The DeadBolt ransomware has now targeted ASUSTOR NAS devices by encrypting files and demanding $1,150 in bitcoin.
Just like the DeadBolt ransomware attacks that affected QNAP NAS devices last January, the ransomware group claims to be using a zero-day vulnerability in encrypting ASUSTOR NAS devices.
When encrypting files on an ASUSTOR device, the ransomware will continue to rename the files to include the .deadbolt file extension. The ASUSTOR login screen is also replaced by a ransom note asking for 0.03 bitcoin, which is worth $1,150.
While ASUSTOR has not yet disclosed details on how the NAS devices will be encrypted, some ASUSTOR owners are convinced that a vulnerability in the PLEX media server or EZ Connect allows access to their devices.
Users are urged never to expose their ASUSTOR device to the Internet or run the risk of being encrypted by DeadBolt.
Now, there is still no way to recover encrypted files from the DeadBolt ransomware for free. Therefore, many affected QNAP users were forced to pay the ransom to get their files back.
The DeadBolt group is also trying to sell ASUSTOR the master decryption key for all victims as well as the zero-day details for 50 bitcoins which equates to $1.9 million.
ASUSTOR also plans to develop a recovery firmware to allow users to reuse their NAS devices. However, this firmware update will not restore encrypted files.
For more information, read the original story in BleepingComputer.