Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Wednesday July 29 2020, @12:22PM   Printer-friendly
from the snatching-your-data dept.

UK/US Governments Warn of QNAP NAS Malware:

The UK and US governments have issued another joint cybersecurity alert, this time warning organizations about a strain of malware targeting network attached storage (NAS) devices from QNAP.

As of mid-June, the QSnatch malware (aka "Derek") had infected 62,000 devices worldwide, including 3900 in the UK and 7600 in the US, according to the notice from GCHQ's National Cyber Security Center (NCSC) and the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA).

This is the result of two campaigns, one running from 2014 to mid-2017 and the other starting in late 2018.

[...] QSnatch apparently features a credential scraper, SSH backdoor, CGI password logger, webshell functionality and the ability to exfiltrate a predetermined list of files, including system configs and log files.

It is said to achieve persistence by modifying the system host's file to redirect domain names to out-of-date versions in order to prevent updates from installing on the NAS device itself.

The NCSC/CISA urged administrators to follow the guidance issued by QNAP last November.

[...] "Organizations that are still running a vulnerable version must run a full factory reset on the device prior to completing the firmware upgrade to ensure the device is not left vulnerable."


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by JoeMerchant on Wednesday July 29 2020, @03:39PM

    by JoeMerchant (3937) on Wednesday July 29 2020, @03:39PM (#1028140)

    but it was done to keep people in their system

    Backfired in my case, but then I'm small fish and I was able to walk away from my data that had been essentially ransomwared - demanding that I either repair the power supply on my QNAP or (cheaper, easier) buy a new QNAP and hope that when I plug my drive in I can access it again.

    This particular QNAP product "supported" external USB hard drives, which I'm pretty sure is part of how the power supply failed: overloaded by attaching external devices (still a faulty design, product said it supported such things, made no warning about load limits.) However, the external devices taught me: all data on that external USB drive, served by the QNAP, was universally accessible even after the QNAP died, it was only the data I installed on the drive internal to the NAS that got effectively ransomed.

    --
    🌻🌻 [google.com]
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2