News

NextCry ransomware attacks NextCloud cloud storage

NextCloud users faced a serious problem. New NextCry ransomware attacks NextCloud cloud storage and destroys saved backups. According to security experts, the malware penetrates systems through a recently discovered vulnerability in the PHP-FPM engine.

About the threat reported visitors of the BleepingComputer forum who were looking for a way to regain access of their data.

As the user under the nickname xact64 said, he noticed a problem during the synchronization of the laptop with cloud storage.

I realized immediately that my server got hacked and those files got encrypted. The first thing I did was to pull down the server to limit the damage that was being done (only 50% of my files got encrypted)”, — xact64 said.

Behind his eyes, the correct files began to change to encrypted copies. The user hastily disconnected, but half of the content was blocked.

Researchers who studied the malware called it NextCry – this extension receives encrypted files. The program is a Python script compiled into an ELF executable file (this format is used on UNIX systems).

Read also: Ransomware attacked two Spanish companies: the local Internet is in panic as during the WannaCry days

Once on the victim’s computer, NextCry finds the synchronization folder with NextCloud storage, deletes the source data folders from the machine and encrypts the cloud copy. As a result, affected files are downloaded instead of the original ones, as in the case of xact64.

Ransomware expert Michael Gillespie said NextCry processes victim files using an AES algorithm.

“Upon completion of encryption, the program also encodes content using the Base64 standard, which is not typical for such malware”, – also noted Michael Gillespie.

For unlocking files, criminals ask for 0.025 BTC. It is noted that the wallet specified by the attackers is still empty.

After examining the messages of affected users, BleepingComputer experts suggested that NextCry exploits NextCloud’s own vulnerability. This is evidenced by the fact that the malware infects protected repositories with the latest version of software.

Further investigation allowed the developers to track the source of the infection to the vulnerability of the PHP-FPM engine, on which some NGINX servers are running. According to reporters, at the end of October, NextCloud representatives warned of an RCE bug that is present in the basic configuration of their product. This solution is built on a vulnerable version of PHP-FPM.

Mitigation

The developers said that the threat affected only a small fraction of the servers. They sent administrators a notification about the need to update the PHP assembly to v.7.3.11/7.2.24, given that at the moment there is no decoder for NextCry, only an upgrade can protect user data.

Polina Lisovskaya

I works as a marketing manager for years now and loves searching for interesting topics for you

Recent Posts

Remove Qehu Virus Ransomware (+File Recovery)

About Qehu Qehu is assorted by our virus analyst team as the DJVU cryptoware family.…

2 days ago

Remove Qepi Virus Ransomware (+File Recovery)

About Qepi Qepi is assorted by our malware research team as the DJVU ransomware genus.…

2 days ago

Remove Wifebaabuy.live Pop-up Ads

About Wifebaabuy.live Wifebaabuy.live pop-ups can not introduce out of the blue. If you have clicked…

2 days ago

Remove Relativeads.net Pop-up Ads

About Relativeads.net Relativeads.net pop-ups can not open out of nowhere. If you have clicked on…

2 days ago

Remove Vamtoacm.com Pop-up Ads

About Vamtoacm.com Vamtoacm.com pop-ups can not introduce out of the blue. If you have actually…

2 days ago

Remove Clicks2apk.com Pop-up Ads

About Clicks2apk.com Clicks2apk.com pop-ups can not launch out of nowhere. If you have clicked on…

2 days ago