{"id":18141,"date":"2022-02-02T11:12:01","date_gmt":"2022-02-02T19:12:01","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11874\/"},"modified":"2022-02-02T11:12:01","modified_gmt":"2022-02-02T19:12:01","slug":"news-11874","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11874\/","title":{"rendered":"[updated]QNAP update stops Deadbolt ransomware, annoys some users, starts debate"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 28 Jan 2022 16:32:41 +0000<\/strong><\/p>\n<p>Earlier this week (25 January, 2022) news broke that a ransomware group was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-deadbolt-ransomware-targets-qnap-devices-asks-50-btc-for-master-key\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">targeting QNAP Network Attached Storage<\/a> (NAS) devices. The threat actors claimed the attack was based on a zero-day vulnerability specific to the devices.<\/p>\n<p>Today QNAP\u00ae Systems, Inc. (QNAP) pushed out an automatic, forced, update with firmware containing the latest security updates to protect against the attackers&#8217; &#8220;DeadBolt&#8221; ransomware.<\/p>\n<p>You might think that that is a good thing\u2014if not exactly cause for celebration, at least a cause for relief\u2014but some customers aren&#8217;t happy.<\/p>\n<h3>Deadbolt<\/h3>\n<p>The ransomware group responsible for this attack is calling themselves Deadbolt. They also use the same&nbsp;name in the file extension of the encrypted files their ransomware generates. Rather then using the habitual method of&nbsp;dropping ransom notes in each folder on a affected device, Deadbolt ransomware hijacks the QNAP device&#8217;s login page. The hijacked screen starts with &#8220;WARNING: Your files have been locked by DeadBolt&#8221;. The complete ransom message is shown below:<\/p>\n<pre class=\"wp-block-preformatted\">WARNING: YOUR FILES HAVE BEEN LOCKED BY DEADBOLT  ? What happened?  All your files have been encrypted. This includes (but is not limited to) Photos, Documents and Spreadsheets.  ? Why me?  This is not a personal] attack. You have been targeted because of the inadequate security provided by your vendor (QNAP).  ? What now?  You can sake a paywent of (exactly) 0.030000 bitcoin to the following address: \u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0\u25a0  Once the payment has been made we'll follow up with a transaction to the same address, this transaction will include the decryption key as part of the transaction details.[more information]  You can enter the decryption key below to start the decryption process and get access to all your files again.  important message for QNAP<\/pre>\n<p>Reportedly, the ransomware has already affected at least <a href=\"https:\/\/search.censys.io\/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=100&amp;virtual_hosts=EXCLUDE&amp;q=services.http.response.body%3A+%22All+your+files+have+been+locked+by+DeadBolt%22\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">3,600 victims<\/a>. Besides urging individual victims to pay for a decryption key, the ransomware gang is also trying to sell the full details of the alleged zero-day vulnerability to QNAP for five bitcoins, and is apparently also willing to sell QNAP the master decryption key that can decrypt the files for all affected victims, and the zero-day info, for 50 bitcoins. There are many good reasons for not giving in to  ransomware gangs&#8217; demands, and QNAP doesn&#8217;t need the zero-day information because it has already created an update to thwart the vulnerability. However, the update hasn&#8217;t been as welcome as you might expect. <\/p>\n<h3>Forced update<\/h3>\n<p>The day after the news broke (26 January) <a href=\"https:\/\/www.qnap.com\/en\/security-news\/2022\/take-immediate-actions-to-stop-your-nas-from-exposing-to-the-internet-and-update-qts-to-the-latest-available-version-fight-against-ransomware-together\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">QNAP issued a statement<\/a> in response to the ransomware. It urged NAS users to follow the recommended security setting instructions to ensure the security of their routers, and immediately update to the latest version of QTS\u2014the Linux based operating system developed by QNAP to run on their devices.<\/p>\n<p>Later that day, QNAP took more drastic action and force-updated the firmware for all customers&#8217; NAS devices to version 5.0.0.1891, the latest universal firmware which has been available since December 23rd, 2021.<\/p>\n<h3>Problems<\/h3>\n<p>As you might expect after a forced update, a number of unexpected side-effects arose, making users that were affected by these problems unhappy.<\/p>\n<p>Some users reporteded losing their devices&#8217; ISCSI connections (ISCSI is a networking standard for linking data storage facilities), and some adaperts were apparently left disabled by the update. The firmware update removed the ransomware executable and the ransom screen used to initiate decryption, which apparently caused some victims who had paid the ransom to be unable to proceed with decrypting the files after the update.