ech0raix

Chris Swagler | August 23rd, 2021

 

According to BleepingComputer, eCh0raix, the recently discovered ransomware variant, is now encrypting both QNAP and Synology Network-Attached Storage (NAS) devices.

In June 2016 when the ransomware variant, also known as QNAPCrypt, first appeared, the BleepingComputer forum topic began receiving reports of the ransomware attacks from numerous victims.

Details of the eCh0raix Attacks

In 2019, researchers discovered that the eCh0raix attackers used default credentials or dictionary attacks to brute-force administrator credentials and encrypt the Synology devices. Customers were warned by the NAS developer to keep their data secured from large-scale ransomware attacks.

 In past ransomware attacks, eCh0raix targeted both QNAP and Synology devices separately. However, according to security researchers, in September 2020, eCh0raix started encrypting both NAS families by combining functionality.

The attackers exploited CVE-2021-28799 (a vulnerability that allowed attackers access to hard-coded credentials, or a backdoor account) to encrypt QNAP devices.

By guessing commonly used administrative credentials, eCh0raix threat actors brute-forced their way into the Synology NAS devices to deliver the ransomware payloads.

With new ransomware variants obtaining the functionality to target multiple devices like the QNAP and Synology NAS at the same time, staying current with new threats is crucial in protecting the company’s network or devices. With SpearTip’s 24/7 Security Operations Center as a Service, our certified engineers are constantly monitoring your network or storage devices for potential ransomware threats.

With our engineer’s intelligence combined with the ShadowSpear platform, our efficient endpoint detection and response tool, you have a dedicated team that will detect threats early and block ransomware threats in their tracks.

If your company is experiencing a breach, call our Security Operations Center at 833.997.7327 to speak directly with an engineer.

Categories

Connect With Us

Featured Articles

Incident Response Planning
Incident Response Planning: Why It's Important
17 May 2024
Ransomware Experiments
Ransomware Experiments on Developing Countries
15 May 2024
Credential Stuffing Attacks
Credential Stuffing Attacks Using TOR: Okta Warning
13 May 2024
Cybersecurity Gap
Close Cybersecurity Gaps through Analysis and Architecture Review
10 May 2024

See ShadowSpear in Action

Identify, neutralize, and counter cyberattacks - provide confidence in your security posture

Stay Connected With SpearTip

Inside the SOC Newsletter

View our articles that cover trending topics in cybersecurity with insights from our 24/7/365 Security Operations Center.

ShadowSpear Platform

Cybersecurity actors are working around the clock, shouldn’t your security team be too? Technology solutions and security controls fail for a number of reasons, poor deployment, improper implementation, or just no one monitoring the alerts.

ShadowSpear Demo

Experience ShadowSpear for yourself. Our lightweight, integrated solution will help you sleep easier at night and provide immediate confidence in your security posture.