• QNAP NAS owners told to patch immediately, again

    From TechnologyDaily@1337:1/100 to All on Fri May 20 20:00:04 2022
    QNAP NAS owners told to patch immediately, again

    Date:
    Fri, 20 May 2022 18:47:48 +0000

    Description:
    Cybercrooks are asking for Bitcoin in return for the decryption key in NAS attacks.

    FULL STORY ======================================================================

    Oh boy, QNAP NAS users cant seem to catch a break, as theyve been urged to patch up their endpoints immediately, again.

    This time around, an unknown threat actor is on the hunt for vulnerable QNAP NAS devices to deploy the Deadbolt ransomware on.

    Among the vulnerable devices are those running on the QTS 4.3.6 and QTS 4.1.1 operating systems. That would include the TS-x51 series, and the ST-x53 series, although its probably not limited to these two.

    Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022 . Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/10.99. No decryptor

    Those who end up attacked will see a warning right on the login page, demanding payment in Bitcoin in exchange for the decryption key. All of the files on the affected endpoint will be encrypted using the AES128 algorithm and will have the .deadbolt extension to their filenames.

    At this time, we dont know how high the ransom demand is.

    Cybersecurity researcher Michael Gillespie has recently published a decryptor key for Deadbolt, but it seems that it only works for Windows devices. At
    this time, it would seem, the only way to recover the device is to actually pay the ransom.

    Thats why, researchers are saying, it would be best not to get infected in
    the first place. That can be achieved, first and foremost, by applying the patch thats already been made available by QNAP. Furthermore, the company urged NAS device owners to avoid exposing their NAS to the Internet. Read
    more

    QNAP NAS owners are under attack once again


    QNAP NAS devices vulnerable to dangerous 'DirtyPipe' Linux bug


    QNAP extends support for older NAS devices amid surge in attacks

    To that end, users are advised to block port forwarding on their home router, and to disable UPnP in the NAS control panel. Furthermore, they should turn off SSH and Telnet connections. Users can still access their NAS devices away from their home intranet by deploying a VPN, and using the myQNAPcloud Link app.

    Its been less than a month since QNAP urged users to patch against two vulnerabilities with a 9.8 severity score. The bugs can be used to perform
    low complexity attacks that dont require victim interaction, it was said at the time. Never miss an update with the best patch management tools around

    Via: Tom's Hardware



    ======================================================================
    Link to news story: https://www.techradar.com/news/qnap-nas-owners-told-to-patch-immediately-again /


    --- Mystic BBS v1.12 A47 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)