Skip to main content

Featured

They use new tricks to sneak malware using TLS encryption

Hackers are constantly updating their attacks and searching out new strategies to contaminate victims' systems and obtain their purpose. This time we echo new hints that take advantage of TLS encryption to sneak malware. A hassle that could severely compromise teams and that we ought to keep away from. We can even deliver a few exciting hints to improve safety whilst browsing .  They take advantage of TLS encryption to sneak malware TLS is the acronym for Transport Layer Security, which in Spanish may be translated as transport layer security. It is used to provide comfortable and encrypted communications in the community. Something fundamental these days to keep away from troubles whilst getting into an internet site and no longer compromise our privateness.  However, this is precisely what cybercriminals are taking advantage of to carry out their attacks. There has been a big increase in malware that takes advantage of TLS encryption. In the event that we browse an unencryp

Massive ransomware attack puts QNAP devices at risk

 Devices connected to the network can suffer multiple attacks that put security and privacy at risk. There are many threats that in one way or another could affect us. In this article we echo an issue that affects QNAP devices . It is the Qlocker ransomware and uses 7zip to encrypt the devices and then ask for a ransom in return. A problem that can undoubtedly put users in serious trouble.

Qlocker ransomware puts QNAP devices at risk

Without a doubt, ransomware is one of the most important threats on the Internet. As we know, the goal of hackers is to encrypt systems and devices and then ask for a ransom to profit. It is something that can affect both home users and businesses. A very present problem and that with the passage of time it has been perfecting.

In this case, it is the Qlocker ransomware, which affects QNAP devices. A massive campaign that makes users' content end up encrypted in 7zip files . It has been recently detected and acts in a similar way to any such threat.

Attackers use 7zip to store device files and later encrypt them with a password. These files will have the extension 7z. When the victim tries to access the content, they will find the need to enter a password, which they do not know and would have to pay for it.

As is generally the case with ransomware attacks, the victim will see a text file named READ_ME.txt . There you will find a unique key to access the payment site through Tor. The payment to be made is 0.01 bitcoins, which is equivalent to about 450 euros at the current exchange rate at the time of writing this article.

QNAP indicates that there could be a vulnerability

From QNAP they indicate that they are working on learning more about this problem and providing a solution to the victims so that they can recover the files. They hope they can find a weakness in the ransomware to make this possible.

They also indicate that they believe this issue is the cause of an existing vulnerability . A critical flaw that could allow a hacker to gain access to a device and thus run malware to encrypt files. Protecting our devices is essential and we recommend you see the complete guide to protect a QNAP NAS server .

Specifically, from QNAP they believe that it could be the CVE-2020-36195 vulnerability , one of the two (along with CVE-2020-2509) that was recently corrected. This makes it highly recommended to update QTS to the latest version. We already know that in many cases failures of this type arise and it is always advisable to keep equipment updated and correct them with patches.

However, users who have been affected will not be able to recover their files even if they update later. Of course, they are already working to find a solution, as we have mentioned. They look for a way for victims to access the content without having to pay the ransom.


Popular Posts