Updated July 17, 2019
Anomaly introduces a new type of ransom
Integrated Integrated Networking (NAS) from QNAP systems.
The ransomware, called eCh0raix after code,
was first seen in June, when a story about it began in a dream.
Computer sitting. This is rare now and for unknown reasons
Reason for developing NAS QNAP for Program Management, Threat Threat Group
I told SC Media. However, why is this NAS compatible?
Often these tools are used to store important data and files,
Anomaly says it could be a free target for ransom.
Anamali confirmed that there was nothing wrong with ensuring security
QNAP tools, but machines with weak bases can be dangerous.
Researchers say the player is in control of the threat.
A QNAP internet device will then harm the device with malicious programming
Password. The number of QNAP NAS drivers used is unknown.
ARM and. Researchers have identified a collection pattern
Intel x86, which gives you a feel at home and in business
The virus almost detects something that triggers communication
Disease is a well-known tool for early detection and vulnerability
Books read. Take a look at the efforts of the nine guns
Check if the files are encrypted and if not, the file extension will change
Use AS encryption to close the file.
Articles in the software are now being downloaded:
All your data is locked (encrypted).
How to enter passwords on this TOR site? Address]
Use the TOR browser to access union sites.
Do not delete this file Do not delete the last line of this file.
The recovery program code is very simple
It is written in 400 lines CO programming language.
Then say command control
192.99.20661: SG3 DQPPNR4SL5 Honey Server SOSSC 5Tor Proxy