Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

0XXX (NAS) Ransomware (.0xxx) Support Topic


  • Please log in to reply
233 replies to this topic

#31 fluffypeach

fluffypeach

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:44 AM

Posted 31 July 2021 - 02:53 PM

so seems that they were scanning the net looking for online NAS devices having smb shares and probably they used some smb exploit to bypass smb passwords...

That's my theory. The next question is, was this a vulnerability in Samba or a case of us leaving our permissions open to this exploit?



BC AdBot (Login to Remove)

 


#32 CKlabs

CKlabs

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 31 July 2021 - 03:29 PM

well I used to mount 3 shares of my NAS remotely but all need password to access files... they encrypted files and renamed them also file date and time where updated to encryption moment so they had correct user permissions to do all this... they used an exploit for sure in my opinion

#33 kristan_

kristan_

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:44 AM

Posted 01 August 2021 - 04:50 AM

I can confirm I used samba on one of my NAS's which were hit, the only person that had this was my girlfriend and the only files that were affected were files that she had write access too. Files she had read access too had the files clones and encrypted so the original file was there and then also the encrypted file. In total I had about 30TB's of data encrypted fortunately however this is just media files and a few game servers.

I advise no one to pay the ransom. Unfortunately looking through any documents I have both the standard and encrypted version of are pretty sensitive so I don't really feel comfortable sharing them and plan to just wipe the particular NAS in question.  Fort the next hour or so I am migrating stuff over to some other devices so if anyone wants me to check anything before it gets wiped just reply here and I'll check up.

Edit took a lot quicker than anticipated to move files to other devices beginning the wipe now sorry.


Edited by kristan_, 01 August 2021 - 05:34 AM.


#34 shelz8

shelz8

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 01 August 2021 - 10:51 AM

Hello,
 
 
 
another victim here. South Africa-based. It's my UnRAID Server that's infected. All my movies (mp4s etc), and photos (jpegs) have all been appended with the suffix .0xxx.
 
 
I have the same ransom text document as the others (except for a different ID).
 
here is the link to the files https://dropmefiles.com/dIAOy
 
Unknown Ransomware
 Unable to determine ransomware.
Please make sure you are uploading a ransom note and encrypted sample file from the same infection.
 
This can happen if this is a new ransomware, or one that cannot be currently identified automatically.
 
You may post a new topic in the Ransomware Tech Support and Help forums on BleepingComputer for further assistance and analysis.
 
Please reference this case SHA1: 9beed310fb925e3bca939d9c3ba78f88d5008ab8
 
All my files on 1 of the 3 hard drives were infected around 5 am around that time of infection I was using Samba to upload my Series to my cloud drive.
 
Many thanks
 
Sheldon

Edited by shelz8, 01 August 2021 - 11:13 AM.


#35 shelz8

shelz8

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 01 August 2021 - 11:03 AM

A question to fellow attackees - were you all using Samba? I've rebuilt my system from scratch and I suspect my settings on Samba were the door into my server so I'm avoiding using that. Failing that, are you all plexers? My affected machine was running Ubuntu 20.04.2, Samba and Plex and not much else as it's all that machine is for. Thanks for any feedback.

I use samba on my unRAID server but i don't know what caused it because last night it was fine and when I woke up my files were encrypted on one hard drive but my other two hard drives are fine. I'm suspecting something downloaded on Radarr or Sonarr and that caused it because nothing imported to one of the other unaffected drives.



#36 fluffypeach

fluffypeach

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:44 AM

Posted 01 August 2021 - 07:06 PM

 

A question to fellow attackees - were you all using Samba? I've rebuilt my system from scratch and I suspect my settings on Samba were the door into my server so I'm avoiding using that. Failing that, are you all plexers? My affected machine was running Ubuntu 20.04.2, Samba and Plex and not much else as it's all that machine is for. Thanks for any feedback.

I use samba on my unRAID server but i don't know what caused it because last night it was fine and when I woke up my files were encrypted on one hard drive but my other two hard drives are fine. I'm suspecting something downloaded on Radarr or Sonarr and that caused it because nothing imported to one of the other unaffected drives.

 

 

I don't use Radarr or Sonarr though I've looked into them. I found that my Ubuntu server was attacked while I was out and no one else was accessing it. Just being online but not actively doing anything was enough. Some of my files weren't encrypted - it seems to have been down to file type, but it was across the three hard drives that I samba shared. The OS hard drive wasn't shared and wasn't affected, so this is why I think it's a samba exploit. It sucks because I like using samba and in rebuilding, I've had to do a lot of usb swapping. meh. 



#37 DrKamBoosha

DrKamBoosha

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 02 August 2021 - 04:14 AM

Same thing here from Egypt :clapping:

my WD NAS server with samba share .. always available online

Mainly it hit all my movies collection there :angry:  .. the good thing is that I'm a little bit paranoid about having a single version of my files B)

So .. for me 2 things are of concern :
first .. if i did resotre my collection what prevents this from happening again ?? till now nothing :unsure:
second .. i need some good time to restore things but that is not a big deal :blush:
 



#38 fluffypeach

fluffypeach

  •  Avatar image
  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:44 AM

Posted 02 August 2021 - 04:43 AM

Same thing here from Egypt :clapping:

my WD NAS server with samba share .. always available online

Mainly it hit all my movies collection there :angry:  .. the good thing is that I'm a little bit paranoid about having a single version of my files B)

So .. for me 2 things are of concern :
first .. if i did resotre my collection what prevents this from happening again ?? till now nothing :unsure:
second .. i need some good time to restore things but that is not a big deal :blush:
 

This is my concern and why I was trying to work out what exploit they used. I've abandoned samba for the moment and I'm just using USB drives and my backup drives directly without using samba. I suspect if this is happening still, then there needs to be an exploit fix before we can go back to using it.
I don't know which team of people look after samba though. 



