• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

‘NamPoHyu Virus’ ransomware target vulnerable Samba servers

5451

There is a new ransomware that haunts the vulnerable Samba servers and it is called ‘NamPoHyu Virus'.

The ransomware is directly launched on the Samba servers by brute forcing the passwords, a move which is unusual from running executables on a victim’s computer

It was once called MegaLocker Virus and now it remotely encrypts the files and then leaves a ransom note.

Shodan, the search engine, has found some 500,000 accessible Samba servers across the globe. This indicates that this ransomware infection can be massive if the attackers gain access to these vulnerable Samba servers.

The ransomware was first identified in March 2019 after users complained that their NAS storage devices were suddenly encrypted by new ransomware called MegaLocker virus.

After the encryption is completed it leaves those encrypted files with .crypted extension and thereby leaving the ransom note named !DECRYPT_INSTRUCTION.TXT.

The ransom note contains instructions to contact alexshkipper@mail[.]ru. The note asks the prospective victim to send a photo from birthday, holiday, hobbies or some other personal event. If the victim is a single user, then the ransom amount stands at $250 otherwise it would be $1000 for companies.

According to Bleeping Computer, its name was changed to the current 'NamPoHyu Virus' since April 2019.

Tags:
connor
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related Forums in ‘NamPoHyu Virus’ ransomware target vulnerable Samba servers

Related Forums in ‘NamPoHyu Virus’ ransomware target vulnerable Samba servers

Scam (Ransomware)
jayden class=
Will ransome virus will affect linux server
May 16, 2017

Related News in ‘NamPoHyu Virus’ ransomware target vulnerable Samba servers

Related News in ‘NamPoHyu Virus’ ransomware target vulnerable Samba servers

CryptoMix Clop Ransomware Variant Targets Not Individual Machines But Whole Networks
CryptoMix Clop Ransomware Variant Targets Not Individual Machines But Whole Networks
Mar 12, 2019
ECh0raix Ransomware Strain QNAP NAS devices
ECh0raix Ransomware Strain QNAP NAS devices
Jul 30, 2019
'The Nasty List' Instagram Phishing Scam Targets Instagram Credentials
'The Nasty List' Instagram Phishing Scam Targets Instagram Credentials
Apr 19, 2019
NIST Develops Guidelines For Dealing With Ransomware Recovery
NIST Develops Guidelines For Dealing With Ransomware Recovery
Sep 8, 2017
‘NamPoHyu Virus’ ransomware target vulnerable Samba servers
‘NamPoHyu Virus’ ransomware target vulnerable Samba servers
Apr 20, 2019
A Sneaky Ransomware That Seems Benificial. But Deceptive.
A Sneaky Ransomware That Seems Benificial. But Deceptive.
Apr 5, 2019
CrySIS ransomware targeting businesses is on the rise
CrySIS ransomware targeting businesses is on the rise
May 28, 2019
Wannacry attack is far from over – Experts
Wannacry attack is far from over – Experts
May 16, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Ganesh Konka ?
Zentya 6.1 http proxy configuration

please send link for creating zentyal 6.1 for http proxy and firewall as gateway.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.