DeadBolt Ransomware Hits ASUSTOR Devices

Share post:

The DeadBolt ransomware has now targeted ASUSTOR NAS devices by encrypting files and demanding $1,150 in bitcoin.

Just like the DeadBolt ransomware attacks that affected QNAP NAS devices last January, the ransomware group claims to be using a zero-day vulnerability in encrypting ASUSTOR NAS devices.

When encrypting files on an ASUSTOR device, the ransomware will continue to rename the files to include the .deadbolt file extension. The ASUSTOR login screen is also replaced by a ransom note asking for 0.03 bitcoin, which is worth $1,150.

While ASUSTOR has not yet disclosed details on how the NAS devices will be encrypted, some ASUSTOR owners are convinced that a vulnerability in the PLEX media server or EZ Connect allows access to their devices.

Users are urged never to expose their ASUSTOR device to the Internet or run the risk of being encrypted by DeadBolt.

Now, there is still no way to recover encrypted files from the DeadBolt ransomware for free. Therefore, many affected QNAP users were forced to pay the ransom to get their files back.

The DeadBolt group is also trying to sell ASUSTOR the master decryption key for all victims as well as the zero-day details for 50 bitcoins which equates to $1.9 million.

ASUSTOR also plans to develop a recovery firmware to allow users to reuse their NAS devices. However, this firmware update will not restore encrypted files.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways