QNAP put out a warning yesterday alerting users to secure their devices against attacks pushing the now notorious DeadBolt ransomware which has gone after both QNAP and ASUS NAS devices in the past. The warning from QNAP asks users to do the following:
- Update the NAS device to the latest software version
- Ensure that the NAS is not exposed to remote access over the Internet
- Disable the Port Forwarding function of the router
- Disable the UPnP function of the QNAP NAS. Though for bonus points, I would also disable UPnP on the router as that’s a huge security risk.
- Turn off SSH and Telnet connections
- Change the system port number
- Change device passwords
- Enable IP and account access protection
While I applaud QNAP for getting this out there, I have to wonder why QNAP and ASUS seem to be the only companies who are vulnerable to DeadBolt. I don’t hear about this with other NAS vendors, so it’s not only a question worth asking, but it’s also worth considering switching to a NAS that doesn’t have these issues.
Related
This entry was posted on May 20, 2022 at 8:57 am and is filed under Commentary with tags QNAP. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
DeadBolt Is Back To Attack QNAP NAS Devices
QNAP put out a warning yesterday alerting users to secure their devices against attacks pushing the now notorious DeadBolt ransomware which has gone after both QNAP and ASUS NAS devices in the past. The warning from QNAP asks users to do the following:
While I applaud QNAP for getting this out there, I have to wonder why QNAP and ASUS seem to be the only companies who are vulnerable to DeadBolt. I don’t hear about this with other NAS vendors, so it’s not only a question worth asking, but it’s also worth considering switching to a NAS that doesn’t have these issues.
Share this:
Like this:
Related
This entry was posted on May 20, 2022 at 8:57 am and is filed under Commentary with tags QNAP. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.