Monday, December 30, 2024
HomeComputer Security‘NamPoHyu Virus’ Ransomware Targets Samba Servers and Encrypt Files Remotely

‘NamPoHyu Virus’ Ransomware Targets Samba Servers and Encrypt Files Remotely

Published on

SIEM as a Service

New ransomware spotted NamPoHyu Virus or MegaLocker virus targeting the remote samba servers in a unique way.

The common way of delivering ransomware is through email attachments or by compromising the victim’s network and ransomware infection are installed on the computer that to be encrypted.

The new variant searches for the samba servers that are accessible online, brute force them and then remotely encrypt the files.

- Advertisement - SIEM as a Service

The MegaLocker virus was first found in March 2019 on NAS devices, it uses to encrypt the files and append a .crypted extension to encrypted files.

Starting from this April 2019, it has been changed to NamPoHyu Virus it uses to encrypt the files and append.NamPoHyu extension to encrypted files.

It encrypts the file’s in the system and asks to make ransom payment through Tor site, for personal victims $250 and $1,000 USD in bitcoins for companies.

According to Shodan results more than 500,000 Samba servers are available remotely if the infection gain access to all the servers then it could be a massive one.

Ransomware is the fast-growing threat and it is considered as a leader of Global cyber attack in recent days. It encrypts all the system files and asks for ransom payments to unlock it.

Here you can find the Ransomware Attack Response and Mitigation Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New 7-Zip 0-Day Exploit Leaked That Allow Attackers Control Victim Devices Remotely

A previously unknown zero-day vulnerability in the popular file compression tool 7-Zip has been...

PoC Exploited Released for Oracle Weblogic Server Vulnerability

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for...

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft has issued a warning about a significant issue impacting devices running Windows 11,...

Four-Faith Industrial Routers Vulnerability Exploited in the Wild to Gain Remote Access

A significant post-authentication vulnerability affecting Four-Faith industrial routers has been actively exploited in the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New 7-Zip 0-Day Exploit Leaked That Allow Attackers Control Victim Devices Remotely

A previously unknown zero-day vulnerability in the popular file compression tool 7-Zip has been...

PoC Exploited Released for Oracle Weblogic Server Vulnerability

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for...

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft has issued a warning about a significant issue impacting devices running Windows 11,...