Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

DeadBolt Ransomware Re-Emerges to Hit QNAP Again!

DeadBolt Ransomware Re-Emerges to Hit QNAP Again!

A new steady stream of attacks against network-attached storage devices from the Taiwan-based vendor is similar to a wave that occurred in Jan.

DeadBolt ransomware has resurfaced in a new wave of attacks on QNAP that begin in mid-Mar. & signals a new targeting of the Taiwan-based network-attached storage (NAS) devices by the new threat, researchers stated.

Researchers from Censys, which provides attack-surface management solutions, explained they observed DeadBolt infections on QNAP gear increase slowly starting Mar. 16, with a total of 373 infections that day. That number that rose to 1,146 devices by Mar. 19, according to a blog post by Censys Senior Security Researcher Mark Ellzey.

NAS Devices

The current attacks go back to Jan, when the company had to put out an unplanned update to its NAS devices, one that not all customers welcomed. The update was meant to clean up after DeadBolt attacks that were greeting customers with the ransomware group’s screen when they logged in, effectively locking them out of the device.

The new wave of attacks basically follow the same pattern as Jan’s wave, but the majority of the victims are running the QNAP QTS Linux kernel version 5.10.60, Ellzey stated. That is a later version than the update (QTS 5.0.0.1891) pushed out to customers in Jan.

Different Versions

Also, “at this time, Censys cannot state whether this is a new attack targeting different versions of the QTS operating system, or if it’s the original exploit targeting unpatched QNAP devices,” he acknowledged.

The new infections do not seem to be targeting a specific organisation or country; they seem to be evenly split between subscribers of various consumer internet service providers, Ellzey added.

QNAP Customers

The attacks act in the same way as the Jan. attacks as far as what the customers experience, & they ask for the same ransom as previous DeadBolt attacks on QNAP devices, Ellzey explained.

“Except for the Bitcoin addresses used to send ransoms to, the attack remains the same: backup files are encrypted, the web administration interface is modified, & victims are greeted with ransom messages,” he wrote.

Bitcoin

The attackers are asking for 0.03 Bitcoin for a decryption key, which is about $1,223 at today’s exchange rate. They are also asking for a ransom from QNAP itself: 5 bitcoin or $203,988, for information related to the vulnerabilities; & 50 bitcoin, or about $2m, for a master key to unlock all affected victims, Ellzey explained.

QNAP is not the only company in DeadBolt’s sights, which 1st came to researchers’ attention due to the Jan. attacks. In mid-Feb., Reddit users began reporting that the ransomware was targeting ASUSTOR ADM devices, according to Censys.

Attack Detection

Censys researchers found the latest wave of QNAP attacks due to the unique way the current DeadBolt ransomware variant communicates with victims, suggests the post.

“Instead of encrypting the entire device, which effectively takes the device offline (& out of the scope of Censys), the ransomware only targets specific backup directories for encryption, & vandalises the web-administration interface with an informational message explaining how to remove the infection,” Ellzey wrote.

Infected Devices

Using a simple search query, Censys “could easily find infected devices exposed on the public internet,” according to the post.

Along with general information about what hosts were infected with DeadBolt, researchers also obtained & tracked every unique Bitcoin wallet address used as a ransom drop, Ellzey concluded.

 

SHARE ARTICLE