»Ë»Ñ Æ÷·³
NAS, ÀÚÀÛ NAS, Ŭ¶ó¿ìµå, À¥ÇÏµå µî ³×Å©¿öÅ© ´ë¿ë·® ÀúÀå ÀåÄ¡¿Í °ü·ÃµÈ Á¤º¸¸¦ °øÀ¯ÇÏ´Â °ø°£ÀÔ´Ï´Ù.
qnap ³ª½º 7zip ·£¼¶¿þ¾î°¨¿° ¾ÏÈ£ ã´Â ¹æ¹ý °øÀ¯ÇØ º¾´Ï´Ù. 10
ºÐ·ù: Á¤º¸
À̸§: ²¿¸¶750


µî·ÏÀÏ: 2021-04-24 09:50
Á¶È¸¼ö: 2980





Àú´Â 22ÀÏ °¨¿°µÈ °ÍÀ» ¹ß°ßÇÏ¿© ÀÌ ¹æ¹ýÀ¸·Î 7zip¾ÏÈ£¸¦ ã¾Ò´Âµ¥ ¸ðµÎ°¡ ãÀ» ¼ö ÀÖ´Â °ÍÀº ¾Æ´Ñ °Í °°À¸´Ï Âü°íÇϽñ⠹ٶø´Ï´Ù. Ȥ½Ã³ª Áß¿äÇÑ ÆÄÀÏÀº °ÇÁú ¼öµµ ÀÖ¾î °øÀ¯Çغ¾´Ï´Ù.

 

°¡Á¤¿¡¼­ °³ÀοëÀ¸·Î qnap TS-431P»ç¿ë ÁßÀÔ´Ï´Ù.

±Ù¹«Áö¿¡¼­ 22ÀÏ ¾÷¹«¿¡ ÇÊ¿äÇÑ ÆÄÀÏÀ» ³ª½º¿¡¼­ ³»·Á¹Þ¾Ò´õ´Ï 7zipÀ¸·Î ÆÄÀÏÀÌ ¾ÐÃàµÇ¾î ÀÖ¾î ¹«¾ù°¡ ÀÌ»óÇÔÀ» °¨ÁöÇÏ¿´½À´Ï´Ù.

ÆÄÀϽºÅ×À̼ÇÀ¸·Î È®ÀÎÇØ º¸¾Ò´õ´Ï 20MBÀÌÇÏÀÇ ÆÄÀϵéÀÌ 7zipÀ¸·Î ¾ÐÃàµÇ¾î ¾Ïȣȭ µÇ¾îÀÖ¾ú½À´Ï´Ù.

¹ÙÀÌ·¯½º ½ºÄµ, MalwareRemover¸¦ ½ÇÇàÇصµ ¾Æ¹« °Íµµ ³ª¿ÀÁö ¾Ê¾Æ ±¸±Û¿¡¼­ Æødz°Ë»öÀ» ÇÑ ÈÄ¿¡ ·£¼¶¿þ¾î¿¡ °¨¿°µÈ °ÍÀ» ¾Ë°ÔµÇ¾ú½À´Ï´Ù.

¸ÇºØÀÌ ¿Í¼­ ±¸±Û ¹× ¿©·¯ °¡Áö °Ë»öÀ» ÇÏ¿© º¹±¸¸¦ ½ÃµµÇÏ¿´À¸³ª º¹±¸ÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀÌ ¾ø¾î ¾Æ·¡ ´º½ºÀÇ ´ñ±Û¿¡ ³ª¿Â ¹æ¹ýÀ» ½ÃµµÇÏ´ø Áß 7z.log ÆÄÀÏÀ» ã¾Æ ¿­¾îº¸´Ï ¾ÏÈ£¸¦ ãÀ» ¼ö ÀÖ¾ú½À´Ï´Ù.


 

https://www.bleepingcomputer.com/news/security/massive-qlocker-ransomware-attack-uses-7zip-to-encrypt-qnap-devices/

 

Åð±ÙÇÏ°í Áý¿¡¼­ Å͹̳ÎÁ¢¼ÓÀ» À§ÇÏ¿© qnap¿¡ À¥À¸·Î Á¢¼ÓÇÏ¿©

³×Æ®¿öÅ© ¹× °¡»ó ½ºÀ§Ä¡ telnet / SSH È°¼ºÈ­ ¹× Çã¿ë(¿ÜºÎ¿¡¼­ Á¢¼ÓÀ» ¹æÁöÇϱâ À§ÇÏ¿© Æ÷Æ®¹øÈ£´Â ´Ù¸¥ °ÍÀ¸·Î ¹Ù²Þ)ÇÑ ÈÄ

admin°èÁ¤ È°¼ºÈ­ÇÑ ÈÄ Å͹̳ΠÇÁ·Î±×·¥ PUTTY¸¦ ´Ù¿î¹Þ¾Æ ³ª½º¿¡ ÅÚ³Ý ¶Ç´Â SSH·Î Á¢¼Ó(»ç¿ë¹ýÀº Á¶±Ý¸¸ °Ë»öÇÏ¸é ³ª¿È)ÇÏ°í

admin°èÁ¤À¸·Î ·Î±×ÀÎÇÏ¿© /mnt/HDA_ROOT/7z.log ÆÄÀÏÀ» ã¾Æ¼­ ¾ÏÈ£¸¦ ¾Ë¾Æ³¾ ¼ö ÀÖ¾ú½À´Ï´Ù.

