A decryptor has been released that can recover files for victims infected prior to July 17th, 2019. A new ransomware strain written in Go and dubbed eCh0raix is being used in the wild to infect and encrypt documents on consumer and enterprise QNAP Network Attached Storage (NAS) devices used for backups and file storage. Anomali researchers observed the ransomware connecting to the command and control server is located on Tor, the ransomware does not contain any Tor client to connect to it. The ransomware developers appear to have created an API that can be used to query for various information.
Source: https://www.bleepingcomputer.com/news/security/new-ech0raix-ransomware-brute-forces-qnap-nas-devices/