Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
QNAPCrypt is a recently discovered ransomware family targeting Linux-based file storage systems (NAS servers). The code overlap between the old samples and this recent YARA hit is minimal. However, the overall functionality of the sample, the naming of the functions, the use of the Go programming language, and geolocation filtering being applied provided resulted in the researchers determining this sample to be a QNAPCrypt variant. Along with tying this sample to the same ransomware family, they have also attributed the campaigns to the same threat actor, which they have named FullofDeep and classified as a Russian cybercrime group. One of the key changes in the operation of this ransomware is that a Bitcoin wallet address is no longer provided in the body of the ransom note. Instead, a victim must contact a provided email address for further instructions regarding the payment amount and recipient.
File encryption
Malware Hash (MD5/SHA1/SH256)
50470f94e7d65b50bf00d7416a9634d9e4141c5109a78f5769e4204906ab5f0b