top of page
  • Writer's pictureISSP

NamPoHyu Encrypter Provides Remote Encryption of Samba Servers

Updated: Oct 18, 2022

The new encrypter family called NamPoHyu Virus or MegaLocker Virus attacks its victims slightly differently than other encrypters. Instead of launching the encrypter on the victim's computer, phishers launch it locally on their systems and allow it to encrypt remotely accessible Samba servers.

How does the NamPoHyu encrypter work?

Usually, traditional encrypters are delivered to the victims’ computers via phishing emails, portable storage devices, etc. However, NamPoHyu encrypter searches for accessible Samba servers, brute forces passwords and remotely encrypts their files.

Samba is an open-source implementation of the network protocol Server Message Block (SMB) used to provide services such as file and print sharing. It works in most systems with Unix or Unix similar operating systems and allows these systems to interact with clients on the Windows basis.

NamPoHyu encrypter spreading worldwide

BleepingComputer researchers report that currently there are 500,000 unauthorized and publicly accessible Samba servers. They received this data via the Shodan service.

NamPoHyu, a map of accessible Samba servers worldwide. The largest numbers of Samba servers are located in the Russian Federation, Brazil, Italy, the United States and the United Arab Emirates
Accessible Samba servers worldwide

In Ukraine, ISSP researchers found 739 accessible Samba servers. Organizations that have the largest number of actuations include Ukrtelecom, Triolan, Kyivstar, Uarnet, and NTUU "KPI".

NamPoHyu - a map of accessible Samba servers in Ukraine with top cities of Kyiv, Kharkiv, Dnipro, Lviv, and Odesa
Search data of accessible Samba servers in Ukraine

During the encryption, the .NamPoHyu extension is added to the extension of the encrypted files and a ransom demand file !DECRYPT_INSTRUCTION.TXT is created.

A screenshot with some examples of files encrypted with NamPoHyu
Encrypted files

A malware demands a $250 payment for alleged decryption
Ransom demand file

Recommendations on Guarding against NamPoHyu Encrypter

To guard against this type of encrypters, you need to comply with the following recommendations:

  • make backup copies of the systems;

  • close all the unused ports in the systems;

  • do not connect services of remote desktops directly to the Internet. Instead, make sure that they can only be accessed via VPN:

  • update all potentially vulnerable applications;

  • carry out continuous monitoring of abnormal activity in your network;

  • use special software for behavioral identification of threats and white list technologies.

Learn more about how to secure and monitor your infrastructure with a Security Operations Center.


Recent Posts

See All


bottom of page