Qlocker Ransomware

Hackers behind Qlocker Ransomware made $260,000 in 5 days!! To your surprise, this was just earned by simply remotely encrypting files on QNAP devices using the 7zip archive program.

When did the attack happen?

On Monday, the QNAP NAS users worldwide suddenly found their files encrypted after a ransomware operation called Qlocker exploited vulnerabilities on their devices.

What was Qlocker’s key?

The Qlocker gang has examined all the QNAP devices connected to the Internet and misused them using the recently disclosed vulnerabilities. These activities allowed the threat actors to remotely execute the 7zip archival utility to password protect all the files on the victim’s NAS storage devices.

This is the most straightforward and easy approach followed to encrypt thousands of files! That too to return so much of money.

The price demanded on the ransom attack:

The regular payment ranges from $100,000 to $50 million to decrypt all of a victim’s devices and not leak their stolen data. But, Qlocker has consumers and small-to-medium business owners utilizing QNAP NAS devices for network storage. So, due to the larger audience, the threat actors knew their targets well as they priced their ransom demands at only 0.01 Bitcoins, or at today’s Bitcoin prices, approximately $500.

Qlocker Ransomware
Qlocker Ransomware

Paying $500 can be seen as a small price to pay to recover important files, no matter how violated a victim may feel. Qlocker made almost $260,000 in these five days this way!

The 20 bitcoin addresses, shown below, have received ransom payments totalling 5.25735623 Bitcoins. This amount is equivalent to approximately $258,494.

Bitcoin AddressTotal Bitcoin payments
34vbPQLgGZwKG2FikitGU6QR7K25aB6Shh0.5521622
37m57HiP5rPceopgEWF9sM58CkzaDFYtaU0.14021317
3Ekwztte7oWR1odC1eKeL2Va4cpBuGXPgU0.09962125
3EPBKN3bcax81U3MdKYUhMC1fzFEFGPC6E0.10915462
3EvCKQ38y8ePUwM4w49XWVtAK7KhYbmeMH0.34801656
3FvLioiqF2TrQgZ9zRMdd7QUfc2hTjKZfL0.08951304
3FXVLv8TmcHNmnfwLfc5g7f2a32xp3XugW0.38088464
3G6fbWX6At9uRzKf6kwS6R6pn5EQ8UsxKY0.16983215
3GfAJxhUen3oqb4sDDnPmXyhs5mDboHbyG0.46134513
3JRdPjB8U3nfDqQHzTqw9yYra49Gsd8Rar0.40133268
3KmK5z4CAvn3aL4Q8F2gWbhuPRy9ZmEurN0.29910901
3Kywg92E877KUWmyaeeLNSXFc5bqBvFbAm0.48277236
3LLzycFNFh7mDsqRhfknfGBa6TKq6HcfwS0.3190132
3Lp1NkJHYsmFRBfM3ggoWsS1PF5hXxrwrD0.32386846
3PDfzkTnD1E7gB7peZ2prRyDxjQ1BhqcV10.1402
3PunvFGpVWLX7PNAoT3bMDbPQU2QQW4kxN0.15954
3Q8WmjQyFs1EKCdu415t2P9cxY7AbqorPd0.40031185
3EWRngsRDhCxMHtKxeK6k9kX3pyWZSA2YB0.13081244
3Gwz3yVmrGr5AqmUrAS8H2QQaPz2v9Rhpx0.15965435
3JtUAz4aKUrjcBK47ocdv52tTJkriat1nx0.08999912

This ransomware campaign is an ongoing progress, where we see new victims every day. It is crucial here that all QNAP users must update the latest versions of the Multimedia Console, Media Streaming Add-on, and Hybrid Backup Sync apps to fix the vulnerabilities and protect against these ransomware attacks. It is not just about the money, it is also about the morals, ethics, and values behind this!.

You can follow us on LinkedinTwitterFacebook for daily Cyber security and hacking news updates.

Guru Baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.