Authorities Dismantle DiskStation Ransomware Targeting NAS Devices

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 17, 2025
3 min read

Authorities Dismantled “Diskstation” Ransomware Attacking Synology NAS Devices Worldwide

Authorities Dismantled “Diskstation” Ransomware Attacking Synology NAS Devices Worldwide

Italian State Police, in collaboration with French and Romanian law enforcement agencies, have successfully dismantled the “Diskstation” ransomware group that targeted Synology Network-Attached Storage (NAS) devices globally. The operation, coordinated through EUROPOL, resulted in the arrest of several Romanian nationals and exposed a sophisticated cybercriminal network that encrypted victim systems and demanded cryptocurrency payments for data recovery.

Key Takeaways

  1. Italian police, with French and Romanian authorities, dismantled the "Diskstation" ransomware gang targeting Synology NAS devices worldwide.
  2. Criminals encrypted business systems and demanded cryptocurrency ransoms from victims in various sectors.
  3. Authorities used forensic analysis and blockchain tracking to trace the criminal network.
  4. Several Romanian nationals arrested, including a primary suspect (44) facing detention for computer access and extortion charges.

Ransomware Gang Exploits Synology NAS Zero-Days

The investigation began after numerous complaints from Lombardy-based companies about ransomware attacks. The cybercriminals used sophisticated encryption algorithms to render business-critical data inaccessible, paralyzing production processes in sectors like graphic design, film production, and event organization.

The Cybersecurity Operations Center in Milan conducted comprehensive forensic analysis of the attacked computer systems. Investigators also performed detailed blockchain analysis to trace cryptocurrency transactions, employing specialized tools that tracked payments from victims to the perpetrators' wallets.

The ransomware group demonstrated expertise in exploiting vulnerabilities within Synology NAS devices, commonly used for data storage and backup solutions. Attackers leveraged zero-day exploits and credential stuffing to gain unauthorized access before deploying their encryption payloads.

Ransomware Ring Shut Down

The complexity of the operation necessitated international cooperation, leading to the establishment of a specialized task force coordinated by EUROPOL. Cyber crime units from Italy, France, and Romania contributed their expertise in digital forensics, cryptocurrency analysis, and cross-border legal procedures.

In June 2024, police conducted coordinated searches in Bucharest, leading to the apprehension of suspects in the act of cybercrime. The operation yielded substantial digital evidence confirming the investigative hypotheses and revealing the full scope of the network's activities. The primary suspect, a 44-year-old Romanian, has been placed in pre-trial detention on charges of “Unauthorized Access to a Computer or Telematic System” and “Extortion.”

Italian Police Dismantle Romanian Ransomware Gang Targeting Nonprofits and Film Companies

Italian Police

Italian police have dismantled the Romanian ransomware gang known as “Diskstation,” targeting civil rights groups, design and film production companies, and international nonprofits in northern Italy. The group is accused of encrypting victims’ systems and demanding large cryptocurrency ransoms to restore access to the data.

The operation began after multiple companies in the Lombardy region reported being locked out of their systems. Investigators identified several Romanian nationals allegedly involved in the attacks.

In June, police raided homes in Bucharest, seizing digital evidence and apprehending suspects, some caught in the act of cyberattacks. A Milan judge ordered the pre-trial detention of the suspected group leader, a 44-year-old Romanian man, facing charges of unauthorized access and extortion.

Symantec Endpoint Management Suite Vulnerability Allows Malicious Code Execution Remotely

Symantec Endpoint Management Suite Vulnerability

A critical security vulnerability has been discovered in Broadcom’s Symantec Endpoint Management Suite, enabling unauthenticated remote code execution. The flaw, identified as CVE-2025-5333 with a CVSS v4.0 score of 9.5, affects multiple versions of this widely-deployed solution, prompting immediate mitigation recommendations.

Key Takeaways

  1. CVE-2025-5333 (CVSS 9.5) affects Symantec Endpoint Management Suite 8.6.x-8.8, allowing unauthenticated remote code execution via port 4011.
  2. The vulnerability is due to insecure .NET object deserialization in the Altiris IRM component.
  3. To mitigate risk, block port 4011 on firewalls as it’s unnecessary for normal operations.

The vulnerability resides in the Symantec Altiris Inventory Rule Management component, targeting an exposed legacy .NET Remoting endpoint. The CVSS vector indicates network-accessible exploitation requiring no user authentication.

Broadcom’s PSIRT team confirmed that port 4011 is not required for standard operations. Immediate actions include verifying firewall configurations and implementing recommended security controls to prevent exploitation.

For further information on securing devices, explore resources on how to prevent ransomware attacks.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article