{"id":96721,"date":"2019-07-16T20:44:20","date_gmt":"2019-07-16T20:44:20","guid":{"rendered":"https:\/\/www.sickgaming.net\/blog\/2019\/07\/16\/a-new-ransomware-targeting-linux-based-nas-devices\/"},"modified":"2019-07-16T20:44:20","modified_gmt":"2019-07-16T20:44:20","slug":"a-new-ransomware-targeting-linux-based-nas-devices","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2019\/07\/16\/a-new-ransomware-targeting-linux-based-nas-devices\/","title":{"rendered":"A new ransomware targeting Linux-based (NAS) devices"},"content":{"rendered":"<div class=\"lcom-stacked__main\">\n<div class=\"panel-pane pane-entity-field pane-node-body\">\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>A new ransomware family has been found targeting Linux-based Network Attached Storage (NAS) devices made by Taiwan-based QNAP Systems and holding users&#8217; important data hostage until a ransom is paid. Dubbed &#8220;QNAPCrypt&#8221; by Intezer and &#8220;eCh0raix&#8221; by Anomali, the new ransomware is written in the Go programming language and encrypts files with targeted extensions using AES encryption and appends .encrypt extension to each.<br \/>Source: <a href=\"https:\/\/thehackernews.com\/2019\/07\/ransomware-nas-devices.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Hacker News<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.linux.com\/popup\/nojs\" class=\"ctools-use-modal ctools-modal-subscription-modal-style element-invisible\" title>Click Here!<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new ransomware family has been found targeting Linux-based Network Attached Storage (NAS) devices made by Taiwan-based QNAP Systems and holding users&#8217; important data hostage until a ransom is paid. Dubbed &#8220;QNAPCrypt&#8221; by Intezer and &#8220;eCh0raix&#8221; by Anomali, the new ransomware is written in the Go programming language and encrypts files with targeted extensions using [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[],"class_list":["post-96721","post","type-post","status-publish","format-standard","hentry","category-linux-freebsd-unix"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/96721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=96721"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/96721\/revisions"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=96721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=96721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=96721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}