SynoLocker ransomware gives 5500 victims deadline
The criminals behind the SynoLocker ransomware, which secretly encrypt data on a Synology NAS, have imposed a time limit on 5,500 victims. They still have a few days to transfer bitcoins in exchange for the decryption key.
A countdown clock is currently displayed on the website on which a key can be ‘purchased’ for 0.6 bitcoin, converted approximately 260 euros. Victims of the ransomware would only have a few days to pay, reports the Finnish F-Secure.
The SynoLocker creators state that 5,500 keys have not yet been purchased by victims of the malware. They also threaten to sell the remaining keys. For this, the criminals ask 200 bitcoins, converted almost 77,100 euros. After the passage of time, the website would disappear. Furthermore, the criminals claim that all databases containing rsa encryption keys will be erased.
It is still unclear how the ransomware, which is very similar to the older CryptoLocker, was able to infect Synology’s NAS systems. It is known that DSM 5.0 and DSM 3.x are not vulnerable, and several DSM 4.x versions contain a vulnerability if a DSM update from December 2013 is not installed. Synology has since released several updates to DSM 4.x to close the gap.