• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
qnap: get nas devices off the internet now

QNAP: Get NAS Devices Off the Internet Now

You are here: Home / Latest Cyber Security Vulnerabilities / QNAP: Get NAS Devices Off the Internet Now
January 7, 2022

There are active ransomware and brute-force attacks remaining launched in opposition to internet-uncovered, network-hooked up storage products, the unit maker warned.

Get your internet-uncovered, network-connected storage (NAS) products off the internet now, Taiwanese manufacturer QNAP warns: Ransomware and brute-drive attacks are commonly concentrating on all network equipment.

“The most susceptible victims will be those products exposed to the Internet with out any security,” QNAP said on Friday, urging all QNAP NAS customers to comply with security-location recommendations that the Taiwanese NAS maker integrated in its notify.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Initial off, to check out whether your NAS is uncovered to the internet, QNAP instructed unit owners to open the device’s Security Counselor: a built-in security portal that integrates anti-virus and anti-malware software program.

“Your NAS is exposed to the Internet and at significant risk if there demonstrates ‘The Process Administration service can be directly accessible from an exterior IP tackle by way of the adhering to protocols: HTTP’ on the dashboard.” —QNAP

Significant-risk Security Counselor setting. Source: QNAP.

QNAP directed prospects to this site to figure out which router ports are exposed to the internet.

Fending Off Attacks From Uncovered NAS Units

If your NAS gadget turns out to be uncovered to the internet, QNAP advisable getting these two actions to protected it:

  • Disable the Port Forwarding functionality of the router. Go to the management interface of your router, verify the Digital Server, NAT or Port Forwarding options, and disable the port forwarding environment of NAS administration company port (port 8080 and 433 by default).
  • Disable the UPnP perform of the QNAP NAS. Go to myQNAPcloud on the QTS menu, simply click the “Auto Router Configuration,” and unselect “Enable UPnP Port forwarding.”
  • Port Forwarding purpose. Source: QNAP.

     

    UPnP purpose of the QNAP NAS. Supply: QNAP.

    QNAP also presents comprehensive instructions on how to protect against malware infections, such as by means of password cleanliness, enabling IP and account obtain safety to avert brute power attacks, disabling SSH and Telnet connections if you never use these expert services, and avoiding the use of default port quantities these kinds of as 22, 443, 80, 8080 and 8081.

    A Plague of Ransomware Attacks

    QNAP did not specify which ransomware gangs or strains are included in the ongoing attacks, but QNAP unit entrepreneurs have endured through much more than their share in excess of the past handful of decades.

    That includes repeated concentrating on by operators wielding eCh0raix ransomware. aka QNAPCrypt.

    In August 2021, Palo Alto Network Device 42 researchers set out a report about a new variant of eCh0raix that was exploiting a critical bug, CVE-2021-28799 – an inappropriate authorization vulnerability that offers attackers entry to difficult-coded credentials so as to plant a backdoor account – in the Hybrid Backup Sync (HBS 3) software program on QNAP’s NAS devices. End users had started off reporting attacks that abused what turned out to be the very same flaw in April 2021.

    eCh0raix was also made use of to target QNAP NAS servers in 2019, in specific attacks that brute-compelled weak qualifications and exploited recognised vulnerabilities. QNAP also came beneath attack by operators inflicting Qlocker ransomware in April 2021.

    Password Reset: On-Need Event: Fortify 2022 with a password security strategy developed for today’s threats. This Threatpost Security Roundtable, created for infosec specialists, centers on enterprise credential management, the new password fundamentals and mitigating write-up-credential breaches. Join Darren James, with Specops Computer software and Roger Grimes, protection evangelist at KnowBe4 and Threatpost host Becky Bracken. Sign-up & Stream this Cost-free session these days – sponsored by Specops Software.


    Some parts of this short article are sourced from:
    threatpost.com

    Previous Post: «simple active directory tweak helps block blackmatter ransomware attacks Simple Active Directory tweak helps block BlackMatter ransomware attacks
    Next Post: Monsanto Employee Stole Trade Secret Cyber Security News»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
    • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
    • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
    • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
    • “Getting to Yes”: An Anti-Sales Guide for MSPs
    • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
    • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
    • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
    • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
    • 5 Threats That Reshaped Web Security This Year [2025]

    Copyright © TheCyberSecurity.News, All Rights Reserved.