 

7z.log ÆÄÀÏ ¿­¾îº¸´Ï ¾Æ·¡ ³»¿ëÀÇ -p´ÙÀ½ ºÎºÐ(4wfwhNfbF9yIikdn7YxcKvrDKXXZTpNQ)ÀÌ 7zip¾ÏÈ£¿´½À´Ï´Ù.

 

 

 

a -mx=0 -sdel -p4wfwhNfbF9yIikdn7YxcKvrDKXXZTpNQ /share/.....ÀÌÇÏ »ý·«

 

 

 

À§¿¡ ´º½º¸µÅ© ´ñ±Û¿¡¼­ ÀÌ ¹æ¹ýÀ¸·Î ºñ¹Ð¹øÈ£¸¦ ãÀº »ç¶÷µµ ÀÖ°í ·Î±×ÆÄÀÏÀÌ ºñ¾îÀÖ´Ù°í ÇÏ´Â »ç¶÷µµ ÀÖÀ¸´Ï ¾Æ·¡ À¯Æ©ºê ¸µÅ©¸¦ º¸½Ã°í ½ÃµµÇغ¸½Ã±â ¹Ù¶ø´Ï´Ù. Àú´Â ¸®´ª½º ¸í·É¾î·Î qnapÆÄÀϽºÅ×À̼ÇÀ¸·Î Á¢¼ÓÇÒ ¼ö ÀÖ´Â Æú´õ·Î 7z.log¸¦ º¹»çÇؼ­ ÆÄÀϽºÅ×À̼ÇÀ¸·Î ¿­¾î¼­ È®ÀÎÇß½À´Ï´Ù.

 

https://youtu.be/aq_cIdY_ksQ

 

 

---- Ãß°¡ ----

 

±¸±Û¿¡¼­ °Ë»öÇغ¸´Ï ÀÌ¹Ì ¾Ïȣȭ°¡ ¿Ï·áµÇ¸é ÇØÄ¿µéÀÌ 7z.log¸¦ ÅëÇØ ¾ÏÈ£¸¦ ãÀ» ¼ö ÀÖ´Ù´Â °ÍÀ» ¾Ë°í ½ºÆ®¸³Æ®¸¦ ¼öÁ¤ÇÑ °Í °°´Ù´Â ³»¿ëµéÀÌ ÀÖ¾ú½À´Ï´Ù.

ºñÆ®ÄÚÀÎÀ» ÁÖ¾úÁö¸¸ À߸øµÈ ¾ÏÈ£¸¦ Á¦°øÇÏ¿© º¹¿øÇÒ ¼ö ¾ø¾ú´Ù´Â ³»¿ëµéµµ ´Ù¼ö º¸ÀÔ´Ï´Ù.

 

±×·±µ¥ ¾Æ·¡ ¸µÅ©ÀÇ ´ñ±Û Áß¿¡ Áö¿öÁø ÆÄÀÏÀ» º¹¿øÇÏ¿© 7z.log¿¡¼­ ¾ÏÈ£¸¦ ã¾Æ³»´Â ¹æ¹ýÀ» Æ÷½ºÆÃÇß½À´Ï´Ù. ¹æ¹ýÀÌ »ó´çÈ÷ ¾î·ÆÁö¸¸ ´É·ÂÀںеéÀº ½ÃµµÇغ¼¸¸ÇÑ °Í °°½À´Ï´Ù. Ȥ½Ã ¼º°øÇϽźÐÀº ´ñ±Û·Î ¾Ë·ÁÁֽøé ÁÁÀ» °Í °°½À´Ï´Ù.

 

Qlocker (QNAP NAS) Ransomware encrypting with extension .7z (!!!READ_ME.txt) - Page 22 - Ransomware Help & Tech Support (bleepingcomputer.com)

 

 

msolav, on 23 Apr 2021 - 12:33 AM, said:Quote snapback image

 

mai2vin, on 22 Apr 2021 - 11:55 PM, said:Quote snapback image

It is working fine. The perpetrator has archived the files to 7z. So the source file is deleted and will be compressed to the 7z archive. Because of that, the tool has the possibility to restore the files from the sectors.
Here you can see my progress. The files and pictures are there without any problems.

 

https://imgur.com/oSqmfyl

 

mai2vin, this could save a lot of people if it can be a method everyone is able to apply.

Could you explain how you specifically achieved this? I'm a bit stuck at:

1. mounting the network as a local disk

2. using TestDisk to actually scan the specific .7z files (or any other method to retrieve the lost data).

