Heimdal Security Blog

New eCh0raix Ransomware Version: Synology and QNAP Devices Impacted

Researchers have discovered a new eCh0raix ransomware version. If this type of malware is well-known for targeting QNAP (Quality Network Appliance Provider) and Synology NAS (network-attached storage) devices in the past, treating them separately in different campaigns, now this threat takes advantage of these at once, in the same malicious campaign.

Characteristics of the New eCh0raix Ransomware Version

According to the report Palo Alto Networks’ Unit 42 researchers wrote, the new eCh0raix ransomware version acts like this:

Mitigation Measures Proposed by the Specialists

In the same report, there are stated some mitigation measures against this new version of eCh0raix ransomware. Owners who possess these kinds of devices are recommended to follow the below measures:

We’re releasing our findings about this new variant of eCh0raix to raise awareness of the ongoing threats to the SOHO and small business sectors. (…) SOHO users are attractive to ransomware operators looking to attack bigger targets because attackers can potentially use SOHO NAS devices as a stepping stone in supply chain attacks on large enterprises that can generate huge ransoms. Additionally, SOHO users typically do not employ dedicated IT or security professionals, which makes them less prepared to block ransomware attacks than larger organizations.

Source

A Little Bit of Background

According to BleepingComputer publication, the threat of eCh0raix ransomware is not actually new.

The malware first made its appearance in 2016 and victims knew it as QNAPCrypt. Then QNAP NAS devices continued to pose as targets for these ransomware attacks, with two major hits in June 2019 and then one year apart, in June 2020. In 2019, Synology devices were also impacted, being encrypted by the malware when experts from Anomali said that the methods hackers used were to brute force credentials by means of default ones or dictionary attacks.

Customers were also warned by QNAP corporation about eCh0raix ransomware attacks in May that we also wrote about at that time, when threat actors used guessed credentials to perform data theft.

What is interesting is that a security advisory was made public last week by Synology regarding a new threat called StealthWorker botnet. Its attack methods were also based on brute-forcing tactics and ransomware infections, though it was not linked to eCh0raix ransomware.

A malicious campaign in the middle of April, known as the Qlocker ransomware campaign, managed to gather $350,000  from QNAP Nas devices users following massive data encryption by making use of a 7zip archive that was password protected.

Its activity with the new version began in September 2020 when it started to encrypt both QNAP and Synology NAS devices by combining functions.

Before then, the attackers likely had separate codebases for campaigns targeting devices from each of the vendors.

Source

Researchers mentioned in their report that 250 000 NAS devices were affected.

If you want to find more about brute force attacks targeting Synology devices and what mitigation measures are the best against these threats, please take a look at our CEO’s word on the matter where he illustrates a personal example of this kind of cyberattack.