A recently observed ransomware family is targeting Linux-based file storage systems (NAS servers) made by QNAP, Intezer’s security researchers reveal.
Dubbed QNAPCrypt, the threat targets said NAS servers in an attempt to encrypt files on them and hold them for ransom. Currently featuring a very low detection rate, the malware is likely the work of the authors of Linux.Rex.
Intezer has discovered both ARM and x86 variants of QNAPCrypt, as well as two design flaws in the ransomware infrastructure that allowed them to temporarily stop the campaign and force the authors into deploying new instances.
While the ransomware works similarly to other ransomware, the ransom note it delivers was included solely as a text file, without a message on the screen. The malware operators provide a different, unique Bitcoin wallet to each victim, which is fetched from the command and control server (C&C) before file encryption, along with a public RSA key.
While analyzing the malware, the security researchers discovered that the list of Bitcoin wallets was static, being created in advance, and that the ransomware would stop its malicious operation as soon as all of the wallets in the list are allocated.
The researchers simulated the infection of more than 1,091 victims from 15 different campaigns, which resulted in the attackers running out of unique Bitcoin wallets to supply to their victims. This forced the operators to update their implants to circumvent this design flaw, Intezer says.
A newer variant of the malware was released after several days, featuring a significant amount of code from previous QNAPCrypt instances and Linux.Rex. The new iteration has an embedded static wallet and RSA public key.
The initial attack vector, the researchers reveal, was found to be SSH brute force. The operators mainly target NAS server providers, which explains why they have chosen to label the malware QNAPCrypt.
The x86 variant of the ransomware was found to reuse a large portion of code from old instances of x86 Linux.Rex builds, a piece of malware known for deploying exploits against Drupal servers, to conduct ransomware and distributed denial of service (DDoS) operations.
“Unfortunately detection rates of QNAPCrypt are low, and the ransomware could create significant monetary losses and economic damage in comparison to other types of Linux threats,” Intezer concludes.

More from Ionut Arghire
- Nigerian BEC Scammer Sentenced to Prison in US
- China’s Nuclear Energy Sector Targeted in Cyberespionage Campaign
- 14 Million Records Stolen in Data Breach at Latitude Financial Services
- iOS Security Update Patches Exploited Vulnerability in Older iPhones
- Hackers Earn Over $1 Million at Pwn2Own Exploit Contest
- GoAnywhere Zero-Day Attack Hits Major Orgs
- Australia Dismantles BEC Group That Laundered $1.7 Million
- GitHub Rotates Publicly Exposed RSA SSH Private Key
Latest News
- Mandiant Catches Another North Korean Gov Hacker Group
- Microsoft Puts ChatGPT to Work on Automating Cybersecurity
- Video: How to Build Resilience Against Emerging Cyber Threats
- Nigerian BEC Scammer Sentenced to Prison in US
- China’s Nuclear Energy Sector Targeted in Cyberespionage Campaign
- SecurityScorecard Guarantees Accuracy of Its Security Ratings
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- 14 Million Records Stolen in Data Breach at Latitude Financial Services
