Let’s travel together.

QNAP Tells Users to Take Immediate Action to Stop Ransomware

Breach Notification
,
Cybercrime
,
Cybercrime as-a-service

Ransomware Operators Targeting All Networking Devices

(Photo QNAP Systems Ltd.)

QNAP, a Taiwan-based company that manufactures network-attached storage devices is urging users to take immediate actions to secure [its] QNAP NAS device suite amid reports of wide targeting of all its networking devices by ransomware and brute-force attacks, the company stated in a security advisory.

See Also: Zero Trust Webinar: Research Insights Exploring the Actionable, Holistic & Integrative Approach to Security

Ransomware and brute-force attacks have been widely targeting all networking devices,” says the security advisory, which advises QNAP users to follow the security setting instructions prescribed by the company.

Even though all network storage devices are equally exposed in the ongoing campaign, according to the advisory, internet-facing NAS devices are more at risk, QNAP says. “The most vulnerable victims will be those devices exposed to the internet without any protection,” the advisory says. To confirm whether your NAS device is exposed to the internet, QNAP suggests opening the “Security Counselor” setting on the QNAP NAS console.


Security Counselor option in QNAP NAS console (Source: QNAP)

QNAP confirms whether your NAS device is exposed to the internet and thus at a very high risk of being targeted if the dashboard shows the following message: “The System Administration service can be directly accessible from an external IP address via the following protocols: HTTP”

To confirm which exact ports are exposed to the internet unnecessarily and need to be taken offline, QNAP suggests users read this blog post.

Exposed? Do the Following

If the NAS device is found to be exposed in the Security Counselor console, QNAP recommends its users take the following two-step measure for securing their NAS devices: Read also : Global IT services provider Inetum hit by ransomware attack.

  1. Disable the Port Forwarding function of the router: This can be done by navigating to the management interface of the router. Check the Virtual Server, NAT or Port Forwarding settings, and disable the port forwarding setting of NAS management service port [port 8080 and 433 by default].
  2. Disable the UPnP function of the QNAP NAS: Navigate to myQNAPcloud on the QTS menu, click the “Auto Router Configuration” and unselect “Enable UPnP Port forwarding.”

Although this reconfiguration effectively pulls the NAS device offline, the company suggests some secure ways to access QNAP NAS via the internet through the myQNAPcloud link.

Major Outage

QNAP published the advisory last Friday, but some users over the weekend experienced their QNAP NAS devices crashing even when they were supposedly not exposed to the internet, as the security advisory suggested. See the article : Kron Telekomünikasyon Hizmetleri : The Most Common Types of Cyber Attacks in 2021.

A tech blogger using the name Hardisk tweeted that there must have been zero-day flaws in the QNAP NAS devices. He says on Twitter that he used the antivirus/malware removal provided by QNAP, and the problem he found seems to be bigger than originally thought, as “no trace of the virus” was spotted in this malware detector.

The blogger says he had a cloud backup that prevented a complete data loss and used this backed-up data to restore operations.

Several users across the globe experienced similar QNAP NAS device outages, which they discussed on Reddit.

A user named Laaif says that he has more than 12 QNAP devices running, and 10 of them were not reachable on Sunday. A user named vdosen1963 says he faced a similar ordeal where two of his three NAS devices stopped working around the same time that others reported theirs to be dysfunctional, which was around 5:00 p.m. in the UTC+1 time zone. Data and snapshots was not affected, and an anti-malware scan found nothing, the user says.

eCh0raix Ransomware the Culprit?

QNAP did not respond to Information Security Media Group’s request for details on the ransomware operators that are targeting their devices, but a snapshot of the incidents from the past couple of years points to the eCh0raix ransomware operators as a chief suspect. See the article : Smart Cybersecurity Budgeting in the Age of Ransomware.

The group was first seen targeting the QNAP storage devices in June 2019, when the operators exploited vulnerabilities in these devices and bypassed weak credentials using brute-force techniques. This seems to be the method used in the ongoing campaign (see: Report: Ransomware Targets QNAP Storage Devices).

In April 2021, the same group, along with another ransomware strain called Qlocker, again targeted QNAP devices – exploiting three known vulnerabilities at the time (see: QNAP Systems’ Appliance Users Hit by Ransomware).

2022 seems to be heating up already, says Terry Greer-King, vice president, EMEA, at SonicWall. “While it’s risky to make predictions on how cybercriminal activity will grow, the 2021 figures show us that ransomware is escalating at record pace,” Greer-King tells ISMG. “We have witnessed a cyber surge in the year gone by. Overall, an unprecedented total of 714 million ransomware attacks were predicted by the close of 2021. It is highly unlikely that this will slow down in 2022.”

Dmitriy Ayrapetov, vice president of platform architecture at SonicWall, says ransomware operators are mixing and matching malware ingredients deployed during the attack and escalating their techniques beyond phishing. Organizations need to protect their outward-facing attack surface, he says, and establish internal barriers, such as segmentation, to prevent the lateral exploitation that attackers rely to establish persistence and expand network access once they have established a foothold on a single system.

Comments are closed.