The deadbolt infection of my client, and how I bought the key to decrypt
1. My QNAP was quite old. Many things were not working as planned. Although I had configured QNAP to Auto-Update, this feature was not working correct. I always had to update manually whenever I logged in the GUI.
2. Although I had configured "HBS3 Hybrid Backup Sync" to do a weekly backup to Microsoft One Drive, the job started and run for a while, but always failed after running an hour or so.
3. I had done a manual backup in November 2021 to an other QNAP in the same office. This backup was ok, but quite old.
4. I told the client that the QNAP is having problems doing the backup, and I recommend to buy a new one.
5. The client bought a new QNAP in december 2021, but this new QNAP was defect. I did not turn on, after pressing the the power-on button.
6. The client sent back the new QNAP to the shop where had bought it.
7. While waiting for a replacement the client was hit by Deadbolt.
8. Yes, Port 8080 was open to the internet, because the client used this feature, to be able to access their files from everywhere. This feature was one of the reasons they bought a QNAP.
9. After I had noticed that the client was infected, I did a screenshot of the hijacked login-page, added "cgi-bin/index.cgi" to the url, logged in with my user (2FA) and shut down the QNAP.
10. QNAP-Support was not very helpful. After waiting for days, and my client saying they will pay and hope to get back their files I decided to do so even without the help a QNAP-support.
11. I am still waiting for the QNAP-support to get back to the opened ticket.
12. I live in Austria had never bought bitcoins before. I created a new Bitpanda.at account and transferred € 1.100,-- to the bitpanda-account.
13. After having transferred the Euros to the bitpana-account I bought 0.0324 bitcoins, just to be on the save side and have enough bitcoins for the 0.03 bitcoins requeded by the criminals and the fees for the bitcoin-transferring-services.
14. I made the payment to the address stated in my hijacked login page.
15. I opened
https://blockchain.com/explorer, and entered the blockchain-address to which I had sent the bitcoins.
16. It took some minutes until I could see my transaction in "Explorer". (2022-02-04 15:01 CET)
17. It took several hours until the transaction was confirmed 6 times. It seems to be importatat that the transaction is confirmed by six other parties.
18. About 5 hours later I could see in "Explorer" that another transaction had been made to the blockchain-address. (2022-02-04 20:20 CET)
19. I clicked on details and searched for a "OP_RETURN" but was not able to find it easyly. Finally I found an OP_RETURN code.
20. I entered the OP_RETURN-code into the "Enter your decryption key here..." field on the hijacked login-page but nothing happened. I thought maybe there is no visual confirmation when I enter the correct code and went to bed.
21. Today in the morning there was still no change in the hijacked login-page.
22. I downloaded Emsisoft "Decrypter for Deadbolt" (
https://www.emsisoft.com/ransomware-dec ... s/deadbolt) and installed it on a local computer.
23. I copied a folder with encryted files from my QNAP to my C-Drive, because "Emsisoft Decryptor for Deadbolt" can decrypt only local files. This tools does not see my mapped network-drives.
24. When starting "Emsisoft Decrytor for Deadbolt" the program asks for the decryption-key. I entered the key, and selected the local folder with my enrypted files and clicked the button "Decrypt". The tool stated the the entered key was wrong, and I was not able to decrypt the files.
25. I checked "
https://blockchain.com/explorer" again, to see that there was a third transaction to the address, done at 2022-02-05 01:42 CET
26. I clicked on the hash-link to see details for this transaction, and now there was an easy-to-find OP_RETURN code.
27. I entered the new OP_RETURN code again to the "Enter your decryption key here..." field on the hijacked login page, but again nothing happened.
28. I entered the new OP_RETURN code once again into "Emsisoft Decryptor for Deadbolt" and clicked on the button "Decrypt" - this time the decryption was working correct and I got back the files.
29. I logged into my router and allowed internet-access for the QNAP.
30. I logged into my QNAP by adding "/cgi-bin/index.cgi" to the URL and opened "Malware Remover" which found an quarantained deadbolt.
31. QNAP requested for a reboot after the scan for malware with "Malware Remover" finished.
32. When all files from the old QNAP are copied an decrypted to another place, I will format/reset to factory-defaults the old QNAP