Feeds

SynoLocker Trojan crime gang: We QUIT this gig

Hold 'closing down sale' as they hotfoot it to ... island?

Internet Security Threat Report 2014

A ransomware Trojan gang appears to be moving on, and has offered to sell its remaining decryption keys in bulk for 200 BTC ($103,000, £61,500).

Cybercrooks behind the recent SynoLocker Trojan – which targets the network attached storage devices manufactured by Synology – have apparently decided to cash out on their ill-gotten gains. The ransomware encrypted users' files before demanding a payment for a private key necessary to unscramble them.

The process, akin to a bank selling off bad debt in the world of legitimate business, was discovered by security researchers at F-Secure.

"The website where victims are instructed to go to for payment instructions, has been updated," explains F-Secure research intern Artturi Lehtiö in a blog post.

"The page now includes the notice 'This website is closing soon...' The operator(s) also claim that they are still in possession of over 5,500 private keys but that they are willing to sell the entire collection for 200 Bitcoins."

Scam 'closing down' sale

Regular victims are been given around seven days to pay up. Reflecting the professionalism of the operation, victims who have lost their identifiers can still be "helped" providing they contact the racket's support staff via Bitmessage, an encrypted, peer-to-peer communications protocol.

Of course, there's nothing to stop the scammers continuing in business beyond their self-imposed deadline. "Whether the operator(s) follow through with their plans and what that might entail for victims will remain to be seen," F-Secure's Lehtiö concludes.

SynoLocker is comparable to the infamous CryptoLocker ransomware inasmuch as it encrypts files and then demands a ransom to unlock them.

Before a recent FBI-led take-down operation, CryptoLocker mainly spread as a secondary infection to machines compromised by the Gameover ZeuS banking Trojan.

SynoLocker, by contrast, relies on hard-coded passwords and insecure configurations that involve exposing the admin page of NAS boxes that create a means for hackers to plant malware on vulnerable devices. ®

Internet Security Threat Report 2014

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.