Home Malware Programs Ransomware SynoLocker Ransomware

SynoLocker Ransomware

Posted: August 6, 2014

Threat Metric

Threat Level: 8/10
Infected PCs: 419
First Seen: August 6, 2014
Last Seen: September 22, 2021
OS(es) Affected: Windows


The SynoLocker Ransomware is a file encryption Trojan that specializes in encrypting data on outdated versions of Synology-brand file storage devices. Like PoshCoder or the Critoni Ransomware, the SynoLocker Ransomware holds your files hostage, supposedly until you pay a BitCoin fee, after which the SynoLocker Ransomware claims that an automated decryption process will reverse the attack. As a more practical and cheaper solution to the SynoLocker Ransomware ransoms, malware researchers would encourage updating your server software and keeping additional file backups, which can replace the encrypted data once you've deleted the SynoLocker Ransomware.

SynoLocker Ransomware: The Study of New Ransom Techniques

Ransomware Trojans occasionally target business entities and even government agencies, but the SynoLocker Ransomware is an example of threats going above and beyond to attack highly-specialized targets: customers of Synology's NAS (Network Access Storage or Network-Attached Storage) products. These file storage devices may be used as communal data servers for anywhere from tens to hundreds of machines. The SynoLocker Ransomware's opportunistic development makes specific use of year-old security vulnerability in corresponding DSM software (versions 4.3-3810 and older). So far, later versions and 5.0 DSM both are unaffected, and patches are available to close the vulnerability.

Although the SynoLocker Ransomware uses a misleading ransom message that makes its attack sound like an unorthodox security procedure, victims who follow its instructions by installing Tor (an anonymity-providing web browser) and navigate to the specified address will find themselves subjected to a standard ransom fee. Those who bother to convert this fee from BitCoins will find that it corresponds to roughly three hundred and fifty USD.

The Inexpensive Way of Unlocking Your Files from a SynoLocker Ransomware

Unfortunately, investigation by both Synology and a range of companies specialized in PC security has yet to identify the means by which the SynoLocker Ransomware is distributed or installed. While the SynoLocker Ransomware requires pre-5.0 DSM targets to encrypt your files, Synology has launched potentially vulnerable NAS products in this year. All users of such products should consider double-checking the software versions in use and patching them if appropriate.

If you've failed to stop the SynoLocker Ransomware before the SynoLocker Ransomware has encrypted your data, malware experts personally advise against paying the BitCoin ransom demanded of you, which has no guarantee of restoring your files. Common means of reversing such attacks often use additional file backups that can overwrite encrypted files, and some PC security companies do provide free utilities to decrypt files.

Extra security steps worth taking include reconfiguring your router to disable forwarding, changing ports in use and using a strong password, all of which can stop network-infiltrating threats like the SynoLocker Ransomware from compromising other machines. However, none of these are foolproof, and by far the most important step for blocking the SynoLocker Ransomware is to avoid using outdated software that is vulnerable to its highly-specialized attacks, along with using passive anti-malware protection.

Loading...