QNAP users angry after NAS drives are updated to combat DeadBolt ransomware
Concerns mount over the powers the NAS manufacturer has over users' products as users report non-consensual forced security updates
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
QNAP customers have expressed anger towards the company after it forced a security update on large numbers of its users' network-attached storage (NAS) drives.
The NAS manufacturer announced on Wednesday that DeadBolt ransomware was "widely targeting" QNAP drives and locking out users until they paid a fee in Bitcoin. Numerous users began reporting that they had fallen victim to the ransomware campaign earlier this week after losing access to files.
A query sent to internet-facing device scanner Censys revealed 3,687 devices have already been encrypted by DeadBolt. In response, QNAP took the controversial step to force-update every users' firmware to the latest version on Thursday.
"We are trying to increase protection against DeadBolt," said an official QNAP support spokesperson in response to one complaint. "If recommended update is enabled under auto-update, then as soon as we have a security patch, it can be applied right away.
"Back in the time of Qlocker, many people got infected after we had patched the vulnerability. In fact, that whole outbreak was after the patch was released. But many people don't apply a security patch on the same day or even the same week it is released. And that makes it much harder to stop a ransomware campaign. We will work on patches/security enhancements against DeadBolt and we hope they get applied right away.
"I know there are arguments both ways as to whether or not we should do this. It is a hard decision to make. But it is because of DeadBolt and our desire to stop this attack as soon as possible that we did this."
QNAP's actions have been met with anger from the community. Some say users' NAS drives, many of which often have finely tuned and individualised configurations that break with certain updates, are just as vulnerable now as they were to DeadBolt if they didn't update to the latest, most secure firmware version.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"You may have had good intentions, but what you did was wrong," said one user in direct response. "You should have rolled out notifications for an emergency update or patch and let users decide.
"If users decide against the update and then get owned by Deadbolt, that is on them. By forcing the update, anyone who has lost data, as a result, is no better off than if Deadbolt had owned them, but worse you have opened QNAP up to legal liability for that loss."
Other users expressed concern over QNAP's ability to force a change on the hardware they own, without first asking permission. Users raised questions around what other powers QNAP has over users' NAS drives, and what the company can do with data stored on them.
For many, the only indication that an update was going to be applied was one short 'beep'. When users investigated what was happening, they found their drive in the middle of rebooting after downloading an update.
Despite the concern, many reports tell of positive experiences with the update, but given that NAS drives are notoriously laborious to update safely without compromising the intricate configurations users create for their individual environments, other users reported deliberately avoiding the update which was ultimately forced on them.
Timeline of .deadbolt attacks
On 10 January 2022, IT Pro reported QNAP's original security statement that it was aware of cyber attackers targeting its NAS drives with ransomware, urging users to update their firmware as soon as possible.
No details of the ransomware strain were reported at the time, nor was the scope of the attackers' targeting, but full details on how to secure drives from outside attacks were provided by the manufacturer.
On Tuesday 25 January 2022, individual and business users started reporting successful DeadBolt attacks with their files being replaced with DeadBolt versions of themselves. Among the victims was high-profile podcast host and MIT research scientist Lex Fridman, who provided screenshots of the messages displayed to users and ransom payments.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
Users were asked for 0.3 Bitcoin (roughly £8,100) as a ransom demand. A separate message was also sent to QNAP itself, demanding a payment of 5 Bitcoin (roughly £136,500) for details of the supposed zero-day vulnerability used to exploit the NAS drives, or a total of 50 Bitcoin (roughly £1.3 million) for the universal decryptor and zero-day details.
"It makes me nauseous to say this, but this is real," said another user. "My first client just got hit. Files in File Station will have a .deadbolt extension on them. This client had a secure password, and 2 factor authentication set up. I have just reported this directly. I was expecting to have a nice week this week. I guess that won't be the case for me."
On Wednesday 26 January, QNAP release an official security statement urging users to update their devices and "fight ransomware together". The following day, reports started emerging of forced security updates.
A NASty trend
The targeting of QNAP's NAS drives is the latest episode in a recent trend of cyber attackers targeting internet-facing storage devices. In June 2021, Western Digital customers were similarly targeted with data-wiping malware.
Affected devices hadn't received security updates since 2015, at the time of the attack, with some users reporting total factory resets of their devices and others losing terabytes of data, IT Pro reported.
In response, Western Digital made the unorthodox recommendation to users that they simply unplug their storage devices to prevent from further malware attacks.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Salesforce targets telco gains with new agentic AI toolsNews Telecoms operators can draw on an array of pre-built agents to automate and streamline tasks
-
Four national compute resources launched for cutting-edge science and researchNews The new national compute centers will receive a total of £76 million in funding
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks