• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
qnap urges users to update nas devices to prevent deadbolt

QNAP Urges Users to Update NAS Devices to Prevent Deadbolt Ransomware Attacks

You are here: Home / General Cyber Security News / QNAP Urges Users to Update NAS Devices to Prevent Deadbolt Ransomware Attacks
May 20, 2022

Taiwanese network-attached storage (NAS) devices maker QNAP on Thursday warned its consumers of a contemporary wave of DeadBolt ransomware attacks.

The intrusions are explained to have targeted TS-x51 sequence and TS-x53 series appliances working on QTS 4.3.6 and QTS 4.4.1, according to its solution security incident response staff.

“QNAP urges all NAS buyers to examine and update QTS to the most up-to-date model as shortly as achievable, and keep away from exposing their NAS to the internet,” QNAP reported in an advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


This progress marks the 3rd time QNAP units have arrive underneath assault from DeadBolt ransomware given that the start of the calendar year.

Deadbolt Ransomware Attacks

In late January, as a lot of as 4,988 DeadBolt-infected QNAP gadgets have been recognized, prompting the organization to release a forced firmware update. A next uptick in new infections was observed in mid-March.

CyberSecurity

DeadBolt attacks are also notable for the truth that they allegedly leverage zero-day flaws in the software program to attain remote accessibility and encrypt the systems.

Ransomware Attacks

According to a new report released by Team-IB, exploitation of security vulnerabilities in community-struggling with applications emerged as the 3rd most used vector to attain original entry, accounting for 21% of all ransomware attacks investigated by the firm in 2021.

Observed this write-up exciting? Follow THN on Fb, Twitter  and LinkedIn to study a lot more unique content material we write-up.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News CISA Issues Emergency Directive for VMware Vulnerabilities
Next Post: Hackers Trick Users with Fake Windows 11 Downloads to Distribute Vidar Malware hackers trick users with fake windows 11 downloads to distribute»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.