
Untar testdisk, go to the directory and change the permissions of the executable. look for your architecture (uname -a) for i386 or x86_64. Sudo mount -t cifs -o user= /// /mnt/rescue-share (Confirm it with 'Y') You should get a shell. You should use ypur admin credentials to login.Īfter Login you get an screen with some option. Login over SSH (Putty on Widows) on your NAS. You should use your Windows Account with a password (if your account haven't one, create it. Create a samba share on your windows computer (yes it should be work on linux or macOS but I didn't tried it). You need to have access the ssh terminal of your QNAP NAS (you can activate it over the GUI it doesn't change your data) The files are deleted after archiving and encrypting with 7z and exists in the not allocated space of your disk.
MAKE SURE THE NAS IS NOT AVAILABLE IN THE INTERNET, DELETE ALL EXPOSED HOST RULES ON YOUR ROUTER Write up copied from here: and pasted below.ĮDIT: I have reworded this writeup in the commentsĮDIT 2: A video detailing this method has been shared hereįIRST: NO WRITING/CHANGE/DELETE/CRTEATE FILES AFTER ENCRYPTION ATTACK
This works even if you have restarted your nas since the attack The crux is that your unencrypted files are marked for deletion and may be recoverable if you act soon. It's inconvenient and will require a lot of manual organising once the files are recovered, but it's working for me. Haven't seen this posted yet and it might really help if you don't have recent backups or whatever. EDIT 26/MAY QNAP themselves have released a solution that makes this process so much easier.