fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Qlocker Ransomware Shuts Down After Extorting Hundreds of QNAP Users

Qlocker Ransomware Shuts Down After Extorting Hundreds of QNAP Users

The Qlocker ransomware gang has shut down their operation after earning $350,000 in a month by exploiting vulnerabilities in QNAP NAS devices.

Starting on April 19th, QNAP NAS device owners worldwide suddenly discovered that their device’s files were replaced by password-protected 7-zip archives.

In addition to the encrypted files, QNAP owners found a !!!READ_ME.txt ransom note explaining that their files were encrypted and needed to visit a Tor site to pay a ransom to get their files back.

Qlocker ransom note
Qlocker ransom note

The Tor site identified the attackers as Qlocker and demanded .01 bitcoins, or approximately $550, to receive the password for their files.

Later, it was determined that threat actors conducted the attacks through recently disclosed QNAP vulnerabilities that allowed threat actors to encrypt victims’ files using the built-in 7-zip application remotely.

Also Read: The DNC Singapore: Looking at 2 Sides Better

Using such a simple approach allowed them to encrypt over a thousand, if not thousands, of devices in just a month.

Qlocker operation shuts down

As a possible sign of their impending shutdown, the Qlocker Tor sites began displaying a message stating that “This site will be closed soon.”

Qlocker Tor site indicating it will shut down soon

More recently, the Qlocker gang began a bait-and-switch tactic when it came to ransom payments.

Victims reported that after paying the demanded .01 bitcoins and submitting the transaction ID on the Qlocker Tor site, the site would state that they needed to pay an additional .02 bitcoins to get their files back.

“Bitcoin is getting harder to find, time waits for nothing. The new price is 0.03,” the Qlocker Tor site would display during their bait-and-switch.

Eventually, the above site shut down, but another Qlocker Tor site appeared a day or so later.

Today, in BleepingComputer tests and victim’s reports in our Qlocker support topic, all of the Qlocker Tor sites are no longer accessible, and victims no longer have a way to pay the ransom.

Since the DarkSide ransomware attack on Colonial Pipeline and the subsequent intensifying of pressure by US law enforcement, the DarkSide ransomware shut down, and REvil has begun to restrict their targets.

Since then, other ransomware operations’ Tor sites have gone offline, including those for Ako/Ranzy and Everest.

It is not clear if the shutdown of the Qlocker sites is related to fear of increased law enforcement activity.

Also Read: 4 Best Practices On How To Use SkillsFuture Credit

Following the money

Instead of demanding millions of dollars to recover files, the threat actors priced their ransom demands at only $500, which led to many businesses paying the ransom to recover their files.

As the Qlocker ransomware operation used a fixed set of Bitcoin addresses that victims were rotated through, it has been possible to track how many bitcoins they received in ransom payments.

Out of the twenty-two Qlocker Bitcoin addresses known by BleepingComputer, victims paid a total of 8.93258497 bitcoins in ransomware. Today that is worth $353,708, but before this week’s Bitcoin crash, those same bitcoins would be worth almost $450,000.

Bitcoin AddressTotal Bitcoin payments
34vbPQLgGZwKG2FikitGU6QR7K25aB6Shh0.73258748
37m57HiP5rPceopgEWF9sM58CkzaDFYtaU0.29021317
3Ekwztte7oWR1odC1eKeL2Va4cpBuGXPgU0.28990667
3EPBKN3bcax81U3MdKYUhMC1fzFEFGPC6E0.27850668
3EvCKQ38y8ePUwM4w49XWVtAK7KhYbmeMH0.45781656
3FvLioiqF2TrQgZ9zRMdd7QUfc2hTjKZfL0.19945862
3FXVLv8TmcHNmnfwLfc5g7f2a32xp3XugW0.59099550
3G6fbWX6At9uRzKf6kwS6R6pn5EQ8UsxKY0.32033215
3GfAJxhUen3oqb4sDDnPmXyhs5mDboHbyG0.57134513
3JRdPjB8U3nfDqQHzTqw9yYra49Gsd8Rar0.57093368
3KmK5z4CAvn3aL4Q8F2gWbhuPRy9ZmEurN0.48956001
3Kywg92E877KUWmyaeeLNSXFc5bqBvFbAm0.62479830
3LLzycFNFh7mDsqRhfknfGBa6TKq6HcfwS0.42901320
3Lp1NkJHYsmFRBfM3ggoWsS1PF5hXxrwrD0.50386846
3PDfzkTnD1E7gB7peZ2prRyDxjQ1BhqcV10.32164647
3PunvFGpVWLX7PNAoT3bMDbPQU2QQW4kxN0.26000332
3Q8WmjQyFs1EKCdu415t2P9cxY7AbqorPd0.58281373
3EWRngsRDhCxMHtKxeK6k9kX3pyWZSA2YB0.29090963
3Gwz3yVmrGr5AqmUrAS8H2QQaPz2v9Rhpx0.27875489
3JtUAz4aKUrjcBK47ocdv52tTJkriat1nx0.25999912
3NtgDQCu7xck4UEpyTf8HNSSvrMCnKZRjt0.28975298
3DhE1iZ5Ui6HALVKuuYXW52ArZPVJjUgJA0.29936922

If we divide the number of Bitcoins earned by the ransom payment of .01 bitcoins, we come out to approximately 893 victims who have paid the ransom.

This amount of ransoms and victims might be larger if Qlocker used other bitcoin addresses.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us