
It might be if the malicious program has bugs (flaws) and/or is still in development. In most ransomware attacks, without the cyber criminals' interference, decrypting or unlocking the compromised files - is impossible. When the ransom is paid, victims are to enter the transaction ID to the site and submit it.įollowing payment, the page promises that victims will receive the password. Therein it is stated that the price of the data-recovering password is 0.01 BTC (Bitcoin cryptocurrency).Īt the current exchange rate, the sum is worth nearly 500 USD (note, the conversion may be inaccurate due to exchange rate fluctuation). To enter the page, victims must provide the "Client Key" assigned to them.Īfter this is done, a different webpage is displayed. The size of the ransom is not mentioned in the note, yet it is stated that it will have to be paid in Bitcoin cryptocurrency.įor more information, victims are instructed to use the Tor browser (or download/install it if they do not have it) and visit the website linked in the message. In other words, to unlock the password-protected archives (which contain their files) - victims have to pay. To recover the data, a decryption key must be purchased for the cyber criminals. The ransom-demanding message (" !!!READ_ME.txt") states that victims' files have been encrypted. Screenshot of files encrypted (archived) by Qlocker (". Once the data is locked, the ransomware drops ransom notes - " !!!READ_ME.txt" into affected folders.

7z" extension.Īt the time of research, Qlocker targeted QNAP brand Network-attached storage (NAS) devices exclusively. The original extensions of compromised files are changed to the ". In case of Qlocker, it affects victims' files by storing them in password-protected 7zip archives.

Malware within this classification operates by rendering data inaccessible (primarily by encrypting it) and demands ransoms for access recovery. Qlocker is a ransomware-type malicious program.
