The TLDR; Your server may be h@cked by ransomware stuff.
What can you do? I’m still trying to find for information.
This link below was source from reddit, not entirely sure of it’s legitimacy nor it’s capabilities. They do have a /legit/ twitter https://twitter.com/malwrhunterteam
Use at your own discretion
Apparently the link below is to identify it, but it probably does not decrypt it for you. I don’t have any files to test.
ID Ransomware is a free website that helps victims identify what ransomware may have encrypted their files. The site is able to identify over 300+ ransomware families by specific filename extensions and patterns, ransom note names, known hex patterns, email addresses, BitCoin addresses, and more. If a ransomware is identified, ID Ransomware will give the victim a distinct status on whether it is known to be decryptable or not, and will provide a link to a credible source for more information.
Home server is quite unlikely to be compromised “i think”, because this kinda relates to SMB ports, though not all of the ransomware is targeting only those ports. And home IP does not open ports like that “i think”.
Luckily i have a feeling most MP users are not affected, most likely because they’re hosted on the smaller guys that run their own server.
If some are hosted with guys that are hosted with OVH and such, then yeah they could easily be compromised.
I think it was just his home PC that’s infected is it not? Anyhow, it’s best practice to not click links, run scans all the time, and backup important files.
And yeah, most people won’t be affected I am sure, unless someone does some really dumb stuff. I’ve seen it happen so…
Good share @dddd , though judging by the response this topic got most people aren’t interested in the subject or just going on faith You’d expect all of them urgently updating their OS and checking everything…
Lets hope they didn’t actually got hit. I saw a twitter post, someone without much knowledge could just run this and hack in easily in under 2 minutes.
Since there are so many IP range, and it takes time, 1 person can’t do all of them at once. So i would say this is an ongoing matter.
In fact, the vulnerability was discovered few months back, and only got widespread due to the leak. But users still got hit because they didn’t update their OS.