[RANSOMWARE] Qlocker

Introduce yourself to us and other members here, or share your own product reviews, suggestions, and tips and tricks of using QNAP products.
Post Reply
QNAPDanielFL
Easy as a breeze
Posts: 488
Joined: Fri Mar 31, 2017 7:09 am

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by QNAPDanielFL »

jaysona wrote: Thu Apr 22, 2021 1:20 am

I specifically remove QNAP bloatware such as the MultiMedia Console and its associated programs, yet every so often, upon a system reboot, QNAP automatically re-installs this bloatware, along with HelpDesk, so I have to manually remove these insecure programs again. :x :x

QNAP and security are like oil and water - they just do not mix. :roll: :roll:
I am talking with our security team about what you bring up.
hellocloud
New here
Posts: 2
Joined: Thu Apr 22, 2021 1:41 am

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by hellocloud »

I have the same problem. QNAP was hacked and the same text !!!READ_ME.txt is there:

!!! All your files have been encrypted !!!

All your files were encrypted using a private and unique key generated for the computer. This key is stored in our server and the only way to receive your key and decrypt your files is making a Bitcoin payment.

To purchase your key and decrypt your files, please follow these steps:

1. Dowload the Tor Browser at "https://www.torproject.org/". If you need help, please Google for "access onion page".

2. Visit the following pages with the Tor Browser:

gvka2m4qt5fod2fltkjmdk4gxh5oxemhpgmnmtjptms6fkgfzdd62tad.onion

3. Enter your Client Key:

...... (a long sequence of numbers and characters, I guess specific to every hacked user.)

----
Anybody can help ?
CoastalBird
First post
Posts: 1
Joined: Wed Apr 21, 2021 11:41 pm

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by CoastalBird »

Media Streaming add-on appears to be a vector in this attack:
https://www.bleepingcomputer.com/news/s ... p-devices/
Eternic
Starting out
Posts: 16
Joined: Sat Mar 16, 2019 9:53 pm

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by Eternic »

For anyone like me that is in the ** situation of deciding to pay up to get the 7z password, I've done so (luckily I already have a bitcoin wallet with enough) and I'm working through fixing my files now. If you're on Windows and accessing the files through explorer, the following is a batch script that I want it to be clear is not something I think you should use and if you do you should backup the folders before running it just in case. If you use this script correctly or incorrectly and have any data loss please do not blame me. Do not use it if you are going to be this person. If you don't know anything about batch files then don't use it. Also please created some test folders and 7z files and try it there first.

In order for the script to work on a network folder you'll need to map that folder or a parent folder to a drive letter (e.g. Z:). Create a batch file (e.g. FixMyStuff.bat) and place it in the folder you want fixed. It will extract any 7z files in that folder and any child folders and then delete them. You can remove the 3rd line that deletes the 7z files if you choose. The script is:

Code: Select all

dir /s /b *.7z > allzips.txt
for /F "delims=" %%x in (allzips.txt) do ("C:\Program Files\7-Zip\7z.exe" e -pXXXXXXXXXXXXXXXXXXXXXXXXXXXXX -o"%%~dpx" "%%x")
for /F "delims=" %%x in (allzips.txt) do del "%%x"
Note that this creates an allzips.txt that the script does not delete. This is what I want. You can add a line to delete allzips.txt at the end or you can rewrite the for loop to just do the (dir /s /b *.7z) internally. Where "XXXXXXXXXXXXXXXXXXXXXXXXXXXXX" is you will insert the password you get from giving the pieces of garbage your hard earned money because you were careless with your security and mistakenly trusted your NAS. You can also add lines to find and delete the !!!READ_ME.txt files, but I'll do that separately afterwards personally. You will also need to change the path to 7z.exe to wherever you have it installed.

Again, please do not use this unless you know what you are doing and take every precaution. I'm only posting it to save people some time in this ** situation and I don't want to make it worse for them if there are any issues with this script. I have not tested it on all my files yet but so far it has worked fine.