#39 shelz8

shelz8

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 02 August 2021 - 05:03 AM

 

Same thing here from Egypt :clapping:

my WD NAS server with samba share .. always available online

Mainly it hit all my movies collection there :angry:  .. the good thing is that I'm a little bit paranoid about having a single version of my files B)

So .. for me 2 things are of concern :
first .. if i did resotre my collection what prevents this from happening again ?? till now nothing :unsure:
second .. i need some good time to restore things but that is not a big deal :blush:
 

This is my concern and why I was trying to work out what exploit they used. I've abandoned samba for the moment and I'm just using USB drives and my backup drives directly without using samba. I suspect if this is happening still, then there needs to be an exploit fix before we can go back to using it.
I don't know which team of people look after samba though. 

 

My UnRAID Server uses SMB but I use it daily



#40 kristan_

kristan_

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:44 AM

Posted 02 August 2021 - 05:14 AM

 

 

A question to fellow attackees - were you all using Samba? I've rebuilt my system from scratch and I suspect my settings on Samba were the door into my server so I'm avoiding using that. Failing that, are you all plexers? My affected machine was running Ubuntu 20.04.2, Samba and Plex and not much else as it's all that machine is for. Thanks for any feedback.

I use samba on my unRAID server but i don't know what caused it because last night it was fine and when I woke up my files were encrypted on one hard drive but my other two hard drives are fine. I'm suspecting something downloaded on Radarr or Sonarr and that caused it because nothing imported to one of the other unaffected drives.

 

 

I don't use Radarr or Sonarr though I've looked into them. I found that my Ubuntu server was attacked while I was out and no one else was accessing it. Just being online but not actively doing anything was enough. Some of my files weren't encrypted - it seems to have been down to file type, but it was across the three hard drives that I samba shared. The OS hard drive wasn't shared and wasn't affected, so this is why I think it's a samba exploit. It sucks because I like using samba and in rebuilding, I've had to do a lot of usb swapping. meh. 

 

You can use Samba, just don't share to the port to the internet.



#41 shelz8

shelz8

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 02 August 2021 - 07:27 AM

 

 

 

A question to fellow attackees - were you all using Samba? I've rebuilt my system from scratch and I suspect my settings on Samba were the door into my server so I'm avoiding using that. Failing that, are you all plexers? My affected machine was running Ubuntu 20.04.2, Samba and Plex and not much else as it's all that machine is for. Thanks for any feedback.

I use samba on my unRAID server but i don't know what caused it because last night it was fine and when I woke up my files were encrypted on one hard drive but my other two hard drives are fine. I'm suspecting something downloaded on Radarr or Sonarr and that caused it because nothing imported to one of the other unaffected drives.

 

 

I don't use Radarr or Sonarr though I've looked into them. I found that my Ubuntu server was attacked while I was out and no one else was accessing it. Just being online but not actively doing anything was enough. Some of my files weren't encrypted - it seems to have been down to file type, but it was across the three hard drives that I samba shared. The OS hard drive wasn't shared and wasn't affected, so this is why I think it's a samba exploit. It sucks because I like using samba and in rebuilding, I've had to do a lot of usb swapping. meh. 

 

You can use Samba, just don't share to the port to the internet.

 

I deleted the port forward for SMB and I lost 7TB of files out of 24TB



#42 DrKamBoosha

DrKamBoosha

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 02 August 2021 - 07:21 PM

So in numbers are we talking about blocking ports 139 & 445 only ??
in other words , anyone blocking those port & got infected ??



#43 shelz8

shelz8

  •  Avatar image
  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 03 August 2021 - 01:17 AM

So in numbers are we talking about blocking ports 139 & 445 only ??
in other words , anyone blocking those port & got infected ??


I only have 445 open on the router but I deleted it yesterday

Edited by shelz8, 03 August 2021 - 01:19 AM.


#44 kristan_

kristan_

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:44 AM

Posted 03 August 2021 - 03:11 AM

So in numbers are we talking about blocking ports 139 & 445 only ??
in other words , anyone blocking those port & got infected ??

If the SMB ports were not open then SMB isnt connected to the internet so they would not have been affected.



#45 CKlabs

CKlabs

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:44 AM

Posted 03 August 2021 - 04:26 AM

yes my personal opinion is that they :

 

- scan the net looking for SMB exposed ports

- test for a couple of SMB exploits and check if unpatched on the found SMB machine : some to gain root priviledges directly , others to upload a payload that will run with root level ( like the .so found )

- if any of the exp. works they launch the encryption tool, remotely if cannot upload payload or they run the uploaded payload.

 

... in my case no payload was uploaded so they found an unpatched SMB exp. for remote root execution priviledges and did a remote encryption by mounting the SMD shares remotely ... this can explain why they did not complete the encryption of all files, probably I disconnected the NAS from internet while they were doing it ... 

 

PS: 

I recovered almost all "work" files ... just have tons of pictures and movies still encrypted ... if anyone needs some encrypted/original files I have many of them I can provide to help reversing the encyption method.


Edited by CKlabs, 03 August 2021 - 04:30 AM.





4 user(s) are reading this topic

0 members, 4 guests, 0 anonymous users