A critical vulnerability on QNAP NAS devices was recently patched by the Taiwanese firm. But the issue is that thousands of devices, say 59,000 in number, are yet to receive the update or have to be updated by the admins to avoid hackers from exploiting the SQL Injection Vulnerability.

To those new to QNAP, the company is into the manufacturing of network attacks storage devices and has been constantly facing issued regarding security for the past 2 years.

QNAP has issued a CVSS score of 9.8 out of 10 which is severe on the severity score as hackers can easily take control of the device without engaging the user or victim in any sort of interaction.

In order to secure themselves from attacks, QNAP customers might upgrade their device OS version to QTS 5.0.1.2234 or later and the same applies to the QuTS Hero h5.0.1.2248 version as well.

A recent study carried out by Censys Security discovered that only 550 out of 60,000 QNAP NAS devices were found to be patched with the fix and so others are still open to attacks such as ransomware, where a malware is used to encrypt an information storing appliance.

Previously, to avoid all such exploitation troubles, the data storage appliance maker urged its customers to disable the port forwarding feature of the router, as it can open a gateway for hackers to attack NAS devices. Additionally, the company also requested its customers to disable the UPnP function on the QNAP NAS device to stay out of trouble.

NOTE- In January this year, the company introduced new appliances that operate on hybrid processors and support El. S SSD support. So, such appliances can not only serve as simple file servers or backup nodes, but can also serve as computing servers for basic needs.

 

The post QNAP NAS devices are vulnerable to ransomware attacks appeared first on Cybersecurity Insiders.

QNAP, a Taiwan-based company that offers data storage appliances, is back in news to become a target to Deadbolt ransomware again. Reports are in that the said file encrypting malware infected several NAS devices supplied by the hardware vendor, locking down access to users to stored information.

The security team of QNAP has reacted to the news by stating that users need to keep their appliances updated with the latest software updates that have been available since April 2022.

This time, the targeted models of QNAP are QTS 4.3.6 and QTS 4.4.1 and mainly those belonging to the X-series used by individuals and SMBs to manage files, share information and to perform other tasks.

Users are being urged by the NAS appliance maker to check for QTS update for the latest version and avoid the connection of Network Attacked Storage (NAS) to the World Wide Web.

According to a report conducted by security firm Censys from among 130,000 QNAP NAS devices, hackers have been targeted almost half of them with malware by exploiting certain zero-day vulnerabilities. This time those spreading Deadbolt are seen demanding 0.03 BTC to free up the data from encryption.

NOTE 1- Early this week, threat intelligence firm Emsisoft released a press update. It stated that victims of Deadbolt Ransomware using QNAP appliances can use their decryption tool only if they paid the hackers a ransom for a decryption tool that is now neutralized because of a forced update from QNAP for NAS appliances.

NOTE 2- It is better if the company solves these issues at the earliest. As it can make its customers lose trust in the products in near future.

 

The post QNAP storage devices again hit by Deadbolt Ransomware appeared first on Cybersecurity Insiders.