QNAP NAS drives targeted by DeadBolt ransomware for the third time this year
The ransomware strain is back and equipped with stronger cryptography for more effective attacks
Taiwanese tech company QNAP has warned that DeadBolt ransomware is targeting owners of its network-attached storage (NAS) drives for the third time this year.
Following initial attacks by DeadBolt in January 2022, QNAP took the highly controversial decision to force-update users’ drives to firmware versions DeadBolt couldn’t successfully exploit.
QNAP also said the affected models were mainly the TS-x51 series and TS-x53 series of NAS drives. The advice given to users who believe they be vulnerable to DeadBolt is to update to the latest version of QTS and avoid exposing their product to the internet.
QNAP officially confirmed the third DeadBolt campaign on 19 May, but Unit 42 researchers said users may have been targeted as early as 13 May.
There has been no substantial analysis of the latest version of DeadBolt, but Unit 42 said the ransomware program made some significant changes since the March campaign.
In addition to a revised back end, DeadBolt also has a new ransom note and updated CSS code, along with the same master key as previously used. Unit 42 believes the latest campaign has infected around 3,000 devices.
Quickfire QNAP-DeadBolt overview
QNAP’s NAS drives were targeted by DeadBolt ransomware as of 7 January 2022. At the time, the type of ransomware used against the products was not known and neither was the scope of the attack.
On 25 January, both individual and business users started reporting infections with ransom demands set at 0.3 Bitcoin for individual users, or 50 Bitcoin from QNAP in exchange for the ransomware actors backing down.
The sweet spot of modern enterprise computing
Achieve security, reliability, scalability, and sustainability with hybrid IT infrastructureFree Download
The next day, QNAP advised all users to update their devices, a day before the company made the controversial move to force-update vulnerable hardware.
The move was met with anger from corners of the QNAP community. Many users had finely tuned NAS configurations that were undone with the update and some complained they were left no more secure than before the company forced the firmware update.
Others were more aggrieved at the company’s decision to force the update in the first place, the main argument being that users should have the choice to update or not, given that it was their product.
According to Censys, the first DeadBolt campaign infected just shy of 5,000 devices and the second affected more than 1,000.
Meeting the future of education with confidence
How the switch to digital learning has created an opportunity to meet the needs of every student, alwaysFree Download
The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana
Cost savings and business benefitsFree Download
The business value of the transformative mainframe
Modernising on the mainframeFree Download
Why PCaaS is perfect for modern schoolsFree Download