 

 

My Steps:

 

FIRST: NO WRITING/CHANGE/DELETE/CRTEATE FILES AFTER ENCRYPTION ATTACK

 

 

 

MAKE SURE THE NAS IS NOT AVAILABLE IN THE INTERNET, DELETE ALL EXPOSED HOST RULES ON YOUR ROUTER

 

The files are deleted after archiving and encrypting with 7z and exists in the not allocated space of your disk.

You need to have access the ssh terminal of your QNAP NAS (you can activate it over the GUI it doesn't change your data)

 

1. Create a samba share on your windows computer (yes it should be work on linux or macOS but I didn't tried it)

HowTo: https://pureinfotech.com/setup-network-file-sharing-windows-10/

You should use your Windows Account with a password (if your account haven't one, create it. You can delete it after recovering)

 

2. Login over SSH (Putty on Widows) on your NAS. You should use ypur admin credentials to login.

 

3. After Login you get an screen with some option. You didn't need it ant press only 'Q'. (Confirm it with 'Y') You should get a shell.

 

4. Connect to your samba share:

mkdir /mnt/rescue-share
sudo mount -t  cifs -o user=<USERNAMEOFREMOTECOMPUTER>//XXX.XXX.XXX.XXX/<NAMEOFYOURSHARE> /mnt/rescue-share
cd /mnt/rescue-share

5. look for your architecture (uname -a) for i386 or x86_64

Linux NAS-XXXX 4.14.24-qnap #1 SMP Tue Mar 2 06:10:10 CST 2021 x86_64 GNU/Linux

6. Download testdisk

i386: wget https://www.cgsecurity.org/testdisk-7.2-WIP.linux26.tar.bz2 -O testdisk.tar.bz2
x86_64: wget https://www.cgsecurity.org/testdisk-7.2-WIP.linux26-x86_64.tar.bz2 -O testdisk.tar.bz2

7. Untar testdisk, go to the directory and change the permissions of the executable

tar -xvf testdisk.tar.bz2
cd testdisk*
chmod +x ./photorec_static

8. Search for your volume. At me it was '/dev/mapper/cachedev1' (You can use df -h for it) and note it

FilesystemSizeUsedAvailableUse%Mounted on
none                    300.0M272.7M27.3M91%/
devtmpfs                938.4M8.0K938.4M0%/dev
tmpfs                    64.0M3.1M60.9M5%/tmp
tmpfs                   949.7M156.0K949.6M0%/dev/shm
tmpfs                    16.0M016.0M0%/share
/dev/mmcblk0p5            7.7M46.0K7.7M1%/mnt/boot_config
tmpfs                    16.0M016.0M0%/mnt/snapshot/export/dev/md9                493.5M140.1M353.4M28%/mnt/HDA_ROOT
cgroup_root             949.7M0949.7M0%/sys/fs/cgroup
/dev/mapper/cachedev1
                        898.3G573.5G324.3G64%/share/CACHEDEV1_DATA
/dev/md13               417.0M387.7M29.3M93%/mnt/ext
tmpfs                    48.0M72.0K47.9M0%/share/CACHEDEV1_DATA/.samba/lock/msg.lock
tmpfs                    16.0M016.0M0%/mnt/ext/opt/samba/private/msg.sock
//XXX.XXX.XXX.XXX/share1.8T104.7G1.7T6%/mnt/samba_spar_abo_share

9. open photorec_static with 'sudo ./photorec_static'
 

10. choose the /dev/mapper/cachedev1 disk (it should be the disk from step 8)

11. choose the ext2/3/4 partition

12. choose ext2/ext3 option
13. choose FREE option

14. chosse the directory you want on the share (if you follow exactly the steps, you only need to select once '..' and after it press c)

 

15. wait and the files would be recover in folders named 'recup_dir.X' on the share

 

16. sort the results (HAVE FUN xD)

 

Big thanks to the guys of received.eu and Tobias Vorwachs (https://twitter.com/tobias_vorwachs) for the help!

 

ÃßõÇϱâ0 ´Ù¸¥ÀÇ°ß0

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 vitive
2021-04-24 Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 Àº°æÀ̳²Ç¦
2021-04-24 Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 ²¿¸¶750
2021-04-25 Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 ±×ÆÄ::
2021-04-24 Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 »çÇʱÍÁ¤
2021-04-25 * Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 ³¡±îÁö»ÌÀÚ
2021-04-25 Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 Àº°æÀ̳²Ç¦
2021-04-25 Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 ±×ÆÄ::
2021-04-25 Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 Ã÷Ä«»ç1111
2021-04-27 * Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç

´Ù¸¥ÀÇ°ß 0 Ãßõ 0 88²Þ³ª¹«
2021-05-28 * Á¡¾ÆÀÌÄÜ
  1. ´ñ±ÛÁÖ¼Òº¹»ç
  • ¾Ë¸² ¿å¼³, »óó ÁÙ ¼ö ÀÖ´Â ¾ÇÇÃÀº »ï°¡ÁÖ¼¼¿ä.
©¹æ »çÁø  
¡â ÀÌÀü±Û¡ä ´ÙÀ½±Û -¸ñ·Ïº¸±â