Hi.
Anybody can help me. My device Zyxel Nas326. Extension .hr.hr.hr. I uploaded file and ransomnote.
best regards
Posted 04 March 2020 - 09:01 AM
Hi.
Anybody can help me. My device Zyxel Nas326. Extension .hr.hr.hr. I uploaded file and ransomnote.
best regards
Posted 04 March 2020 - 09:08 AM
Posted 04 March 2020 - 10:47 AM
Please provide a link to the ID Ransomware results. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 (Michael Gillespie) to manually inspect the files and check for possible file markers.
Can you provide (copy & paste) the ransom note contents here?
Did the cyber-criminals provide an email address to send payment to? If so, what is the email address?
Please attach in your next reply or upload the original ransom note and several samples of encrypted files (different formats - doc, png, jpg) to the following third-party file hosting service and provide a link or send a PM with a link to Amigo-A (Andrew Ivanov) so he can manually inspect them.

It is best to compress large files before sharing. When the file has been uploaded, you will see a screen stating that the upload was successful. Right-click on the filename link, select Copy Shortcut and paste the link in your next reply.
.
.
Microsoft MVP Alumni 2023
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 04 March 2020 - 06:22 PM
Somehow this same ransomware hit my Zyxel NAS526 about 10:30 am this morning when I was at work. What is the best method to isolate, locate and remove this virus so it dosent get into any of my networked computers. Also however they got in they used unixuser/root account I am not sure how to remove this account as it is not a shown user in my nas user management console, any help would be greatly appreciated
Posted 05 March 2020 - 01:21 AM
Metalheadx1982
Maybe this is NAS326?
---
fonotal,
Metalheadx1982,
You need to go to the support center of your device, check the status and updates.
https://www.zyxel.com/support/support_landing.shtml
https://www.zyxel.com/support/SupportLandingSR.shtml?c=gb&l=en&kbid=M-00038&md=NAS326
---
Edited by Amigo-A, 05 March 2020 - 10:30 AM.
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 05 March 2020 - 01:22 AM
Please provide a link to the ID Ransomware results. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 (Michael Gillespie) to manually inspect the files and check for possible file markers.
Can you provide (copy & paste) the ransom note contents here?
Did the cyber-criminals provide an email address to send payment to? If so, what is the email address?
Please attach in your next reply or upload the original ransom note and several samples of encrypted files (different formats - doc, png, jpg) to the following third-party file hosting service and provide a link or send a PM with a link to Amigo-A (Andrew Ivanov) so he can manually inspect them.
It is best to compress large files before sharing. When the file has been uploaded, you will see a screen stating that the upload was successful. Right-click on the filename link, select Copy Shortcut and paste the link in your next reply.
Hi.
ID Ransomware it says Kirk. I searched kirk but my file extensions not a .kirk.
RANSOM_NOTE
Posted 05 March 2020 - 01:25 AM
You need to go to the support center of your device, check the status and updates.
https://www.zyxel.com/support/SupportLandingSR.shtml?c=gb&l=en&kbid=M-00038&md=NSA526
---
If I understood correctly, only your Zyxel NAS526 was attacked. This did not apply to a personal computer?Are PCs and other devices connected to the Zyxel NAS526?
Yes only Nas device.
Posted 05 March 2020 - 01:33 AM
Edited by Amigo-A, 05 March 2020 - 10:35 AM.
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 05 March 2020 - 02:15 AM
That is correct, as of now only my NAS has been affected. I am kinda curious how they were able to exploit and compromise my nas, especially using the root account as I didn't have oit enabled.
Somehow this same ransomware hit my Zyxel NAS526 about 10:30 am this morning when I was at work. What is the best method to isolate, locate and remove this virus so it dosent get into any of my networked computers. Also however they got in they used unixuser/root account I am not sure how to remove this account as it is not a shown user in my nas user management console, any help would be greatly appreciated
You need to go to the support center of your device, check the status and updates.
https://www.zyxel.com/support/support_landing.shtml
https://www.zyxel.com/support/SupportLandingSR.shtml?c=gb&l=en&kbid=M-00038&md=NSA526
---
If I understood correctly, only your Zyxel NAS526 was attacked. This did not apply to a personal computer?Are PCs and other devices connected to the Zyxel NAS526?
Posted 05 March 2020 - 03:13 AM
I have the same problem. My NAS326 was attacked through the web panel. It was possible becouse of a bug in Zyxel firmware (typying 2 special characters in login field was giving access without knowlege of username and password with root privileges).
I think it is a brand new ransomware (I haven't found any article about crypted files with .hr extension till yesterday). All files size is 77 bytes. So...the only thing we can do now is to wait (and prey) And believe in Amigo-A's skills
![]()
Edited by BFAofSuspect, 05 March 2020 - 04:49 AM.
Posted 05 March 2020 - 08:49 AM
Edited by Amigo-A, 05 March 2020 - 10:32 AM.
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 05 March 2020 - 10:15 AM
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 05 March 2020 - 10:18 AM
On the forum, we have already seen several others ransomware for NAS devices. This recognition may link them directly or indirectly.
My site: The Digest "Crypto-Ransomware" + Google Translate
Posted 05 March 2020 - 12:20 PM
Metalheadx1982,BFAofSuspet,Topicstarter provided a file with three .hr extensions.Do you have only one .hr extension?Are there any differences in the note from the extortionists?
I have single .hr after file name. And here is a printscreen of directory structure and attacker's message:
And I'm angry of ZYXEL behaviour - they have their cloud users e-mail database and they did ABSOLUTELY NOTHING to inform users of their devices (one small e-mail would be enough) about absolutely CRITICAL 0-day vulnerability...
Edited by BFAofSuspect, 05 March 2020 - 01:13 PM.
Posted 05 March 2020 - 01:35 PM
ok.
I compared three notes that different users uploaded here.
All have the same BTC wallet, sum 0.1130 and email-address and ID: 1mk8hjkn2old3
Presumably, this is no accident. How will they define whose information is where? No, not define.
If only at the network address of each device or otherwise.
HR Ransomware - my article in Digest
The first case has a date - March 4 at 4 a.m.
Edited by Amigo-A, 05 March 2020 - 02:03 PM.
My site: The Digest "Crypto-Ransomware" + Google Translate
0 members, 0 guests, 0 anonymous users