EDIT: Also note that if you have legitimate 7z files this will extract and delete them. You can separate the first line into a separate batch file and remove any 7z files you want left untouched from the allzips.txt and then run a second batch file that does the loops. You could probably also write something better that checks file modification times and only extracts files modified after a time you specify relevant to when you were hit.
Last edited by Eternic on Thu Apr 22, 2021 2:36 am, edited 1 time in total.
QNAPDanielFL
Easy as a breeze
Posts: 488
Joined: Fri Mar 31, 2017 7:09 am

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by QNAPDanielFL »

Eternic wrote: Thu Apr 22, 2021 2:18 am For anyone like me that is in the ** situation of deciding to pay up to get the 7z password, I've done so (luckily I already have a bitcoin wallet with enough) and I'm working through fixing my files now. If you're on Windows and accessing the files through explorer, the following is a batch script that I want it to be clear is not something I think you should use and if you do you should backup the folders before running it just in case. If you use this script correctly or incorrectly and have any data loss please do not blame me. Do not use it if you are going to be this person. If you don't know anything about batch files then don't use it. Also please created some test folders and 7z files and try it there first.

In order for the script to work on a network folder you'll need to map that folder or a parent folder to a drive letter (e.g. Z:). Create a batch file (e.g. FixMyStuff.bat) and place it in the folder you want fixed. It will extract any 7z files in that folder and any child folders and then delete them. You can remove the 3rd line that deletes the 7z files if you choose. The script is:

Code: Select all

dir /s /b *.7z > allzips.txt
for /F "delims=" %%x in (allzips.txt) do ("C:\Program Files\7-Zip\7z.exe" e -pXXXXXXXXXXXXXXXXXXXXXXXXXXXXX -o"%%~dpx" "%%x")
for /F "delims=" %%x in (allzips.txt) do del "%%x"


Note that this creates an allzips.txt that the script does not delete. This is what I want. You can add a line to delete allzips.txt at the end or you can rewrite the for loop to just do the (dir /s /b *.7z) internally. Where "XXXXXXXXXXXXXXXXXXXXXXXXXXXXX" is you will insert the password you get from giving the pieces of garbage your hard earned money because you were careless with your security and mistakenly trusted your NAS. You can also add lines to find and delete the !!!READ_ME.txt files, but I'll do that separately afterwards personally. You will also need to change the path to 7z.exe to wherever you have it installed.

Again, please do not use this unless you know what you are doing and take every precaution. I'm only posting it to save people some time in this ** situation and I don't want to make it worse for them if there are any issues with this script. I have not tested it on all my files yet but so far it has worked fine.

Are you saying this script can get the files back without paying the ransom?
Last edited by QNAPDanielFL on Thu Apr 22, 2021 2:25 am, edited 1 time in total.
syncthing
Know my way around
Posts: 136
Joined: Mon Aug 13, 2018 4:58 pm

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by syncthing »

QNAPDanielFL wrote: Thu Apr 22, 2021 2:23 am Are you saying this script can get the files back without paying the ransom?
I understand his posting that way, that he spent some bitcoins to get a password ...
Eternic
Starting out
Posts: 16
Joined: Sat Mar 16, 2019 9:53 pm

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by Eternic »

QNAPDanielFL wrote: Thu Apr 22, 2021 2:23 am Are you saying this script can get the files back without paying the ransom?
No, I paid the ransom. This is just a script to automate the process of using the password paid for to unzip the password protected 7z files and delete them as this is a process that would take days on my NAS to do without automation.
User avatar
jaysona
Been there, done that
Posts: 856
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by jaysona »

QNAPDanielFL wrote: Thu Apr 22, 2021 2:10 am
jaysona wrote: Thu Apr 22, 2021 1:20 am

I specifically remove QNAP bloatware such as the MultiMedia Console and its associated programs, yet every so often, upon a system reboot, QNAP automatically re-installs this bloatware, along with HelpDesk, so I have to manually remove these insecure programs again. :x :x

QNAP and security are like oil and water - they just do not mix. :roll: :roll:
I am talking with our security team about what you bring up.
Hopefully at some point in the future QNAP will finally level-up and become a mature company software wise.

Funny enough, as this latest security snafu presented itself, my Asustor AS6604T was delivered. I have had it QNAP and I am now exploring other options - starting off small of course before committing money to the purchase of 10+ bay units.
RAID is not a Back-up!

