Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

DeadBolt ransomware Support Topic - QNAP ASUSTOR devices (.deadbolt extension)


  • Please log in to reply
706 replies to this topic

#1 Grinler

Grinler

    Lawrence Abrams


  •  Avatar image
  • Admin
  • 45,075 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:45 AM

Posted 25 January 2022 - 07:17 PM

The new DeadBolt ransomware is targeting QNAP devices and appending the .deadbolt extension to encrypted file's names.
 
The ransomware is also hijacking the QNAP login screen to display a ransom note demanding 0.03 bitcoins, worth approximately $1,100.
 
Each victim receives a unique bitcoin address and there is no confirmation that paying a ransom will provide a decryption key.

Update 1/26/22: Below is new information received from victims and by analyzing a sample of the ransomware shared with BleepingComputer.

 

When a QNAP device is compromised a random named file will be created at /mnt/HDA_ROOT/. For exmaple, /mnt/HDA_ROOT/27855.

 

This random named file is the Linux ransomware executable used to encrypt and decrypt your device.

 

When executed, it will take a command line argument in the form: [random_file_name] -e <config> <dir>

 

If QNAP has a command line history, please check for the existince of this command and let us know as a reply to this topic.

 

When launched it will encrypt the following targeted file extensions:

.3dm, .3ds, .3fr, .3g2, .3gp, .3pr, .ab4, .accdb, .accdc, .accde, .accdr, .accdt, .ach, .acr, .act, .adb, .ads, .agdl, .ait, .apj, .arw, .asf, .asm, .asp, .aspx, .asx, .avhd, .avi, .awg, .back, .backup, .backupdb, .bak, .bank, .bay, .bdb, .bgt, .bik, .bin, .bkf, .bkp, .blend, .bpw, .cdf, .cdr, .cdr3, .cdr4, .cdr5, .cdr6, .cdrw, .cdx, .ce1, .ce2, .cer, .cfg, .cfp, .cgm, .cib, .class, .cls, .cmt, .conf, .cpi, .cpp, .cr2, .craw, .crl, .crt, .crw, .csh, .csl, .csr, .csv, .dac, .dat, .db3, .db4, .db_journal, .dbc, .dbf, .dbx, .dc2, .dcr, .dcs, .ddd, .ddoc, .ddrw, .dds, .der, .des, .design, .dev, .dgc, .disk, .djvu, .dng, .doc, .docm, .docx, .dot, .dotx, .drf, .drw, .dtd, .dwg, .dxb, .dxf, .dxg, .edb, .eml, .eps, .erbsql, .erf, .exf, .fdb, .ffd, .fff, .fhd, .fla, .flac, .flv, .fpx, .fxg, .gdb, .git, .gray, .grey, .gry, .hbk, .hdd, .hpp, .ibank, .ibd, .ibz, .idx, .iif, .iiq, .incpas, .indd, .iso, .jar, .java, .jpe, .jpeg, .jpg, .jrs, .kc2, .kdbx, .kdc, .key, .kpdx, .lua, .m4v, .mail, .max, .mdb, .mdbx, .mdc, .mdf, .mef, .mfw, .mkv, .mmw, .moneywell, .mos, .mov, .mp3, .mp4, .mpg, .mrw, .msi, .myd, .ndd, .nef, .nk2, .nop, .nrg, .nrw, .ns2, .ns3, .ns4, .nsd, .nsf, .nsg, .nsh, .nsn, .nwb, .nx2, .nxl, .nyf, .obj, .oda, .odb, .odc, .odf, .odg, .odm, .odp, .ods, .odt, .oil, .orf, .ost, .otg, .oth, .otp, .ots, .ott, .ova, .ovf, .p12, .p7b, .p7c, .p7r, .pages, .pas, .pat, .pcd, .pct, .pdb, .pdd, .pdf, .pef, .pem, .pfx, .php, .pio, .piz, .plc, .pmf, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prf, .ps1, .psafe3, .psd, .pspimage, .pst, .ptx, .pvi, .pvk, .pyc, .qba, .qbb, .qbm, .qbr, .qbw, .qbx, .qby, .r3d, .raf, .rar, .rat, .raw, .rdb, .rtf, .rw2, .rwl, .rwz, .s3db, .sas7bdat, .say, .sd0, .sda, .sdb, .sdf, .sl3, .sldm, .sldx, .spc, .sql, .sqlite, .sqlite3, .sqlitedb, .sr2, .srf, .srt, .srw, .st4, .st5, .st6, .st7, .st8, .stc, .std, .sti, .stw, .stx, .svg, .swf, .sxc, .sxd, .sxg, .sxi, .sxm, .sxw, .tar, .tex, .tga, .thm, .tiff, .tlg, .txt, .vbk, .vbm, .vbox, .vcb, .vdi, .vfd, .vhd, .vhdx, .vmc, .vmdk, .vmem, .vmfx, .vmsd, .vmx, .vmxf, .vob, .vsd, .vsdx, .vsv, .wallet, .wav, .wb2, .wdb, .wmv, .wpd, .wps, .x11, .x3f, .xis, .xla, .xlam, .xlk, .xlm, .xlr, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xvd, .ycbcra, .yuv, .zip

DeadBolt will also replace the /home/httpd/index.html file so that when you access the device you will see a ransom screen instead.

 

ransom-note-screen.jpg

 

This will prompt you to enter a decryption key that can be obtained by sending 0.03 bitcoins to a listed bitcoin address. 

