Jump to content

How do i access the data from my RAID Drives, which where in an array (High-Water Allocation Method RAID 0)?

Hey guys,
I would like to acess my data, but cant acess the drives.
My situation:
I set up my RAID 0 with high-water allocation method with 5 drives, 2x2TB and 3x1TB
It was all just a normal PC with an unraid Boot Stick.
I filled it up with 3,3TB of important files, windows backups etc. 
but I’m pretty sure that only 2 drives were really utilized
Some ransomeware virus named Djvu STOP moqs encrypted all my files on every machine in my network. 
All files, but some essential windows files like .dll were encrypted
These files are not decryptable because of sha256. 
Most of the files in the share/array on my NAS are encrypted
The USB drive, which hold the UNRAID OS and the NAS configuration is also encrypted
I have the paid version so I still habe the activation key
Is there any way to acces the data, which is still on the drives without the config stick? 
Any help would be greatly appreciated. Gratitude in advance for any answer.
I have a 100$ Paypal price formte person who can help me get my original files back.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, MoigenEugen said:

Is there any way to acces the data, which is still on the drives without the config stick?

No. You either pay the hackers that you allowed on your network, or write off all of your data. Those are your only options.

 

Next time, don't allow hackers on your network. Make backups that aren't attached to the network. Don't use Win-OS. Use strong passwords. Check for malware daily. Use an effective virus scanner. Get rid of all "social media" cr@p. Be paranoid when browsing the web. Change the display setting for your email account to "text only", not "html" or whatever they call it these days. Disable script execution in your browser.

 

HTH!

"You don't need eyes to see, you need vision"

 

(Faithless, 'Reverence' from the 1996 Reverence album)

Link to comment
Share on other sites

Link to post
Share on other sites

You don't have backups right?

 

If the ransomware encrypted the data on the nas, your not getting that back unencrpted.

 

Your best option is probably to pay the ransom if you don't have. backups.

 

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, Dutch_Master said:

No. You either pay the hackers that you allowed on your network, or write off all of your data. Those are your only options.

 

Next time, don't allow hackers on your network. Make backups that aren't attached to the network. Don't use Win-OS. Use strong passwords. Check for malware daily. Use an effective virus scanner. Get rid of all "social media" cr@p. Be paranoid when browsing the web. Change the display setting for your email account to "text only", not "html" or whatever they call it these days. Disable script execution in your browser.

 

HTH!

Thanks for your reply!

Is there any confirmation that i ll recieve the data back, if i do pay the hackers? Until now, no one suggested me to pay.

Link to comment
Share on other sites

Link to post
Share on other sites

12 minutes ago, Electronics Wizardy said:

You don't have backups right?

 

If the ransomware encrypted the data on the nas, your not getting that back unencrpted.

 

Your best option is probably to pay the ransom if you don't have. backups.

 

Thanks for your reply! Yes i do have my Backups on the NAS, but its corrupted. that was stupid.

 

Could you please tell m, if there is any confirmation that i ll recieve the data back, if i do pay the hackers?

Until now, no one suggested me to pay.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, MoigenEugen said:

Thanks for your reply! Yes i do have my Backups on the NAS, but its corrupted. that was stupid.

 

Could you please tell m, if there is any confirmation that i ll recieve the data back, if i do pay the hackers?

Until now, no one suggested me to pay.

Nope, no garantee you will get your data back, they could just take the money and run. 

 

But unless you have backups, you probalby don't have a better option, so paying is really your only shot.

Link to comment
Share on other sites

Link to post
Share on other sites

45 minutes ago, MoigenEugen said:

Thanks for your reply!

Is there any confirmation that i ll recieve the data back, if i do pay the hackers? Until now, no one suggested me to pay.

Yeah you'll get fiscal receipt and a 2 year warranty. /s

You are dealing with criminals mate...

As for should you pay, here are a few reasons not to:
- In some countries it is illegal to pay the ransom, you should check if that applies to you.
- Might as well put a sign on your forehead saying "I'm a paying customer".