H/W: QNAP TVS-872x (i7-8700. 64GB) (Plex server & encoding host) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6706T (32GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AX86U - Asuswrt-Merlin - 3004.388.6_2
Router2: Asus RT-AC66U - Asuswrt-Merlin - 386.12_6
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
syncthing
Know my way around
Posts: 136
Joined: Mon Aug 13, 2018 4:58 pm

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by syncthing »

jaysona wrote: Thu Apr 22, 2021 1:20 am I specifically remove QNAP bloatware such as the MultiMedia Console and its associated programs, yet every so often, upon a system reboot, QNAP automatically re-installs this bloatware, along with HelpDesk, so I have to manually remove these insecure programs again. :x :x

QNAP and security are like oil and water - they just do not mix. :roll: :roll:
what is the best way to delete them?
User avatar
jaysona
Been there, done that
Posts: 856
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by jaysona »

QNAPDanielFL wrote: Thu Apr 22, 2021 2:23 am ....
Are you saying this script can get the files back without paying the ransom?
This poster claims it to be possible to find out what the encryption password is without paying - as long as the process of encrypting the files is still active on the NAS.

viewtopic.php?f=45&t=160849#p786812
RAID is not a Back-up!

H/W: QNAP TVS-872x (i7-8700. 64GB) (Plex server & encoding host) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6706T (32GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AX86U - Asuswrt-Merlin - 3004.388.6_2
Router2: Asus RT-AC66U - Asuswrt-Merlin - 386.12_6
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
User avatar
jaysona
Been there, done that
Posts: 856
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by jaysona »

syncthing wrote: Thu Apr 22, 2021 2:36 am ....

what is the best way to delete them?
viewtopic.php?t=158593&p=774659
RAID is not a Back-up!

H/W: QNAP TVS-872x (i7-8700. 64GB) (Plex server & encoding host) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6706T (32GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AX86U - Asuswrt-Merlin - 3004.388.6_2
Router2: Asus RT-AC66U - Asuswrt-Merlin - 386.12_6
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
elvisimprsntr

[RANSOMWARE] 4/20/2021 - new virus ?

Post by elvisimprsntr »

Rule #1 Never, ever expose QNAP NAS to WAN

Rule #2 See Rule #1
jbennett360
Getting the hang of things
Posts: 65
Joined: Tue Aug 08, 2017 1:04 am

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by jbennett360 »

elvisimprsntr wrote: Thu Apr 22, 2021 3:02 am Rule #1 Never, ever expose QNAP NAS to WAN

Rule #2 See Rule #1
Rule #3 Check rule 1&2 again.

Disable UPnP
Disable/Don't use MyQNAPCloud
Don't port forward

Pretty much should be covered with those three!
elvisimprsntr

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by elvisimprsntr »

Disable UPnP in your router and reboot router/firewall to close any active UPnP ports.
User avatar
jaysona
Been there, done that
Posts: 856
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: [RANSOMWARE] 4/20/2021 - new virus ?

Post by jaysona »

melliott1963 wrote: Thu Apr 22, 2021 3:13 am .....
Does this mean that there is now no way anyone can remotely access my servers, or are there any other settings I need to check?
*sigh* repost of a repost, of a repost, of a ... :roll:

viewtopic.php?f=45&t=160849&start=15#p786840

viewtopic.php?f=45&t=160308#p783870

1. Disable UPnP on the router.
2. Disable UPnP on the NAS.
3. Do not port forwarding 8080/443 from the router to the NAS.
4. Do not change ports 8080/443 to some other obscure port and forward those obscure ports accessible on the Internet - they will eventually be discovered.
5. Disable/remove all QTS apps that are not being actively used.
6. Enable the built-in IP Access Protection.

Use the NAS as a NAS and nothing more, unless you have the technical know-how and have the desire to tinker and accept the risks associated with tinkering.
Last edited by jaysona on Thu Apr 22, 2021 3:34 am, edited 2 times in total.
RAID is not a Back-up!

H/W: QNAP TVS-872x (i7-8700. 64GB) (Plex server & encoding host) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6706T (32GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AX86U - Asuswrt-Merlin - 3004.388.6_2
Router2: Asus RT-AC66U - Asuswrt-Merlin - 386.12_6
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
Post Reply

Return to “Users' Corner”