restore the original deadbolt page:
- Log in to QTS as an administrator,
- Open the App Center,
- Disable Malware Remover,
Note: Malware Remover must be disabled before running the following steps.
- SSH access the NAS,
- Use the command:
Code: Select all
wget https://download.qnap.com/Storage/tsd/utility/extract_deadbolt_v4.sh; sh extract_deadbolt_v4.sh; chmod +x /home/httpd/index.html
- Open Web Browser and access deadbolt page using the URL: http://YOUR_NAS_IP:8080/index.html
For example:
Qfinder locates your NAS at 10.32.72.48
![]()
- Deadbolt page can be accessed using the URL http://10.32.72.48:8080/index.html
- QTS Web interface (HTTP) can be accessed using the URL http://10.32.72.48:8080/cgi-bin/index.cgi
- QTS Web interface (HTTPS) can be accessed using the URL https://10.32.72.48/cgi-bin/index.cgi
- After the files are decrypted after inputting the password, enable Malware Remover to remove deadbolt related files.
- Log in to QTS as an administrator
- Open the App Center
- Enable Malware Remover
- OneCD
- Guru
- Posts: 12790
- Joined: Sun Aug 21, 2016 10:48 am
- Location: "... there, behind that sofa!"
Re: [RANSOMWARE] Deadbolt
If it helps, the OP_RETURNs (in the transactions containing the decryption keys) all appear to be coming from the same BTC address: bc1qh6pku7gg2d6pw87z3t4f6d4rk6c48ajvsmfjjl ... so it would seem the hackers have some control over payments from that address.Rockerking wrote: ↑Sat Jul 16, 2022 2:55 am Maybe someone cares where all the money ends up or can we do something?
A friend of mine got it, too. and I ve just looked from boredom where the money now goes.
It wanders long:D

-
- New here
- Posts: 2
- Joined: Sun Jul 17, 2022 11:46 pm
Re: [RANSOMWARE] Deadbolt
Hi all, I have a couple of questions to ask...
- when I have undestood what was goin on, I have immediatly removed the power cable from my old and no more supported TS-419p+ ... now, when I will turn on my Nas again... Will Deadbolt continue to encrypt my datas? I would like to check how many files have been encrypted but I would avoid let him continue to encrypt and copy what is still good on other destination.
- I have another old Nas. Can I move my infected disks into this device (it's untouched from years and with an old fw) and try to reset/install the "boot" partition with a "clean" old firmware? It's always an idea to read files without the nightmare of continue to encrypt files (maybe I can run some tool/procedure like qResque).
Thank you, Lucio
- when I have undestood what was goin on, I have immediatly removed the power cable from my old and no more supported TS-419p+ ... now, when I will turn on my Nas again... Will Deadbolt continue to encrypt my datas? I would like to check how many files have been encrypted but I would avoid let him continue to encrypt and copy what is still good on other destination.
- I have another old Nas. Can I move my infected disks into this device (it's untouched from years and with an old fw) and try to reset/install the "boot" partition with a "clean" old firmware? It's always an idea to read files without the nightmare of continue to encrypt files (maybe I can run some tool/procedure like qResque).
Thank you, Lucio
-
- Experience counts
- Posts: 2307
- Joined: Tue May 29, 2018 3:02 am
- Location: Everywhere I go, there I am.
Re: [RANSOMWARE] Deadbolt
So far, there haven't been any reports that I have seen to indicate that the malware continues to run (or restart). It *seems*, purely from what I have read, that it is initiated solely from the original attack. However, you should read the entire thread here (and elsewhere) about how to look for the process (usually identified by a numeric executable and process) so that if you decide to try, you can at least look to see if it runs.icelucio01 wrote: ↑Mon Jul 18, 2022 1:09 am - when I have undestood what was goin on, I have immediatly removed the power cable from my old and no more supported TS-419p+ ... now, when I will turn on my Nas again... Will Deadbolt continue to encrypt my datas? I would like to check how many files have been encrypted but I would avoid let him continue to encrypt and copy what is still good on other destination.
This is not likely to provide you with any advantage. The malware seems to run in memory, however since there are a lot of unknowns, do you really want to take the risk? Putting infected drives into another system isn't likely to give you any better an environment to work within, if it runs in memory. At worst, it would simply infect the core of your other system, but who knows.icelucio01 wrote: ↑Mon Jul 18, 2022 1:09 am - I have another old Nas. Can I move my infected disks into this device (it's untouched from years and with an old fw) and try to reset/install the "boot" partition with a "clean" old firmware? It's always an idea to read files without the nightmare of continue to encrypt files (maybe I can run some tool/procedure like qResque).
Just my opinion.
QNAP TS-563-16G 5x10TB Seagate Ironwolf HDD Raid-5 NIC: 2x1GB 1x10GbE
QNAP TS-231P-US 2x18TB Seagate Exos X18 HDD Raid-1
[Deadbolt and General Ransomware Detection, Prevention, Recovery & MORE]
How to reset my NAS password, network and security settings
QNAP TS-231P-US 2x18TB Seagate Exos X18 HDD Raid-1
[Deadbolt and General Ransomware Detection, Prevention, Recovery & MORE]
How to reset my NAS password, network and security settings