 

That sh** you picked up comes with AZORULT which is a RAT, before doing anything (your choice if you will pay or not) make sure you change passwords (from a clean machine, something that wasn't a part of your local network) for all of your important stuff and enable 2FA where you can.
After that nuke everything you had in your local network, or you will end up in a similar situation in a year or so...  especially if you decide to pay now.

VGhlIHF1aWV0ZXIgeW91IGJlY29tZSwgdGhlIG1vcmUgeW91IGFyZSBhYmxlIHRvIGhlYXIu

^ not a crypto wallet

Link to comment
Share on other sites

Link to post
Share on other sites

And this is why I have cold storage backups of my important files on 100 and 128GB Sony BluRay discs.  True WORM media.  Put those discs in the most infected system on the planet and they can't manipulate the disc data.

Desktop: Ryzen 9 3950X, Asus TUF Gaming X570-Plus, 64GB DDR4, MSI RTX 3080 Gaming X Trio, Creative Sound Blaster AE-7

Gaming PC #2: Ryzen 7 5800X3D, Asus TUF Gaming B550M-Plus, 32GB DDR4, Gigabyte Windforce GTX 1080

Gaming PC #3: Intel i7 4790, Asus B85M-G, 16B DDR3, XFX Radeon R9 390X 8GB

WFH PC: Intel i7 4790, Asus B85M-F, 16GB DDR3, Gigabyte Radeon RX 6400 4GB

UnRAID #1: AMD Ryzen 9 3900X, Asus TUF Gaming B450M-Plus, 64GB DDR4, Radeon HD 5450

UnRAID #2: Intel E5-2603v2, Asus P9X79 LE, 24GB DDR3, Radeon HD 5450

MiniPC: BeeLink SER6 6600H w/ Ryzen 5 6600H, 16GB DDR5 
Windows XP Retro PC: Intel i3 3250, Asus P8B75-M LX, 8GB DDR3, Sapphire Radeon HD 6850, Creative Sound Blaster Audigy

Windows 9X Retro PC: Intel E5800, ASRock 775i65G r2.0, 1GB DDR1, AGP Sapphire Radeon X800 Pro, Creative Sound Blaster Live!

Steam Deck w/ 2TB SSD Upgrade

Link to comment
Share on other sites

Link to post
Share on other sites

OK a few things. 

 

1. This ransomware shouldn't have encrypted your UnRAID boot device since it shouldnt have had write permission to it. Either way, you should have had a backup of your Flash Key, which you can follow this here to restore: https://wiki.unraid.net/Manual/Changing_The_Flash_Device  If you do not have a backup of your flash key, then you will need to use the 'Replace Key' feature

 

2. You can attach your drives to another machine, however theres no point...if the files are encrypted, they are encrypted...attaching them to another machine wont change that. 

 

3. There is no guarantee that they will do anything paying the ransom. These are malicious criminals, they dont care about you once you give them their $$$. 

 

4. Wipe all your machines. Format and reinstall fresh systems to be sure you've got rid of the ransomware. 

 

5. Setup proper security for your storage. Do not allow "general" users to have write access to shares, especially backup. Either give them Read Only access, or just use the Guest login which has Read Only access anyway. 

 

e.g I have this share mounted using 'Guest' as a network drive on my PC. There are 3 accounts that have Read/Write access to this share. So the only thing that can write (modify) the files are my main admin account (which i only use adhoc sometimes), or my seedbox/jumphost accounts which are only mounted on these hardened Linux VM's. These VM's are locked down with SHA256 key based authentication, firewalls, etc...etc....

image.png.d052a47c2687ebaeb9cb50b2e1684be5.png

 

 

For some  further examples, here are some other shares that I have using the SMB Extra configuration

 

To explain  this...

\\tower\ISOs and \\tower\DMP are publically writeable....that is guests or anyone can write to them. This is a space where people can dump files to be sorted later. 

