

/image%2F5653864%2F20201116%2Fob_3c7dc8_7zpasswordrecovery-2-0000001.jpg)
QNAP believes attackers are exploiting vulnerabilities In total decrypted around 50 keys worth $27k.Īt this point, there is no way to recover the files without a password, which can no longer be retrieved for free. I apologize if I was not able to get to yours before it was fixed. Update: it looks like this may have been fixed by the ransomware operators, unfortunately. Sadly, an hour after we learned of the bug, the ransomware operators caught on and fixed it. Last night, Cable had been privately helping people recover their passwords, and arrangements were being made with Emsisoft to create a help system to better exploit this weakness.

When they submitted the altered transaction ID into the Qlocker Tor site, it accepted it as payment and displayed the victim's 7zip password. Using this bug, victims could take a Bitcoin transaction ID from a person who had already paid and slightly alter it. Update 4/22/21 09:15 AM EST: Early this morning, BleepingComputer was contacted by security researcher Jack Cable about a bug he discovered in the Qlocker Tor site that allowed users to recover their 7zip passwords for free. This password is unique to the victim and cannot be used on other victims' devices. The password displayed after a ransom is paid
