Expert Insights
White Rabbit Ransomware
White Rabbit ransomware emerged in December 2021, carrying out an attack on a local bank in the United States. Like many ransomware groups, White Rabbit uses double extortion to pressure its victims into paying the ransom. Double extortion consists of blocking access to files through encryption and extracting sensitive company files that will be leaked if the company does not pay the
QNAP NAS Attacked by Ransomware
QNAP NAS is a device developed by QNAP Systems, which is a Taiwanese corporation specializing in developing network attached storage devices such as NAS. NAS can be directly connected to network users, in most cases a NAS consists of several hard drives organized as a RAID system. This type of device is perfect for businesses that have a high data
DemonWare Ransomware
The DemonWare ransomware has applied an extremely dangerous strategy for businesses, employee grooming. The groups have sent numerous emails to employees of large companies in order for them to become partners and install the ransomware. While this tactic is very dangerous, since any access that a disgruntled employee provides renders all the protection that the company has developed to prevent attacks from
Ransomware QNAPCrypt
The QNAPCrypt ransomware is a direct evolution of the eCh0raix ransomware. eCh0raix was known for making targeted attacks on QNAP and Synology NAS devices. After numerous successful attacks the group ceased attacks and later appeared as QNAPCrypt. Unlike eCh0raix, QNAPCrypt has focused its attention exclusively on QNAP NAS, as its name already alludes to. For the vast majority of the
Ransomware DeadBolt
The DeadBolt ransomware has recently emerged and is making numerous attacks, which are targeted at QNAP NAS devices. In its first month, the group has made attacks on at least 15 companies. DeadBolt is yet another ransomware group that primarily targets QNAP NAS devices. QNAP itself issued a warning about the DeadBolt ransomware attacks, instructing its customers not to connect
Ransomware Zeznzo
Zenzno has carried out numerous attacks, the main means he uses to infect the victim’s system are fake software, software crack tools, spam emails and Trojan horses. The attached files in the spam mails sent by the group look regular, most use extensions such as Word, Excel, .ZIP, .RAR, .RUN, .EXE, PDF, the most common ones to avoid suspicion. After