\\tower\BACKUP is not public, and can only be written to by my admin account or the svc_backup account. The user "svc_backup" is the name of my account that is entered into my Backup software ONLY. No other logged in user has writeable access to this share, so if any PC's are compromised, they cannot just mount and modify the backup folder. 

 

image.thumb.png.10b4f7759037911e42b720ca259ee60d.png

 

 

Examples like your Ransomware experience is why im a big advocate of properly locking down your shares and defining and using permissions correctly. 

 

 

Spoiler

Desktop: Ryzen9 5950X | ASUS ROG Crosshair VIII Hero (Wifi) | EVGA RTX 3080Ti FTW3 | 32GB (2x16GB) Corsair Dominator Platinum RGB Pro 3600Mhz | EKWB EK-AIO 360D-RGB | EKWB EK-Vardar RGB Fans | 1TB Samsung 980 Pro, 4TB Samsung 980 Pro | Corsair 5000D Airflow | Corsair HX850 Platinum PSU | Asus ROG 42" OLED PG42UQ + LG 32" 32GK850G Monitor | Roccat Vulcan TKL Pro Keyboard | Logitech G Pro X Superlight  | MicroLab Solo 7C Speakers | Audio-Technica ATH-M50xBT2 LE Headphones | TC-Helicon GoXLR | Audio-Technica AT2035 | LTT Desk Mat | XBOX-X Controller | Windows 11 Pro

 

Spoiler

Server: Fractal Design Define R6 | Ryzen 3950x | ASRock X570 Taichi | EVGA GTX1070 FTW | 64GB (4x16GB) Corsair Vengeance LPX 3000Mhz | Corsair RM850v2 PSU | Fractal S36 Triple AIO | 12 x 8TB HGST Ultrastar He10 (WD Whitelabel) | 500GB Aorus Gen4 NVMe | 2 x 2TB Samsung 970 Evo Plus NVMe | LSI 9211-8i HBA

 

Link to comment
Share on other sites

Link to post
Share on other sites

8 hours ago, Jarsky said:

OK a few things. 

 

1. This ransomware shouldn't have encrypted your UnRAID boot device since it shouldnt have had write permission to it. Either way, you should have had a backup of your Flash Key, which you can follow this here to restore: https://wiki.unraid.net/Manual/Changing_The_Flash_Device  If you do not have a backup of your flash key, then you will need to use the 'Replace Key' feature

 

2. You can attach your drives to another machine, however theres no point...if the files are encrypted, they are encrypted...attaching them to another machine wont change that. 

 

3. There is no guarantee that they will do anything paying the ransom. These are malicious criminals, they dont care about you once you give them their $$$. 

 

4. Wipe all your machines. Format and reinstall fresh systems to be sure you've got rid of the ransomware. 

 

5. Setup proper security for your storage. Do not allow "general" users to have write access to shares, especially backup. Either give them Read Only access, or just use the Guest login which has Read Only access anyway. 

 

e.g I have this share mounted using 'Guest' as a network drive on my PC. There are 3 accounts that have Read/Write access to this share. So the only thing that can write (modify) the files are my main admin account (which i only use adhoc sometimes), or my seedbox/jumphost accounts which are only mounted on these hardened Linux VM's. These VM's are locked down with SHA256 key based authentication, firewalls, etc...etc....

image.png.d052a47c2687ebaeb9cb50b2e1684be5.png

 

 

For some  further examples, here are some other shares that I have using the SMB Extra configuration

 

To explain  this...

\\tower\ISOs and \\tower\DMP are publically writeable....that is guests or anyone can write to them. This is a space where people can dump files to be sorted later. 

\\tower\BACKUP is not public, and can only be written to by my admin account or the svc_backup account. The user "svc_backup" is the name of my account that is entered into my Backup software ONLY. No other logged in user has writeable access to this share, so if any PC's are compromised, they cannot just mount and modify the backup folder. 

 

image.thumb.png.10b4f7759037911e42b720ca259ee60d.png

 

 

Examples like your Ransomware experience is why im a big advocate of properly locking down your shares and defining and using permissions correctly. 

 

 

Thank you for this informative comment. 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×