 

After payment, the threat actors will create another bitcoin transaction to the same address that has the decryption key for your device. The decryption key is located under the OP_RETURN output, as shown below.

 

deadbolt-decryption-key-in-output.jpg

 

When you enter this key into the ransom note screen, the web page will convert the key into a SHA256 hash.

 

If that SHA256 hash matches the SHA256 hash of your device's decryption key, it will decrypt the device with that key.

 

If that SHA256 hash matches the SHA256 hash of the master decryption key, it will decrypt the device with that key.

 

The SHA256 hash for the master decryption key is 93f21756aeeb5a9547cc62dea8d58581b0da4f23286f14d10559e6f89b078052.

 

Multiple victims have reported paying the ransom and receiving a decryption key that has successully decrypted their files.

 

QNAP has told BleepingComputer that users can bypass the ransom screen and gain access to their admin page by using the http://nas_ip:8080/cgi-bin/index.cgi or https://nas_ip/cgi-bin/index.cgi URLs.

 

QNAP further told us that their Product Security Incident Response Team (PSIRT) is investigating the attack vectors now and that owners should follow these steps to protect their data and NAS.



BC AdBot (Login to Remove)

 


#2 landski

landski

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:45 AM

Posted 25 January 2022 - 07:58 PM

Mine started encrypting files about 3 hours ago. I got everything backed up, but it is annoying I can´t login to the device. Access via iPhone app still works. Hope Qnap comes up with a solution quickly.



#3 unknown2u

unknown2u

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:12:45 AM

Posted 25 January 2022 - 08:05 PM

This has happened to me today. I do have backups and cannot login to the NAS as I am presented with the screen to send Bitcoin. I can login via the iPhone app. 



#4 tightrace420

tightrace420

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 25 January 2022 - 08:24 PM

This happened to me in the morning today. Even with everything updated, running the latest firmware and double authentication. Glad I backed up. 

Mines ask for 0.03 bitcoins as well. I hope a solution come fast.



#5 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,075 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:45 AM

Posted 25 January 2022 - 08:24 PM

I have emails out to their PSIRT and media contacts.

 

Will update this topic with any info I receive.



#6 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,075 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:45 AM

Posted 25 January 2022 - 08:25 PM

Can anyone share the screen shown when you click more information on the initial ransom screen?



#7 nonojapan

nonojapan

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:02:45 PM

Posted 25 January 2022 - 08:33 PM

Got hacked during the night.

Anyone knows how to contact at Qnap? Can't pay 0,03bt.



#8 landski

landski

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:45 AM

Posted 25 January 2022 - 08:53 PM

Attached File  Screenshot 2022-01-26 at 02.46.17.png   611.87KB   16 downloads



#9 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,075 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:45 AM

Posted 25 January 2022 - 09:06 PM

Thank you. Adding image to the article.



#10 g33kb0y3a

g33kb0y3a

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:45 AM

Posted 25 January 2022 - 09:34 PM

For those interested, this is the .html (renamed to .txt) that is displayed on a compromised system, and a shell script, also renamed .txt

 

Use your favorite text editor (looking at you Notepad++) to view it.

 

All of the various pop-ups are contained within the single html file as well as the java script that calls the installed binaries to perform the decryption.

Attached Files



#11 syu32

syu32

  •  Avatar image
  • Banned Spammer
  • Member rank image
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:45 AM

Posted 25 January 2022 - 09:53 PM

I was hit this morning, and surprising by end of the day there were only a handful of folders impacted - so perhaps the encryption takes a long time, especially on video files.
This is my first time having a ransomware attack, and I probably will need to pay the ransom -- any insight into the following questions would be greatly appreciated!

1) If I pay the ransom, how will I even get the decryption key -- I know there's no guarantee, but how would this even work to get the encryption key from the hackers?  Do I have to leave my NAS on in order to get this info?
2) Because a good amount of my data was unaffected, I shut the NAS down via Qfinder -- I'm assuming this will just pause the encryption process -- and it will just start back up when I turn it back on.  Should I just leave if off and wait to see what the results are of the ransom payments that someone else might make? 

3) If I reverse any of the changes made and try to clean it per some peoples advice on restoring admin panel, will it then make it harder to use the decryption key to recover the data?

 

Thanks in advance to any insight anyone may have!



#12 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,075 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:45 AM

Posted 25 January 2022 - 10:34 PM

For those interested, this is the .html (renamed to .txt) that is displayed on a compromised system, and a shell script, also renamed .txt

 

Use your favorite text editor (looking at you Notepad++) to view it.

 

All of the various pop-ups are contained within the single html file as well as the java script that calls the installed binaries to perform the decryption.

 

Thank you. Very useful.



#13 haluwong

haluwong

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:45 PM

Posted 25 January 2022 - 10:41 PM

My client is one of the victim~

 

FYI

After using Qfinder to restart the device

Now can logint o webui



#14 haluwong

haluwong

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:45 PM

Posted 25 January 2022 - 10:44 PM

My client is one of the victim~

 

FYI

After using Qfinder to restart the device

Now can logint o webui



#15 g33kb0y3a

g33kb0y3a

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:45 AM

Posted 25 January 2022 - 11:01 PM

Apparently the decryption code/key/process unfortunately did not work for at least one person that claims a BTC payment was made.

https://forum.qnap.com/viewtopic.php?f=45&t=164797&start=45#p808629

Edited by g33kb0y3a, 25 January 2022 - 11:04 PM.





2 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users


    Facebook (1)