Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Authorities Dismantled “Diskstation” Ransomware Attacking Synology NAS Devices Worldwide

Posted on July 16, 2025July 16, 2025 By CWS

Italian State Police, in collaboration with French and Romanian legislation enforcement businesses, have efficiently dismantled the damaging “Diskstation” ransomware group that particularly focused Synology Community-Hooked up Storage (NAS) units throughout a number of international locations. 

The operation, coordinated via EUROPOL, resulted within the arrest of a number of Romanian nationals and uncovered a complicated cybercriminal community that encrypted sufferer techniques and demanded cryptocurrency funds for information restoration.

Key Takeaways1. Italian police, with French and Romanian authorities, dismantled the “Diskstation” ransomware gang focusing on Synology NAS units globally.2. Criminals encrypted enterprise techniques and demanded cryptocurrency ransoms from victims in varied sectors.3. Authorities used forensic evaluation and blockchain monitoring to hint the felony community.4. A number of Romanian nationals arrested, with the principle suspect (44) in detention for laptop entry and extortion expenses.

Ransomware Gang Exploits Synology NAS Zero-Days

The investigation started following quite a few complaints from Lombardy-based corporations whose IT infrastructure had been compromised via superior ransomware assaults. 

The cybercriminals employed subtle encryption algorithms to render business-critical information inaccessible, successfully paralyzing manufacturing processes throughout varied sectors together with graphic design, movie manufacturing, and occasion group.

The Cybersecurity Operations Heart in Milan carried out complete forensic evaluation of the attacked laptop techniques, using superior malware detection methods and reverse engineering methodologies. 

Investigators carried out detailed blockchain evaluation to hint cryptocurrency transactions, using specialised instruments to observe the digital cash path from sufferer funds to the perpetrators’ wallets. 

This dual-approach investigation methodology proved essential in figuring out the assault vectors and establishing the felony community’s operational construction.

The ransomware group demonstrated specific experience in exploiting vulnerabilities inside Synology NAS units, that are generally utilized by companies for information storage and backup options. 

The attackers leveraged zero-day exploits and credential stuffing methods to achieve unauthorized entry to those techniques earlier than deploying their encryption payloads.

Ransomware Ring Shut Down

The complexity of the cybercriminal operation necessitated expanded worldwide cooperation, resulting in the institution of a specialised process pressure coordinated by EUROPOL. 

The collaborative effort included cyber crime items from Italy, France, and Romania, every contributing experience in numerous features of the investigation together with digital forensics, cryptocurrency evaluation, and cross-border authorized procedures.

Throughout coordinated searches carried out in Bucharest in June 2024, investigators from the Milan COSC participated alongside Romanian authorities, efficiently apprehending a number of suspects within the act of committing cybercrime. 

The operation yielded substantial digital proof confirming the investigative hypotheses and revealing the complete scope of the felony community’s actions.

The first suspect, a 44-year-old Romanian citizen, has been positioned in pre-trial detention by the Milan Court docket on expenses of “Unauthorized Entry to a Pc or Telematic System” and “Extortion”. 

The costs replicate the intense nature of the crimes, which affected quite a few Italian victims and demonstrated the worldwide scope of the ransomware operation.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:Attacking, Authorities, Devices, Diskstation, Dismantled, NAS, Ransomware, Synology, Worldwide

Post navigation

Previous Post: Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty
Next Post: New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Related Posts

28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild Cyber Security News
Top 3 CISO Challenges And How To Solve Them  Cyber Security News
Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Cyber Security News
Blockchain Security – Protecting Decentralized Applications Cyber Security News
Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User Cyber Security News
SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack
  • Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack
  • Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
  • AI-Powered Cybersecurity Tools Can Be Turned Against Themselves Through Prompt Injection Attacks
  • CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack
  • Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack
  • Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
  • AI-Powered Cybersecurity Tools Can Be Turned Against Themselves Through Prompt Injection Attacks
  • CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News