Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by Fnord666 on Wednesday July 29 2020, @12:22PM   Printer-friendly
from the snatching-your-data dept.

UK/US Governments Warn of QNAP NAS Malware:

The UK and US governments have issued another joint cybersecurity alert, this time warning organizations about a strain of malware targeting network attached storage (NAS) devices from QNAP.

As of mid-June, the QSnatch malware (aka "Derek") had infected 62,000 devices worldwide, including 3900 in the UK and 7600 in the US, according to the notice from GCHQ's National Cyber Security Center (NCSC) and the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA).

This is the result of two campaigns, one running from 2014 to mid-2017 and the other starting in late 2018.

[...] QSnatch apparently features a credential scraper, SSH backdoor, CGI password logger, webshell functionality and the ability to exfiltrate a predetermined list of files, including system configs and log files.

It is said to achieve persistence by modifying the system host's file to redirect domain names to out-of-date versions in order to prevent updates from installing on the NAS device itself.

The NCSC/CISA urged administrators to follow the guidance issued by QNAP last November.

[...] "Organizations that are still running a vulnerable version must run a full factory reset on the device prior to completing the firmware upgrade to ensure the device is not left vulnerable."


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by Freeman on Wednesday July 29 2020, @02:59PM (2 children)

    by Freeman (732) on Wednesday July 29 2020, @02:59PM (#1028133) Journal

    You say that like the trickery was an accident. The format into a proprietary scheme was definitely done on purpose. Sure, it might have been spun as a feature, but it was done to keep people in their system.

    --
    Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by RS3 on Wednesday July 29 2020, @03:28PM

    by RS3 (6367) on Wednesday July 29 2020, @03:28PM (#1028137)

    Sorry you misunderstood, but that's exactly what I meant and why I used the word "trickery"- tricky gadgetry that benefits the company / provider more than the user, and largely unknown to the user. Again, pretty much the norm these days.

  • (Score: 2) by JoeMerchant on Wednesday July 29 2020, @03:39PM

    by JoeMerchant (3937) on Wednesday July 29 2020, @03:39PM (#1028140)

    but it was done to keep people in their system

    Backfired in my case, but then I'm small fish and I was able to walk away from my data that had been essentially ransomwared - demanding that I either repair the power supply on my QNAP or (cheaper, easier) buy a new QNAP and hope that when I plug my drive in I can access it again.

    This particular QNAP product "supported" external USB hard drives, which I'm pretty sure is part of how the power supply failed: overloaded by attaching external devices (still a faulty design, product said it supported such things, made no warning about load limits.) However, the external devices taught me: all data on that external USB drive, served by the QNAP, was universally accessible even after the QNAP died, it was only the data I installed on the drive internal to the NAS that got effectively ransomed.

    --
    🌻🌻 [google.com]