DeadBolt Ransomware Targets the Network-Attached Storage Devices Made by QNAP and How to Remove DeadBolt Ransomware from a Computer/Network Device.
Computer Infected with Malware? Detect & Remove Malware for FREE with SpyHunter!
Visit [ Ссылка ] to download your FREE SpyHunter today!
Watch more #thisweekinmalware episodes:
TWIM Full Episode 91: [ Ссылка ]
TWIM Episode 91 Part 2: [ Ссылка ]
TWIM Episode 91 Part 3: [ Ссылка ]
Learn more about...
How to Remove DeadBolt Ransomware - [ Ссылка ]
A ransomware gang known as #DeadBolt has begun to target Network-Attached Storage or NAS devices manufactured by QNAP, the Taiwanese corporation specializing in NAS devices used for file sharing, virtualization, storage, and surveillance apps. Specifically, Deadbolt is using a zero-day vulnerability in the devices. The attacks were first discovered in late January 2022. As a result of the attacks, users' files stored on QNAP devices are rendered inaccessible. Those files are appended with the telltale '.deadbolt' extension, which is the basis for the ransomware's name.
The DeadBolt Ransomware gang does not use a traditional ransom note, opting instead to hijack the login page for the QNAP device. When victims attempt to log in, they are greeted with a new screen displaying the DeadBolt's ransom demand. The ransom was set at 0.03 Bitcoin or approximately $1,100 as of early 2022. The DeadBolt hackers do not leave an email in the ransom note. They choose to communicate solely through Bitcoin transactions made to a unique wallet address provided to each of their victims.
![](https://i.ytimg.com/vi/LRHx933i9Z4/maxresdefault.jpg)