IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

QNAP NAS devices face fresh Deadbolt ransomware attack

The ransomware variant has returned to infect more than 1,000 QNAP devices

Deadbolt, a ransomware variant that attacked QNAP storage in January, is back and infecting more of the drives, researchers revealed this week.

Deadbolt is a ransomware variant first identified in January. It targets network-attached storage (NAS) devices from QNAP, which run the company's own Linux distribution called QTS.

Rather than encrypting the whole drive, Deadbolt concentrates on encrypting backup drives and then hacks the device's web interface to deliver a ransomware message.

Infections peaked on January 26, according to cyber security company Censys, affecting almost 5,000 of the 130,000 QNAP devices in use. QNAP force updated its firmware in January to stop the infections.

This update reportedly caused side effects including broken iSCSI connections. It also removed the hacked interface, which stopped hacked users who had paid the ransom from decrypting the files. However, Censys said that it reduced the number of infected devices at the time to under 300.

The ransomware resurged on QNAP devices this month. Censys saw new infections beginning on March 16, when the number of infected devices stood at 373. Within three days, the number of infected devices had grown to 1,146.

While the attackers are using a different Bitcoin address for the latest ransom demand, the rest of the attack remains the same, Censys said. They are demanding 0.03 bitcoins (currently worth around $1,280).

Related Resource

Identity is key to stopping these five cyber security attacks

Many attacks begin with the same weakness: user accounts

Whitepaper cover with a blurred image of a stack of data chipsFree Download

The attackers promise to deliver a decryption key in exchange for the ransom payment. They also make a separate offer to QNAP via the hacked web interface, offering it full details of the technical exploit that enabled the attack for five bitcoins ($213,300) or a master decryption key for 50 bitcoins ($2.13m).

This attack is unusual, in that aside from the hacked web interface, the attackers only communicate with the victims via bitcoin payments. They return the encryption key from a ransom payment in the OPRETURN field of a Bitcoin transaction.

QNAP drives have suffered attacks before, including infection by Dovecat crypto-mining malware and QSnatch, legacy malware which stopped administrators from applying security patches.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

Best free malware removal tools 2022
Security

Best free malware removal tools 2022

22 Jun 2022
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

16 Jun 2022
What is shoulder surfing?
social engineering

What is shoulder surfing?

10 Jun 2022
CIAM buyer’s guide
Whitepaper

CIAM buyer’s guide

6 Jun 2022

Most Popular

Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022
The UK's best cities for tech workers in 2022
Business strategy

The UK's best cities for tech workers in 2022

24 Jun 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022