<\/p>\n<h3>When warnings alone are not enough<\/h3>\n<p>As we all know, there is often a lawning gap between when a patch becomes available and when it&#8217;s actually applied. In this case, QNAP seems to have decided that closing that gap is the lesser of two evils.<\/p>\n<p>And in all fairness, QNAP has been <a href=\"https:\/\/www.qnap.com\/en\/security-news\/2022\/take-immediate-actions-to-secure-qnap-nas\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">urging users to secure their devices<\/a> since 7 January, 2022, with elaborate instructions on how to check whether their NAS devices are exposed to the Internet, how to disable the Port Forwarding function of the router, and how to disable the UPnP function.<\/p>\n<p>This is just good advice either way since QNAP NAS owners were already being targeted by other ransomware operations like Qlocker and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ongoing-ech0raix-ransomware-campaign-targets-qnap-nas-devices\/\" rel=\"noreferrer noopener nofollow\" target=\"_blank\">eCh0raix<\/a>. Rather ironic, since many NAS owners use their devices to store backups in case their main systems become dislabed by things like ransomware.<\/p>\n<p>In <a href=\"https:\/\/www.reddit.com\/r\/qnap\/comments\/sdz7e5\/you_want_to_know_why_your_qnap_updated_last_night\/huhlp5t\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">response to criticism<\/a> about the unannounced forced update, QNAP support stated:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cI know there are arguments both ways as to whether or not we should do this. It is a hard decision to make. But it is because of deadbolt and our desire to stop this attack as soon as possible that we did this.\u201d<\/p>\n<\/blockquote>\n<p>We are curious as to how our readers feel about this. Let us know in the comments. Should device vendors be allowed to push updates when there is a clear and imminent danger?<\/p>\n<p>Unless both business and conusmer users get to grips with patching sooner, we can probably expect to see more of these kind of forced updates.<\/p>\n<h2>Update February 1, 2022<\/h2>\n<p>Today <a href=\"https:\/\/www.qnap.com\/en\/security-news\/2022\/descriptions-and-explanations-of-the-qts-quts-hero-recommended-version-feature\" rel=\"nofollow\">QNAP explained<\/a> how it was able to update systems of which the owners were convinced they had disabled the <strong>auto update<\/strong> setting. QNAP actively updates NAS system software to ensure that each of their products runs efficiently throughout every stage of its lifecycle. These updates include feature updates, bug fixes, and security patches.\u00a0<\/p>\n<p>To allow users to obtain the latest version of system software more easily, QNAP has introduced the auto update to \u201cLatest Version\u201d feature in QTS 4.5.0 \/ QuTS hero h4.5.0. Further, an auto update to &#8220;Recommended Version&#8221; feature is implemented in QTS 4.5.3 \/ QuTS hero h4.5.3 to give users more flexibility.<\/p>\n<p>Users that disabled the <strong>auto-update<\/strong> after installing 4.5.0 which introduced the option to auto-update, but before installing 4.5.3 which introduced <strong>recommended updates<\/strong> may find that their device will still auto-update the recommended updates. The update intended to mitigate and isolate the Deadbolt attack was pushed as a recommended update.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/01\/qnap-update-stops-deadbolt-ransomware-annoys-some-users-starts-debate\/\">[updated]QNAP update stops Deadbolt ransomware, annoys some users, starts debate<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/01\/qnap-update-stops-deadbolt-ransomware-annoys-some-users-starts-debate\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 28 Jan 2022 16:32:41 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/ransomware\/2022\/01\/qnap-update-stops-deadbolt-ransomware-annoys-some-users-starts-debate\/' title='[updated]QNAP update stops Deadbolt ransomware, annoys some users, starts debate'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/01\/deadbolt_header.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>After several warnings to their user and thousands of victims, QNAP pushed out a forced update to their NAS devices.<\/p>\n<p>Categories: <a href=\"https:\/\/blog.malwarebytes.com\/category\/ransomware\/\" rel=\"category tag\">Ransomware<\/a><\/p>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/deadbolt\/\" rel=\"tag\">deadbolt<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/forced-update\/\" rel=\"tag\">forced update<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/icsci\/\" rel=\"tag\">icsci<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nas\/\" rel=\"tag\">nas<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/qnap\/\" rel=\"tag\">qnap<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/ransomware\/2022\/01\/qnap-update-stops-deadbolt-ransomware-annoys-some-users-starts-debate\/' title='[updated]QNAP update stops Deadbolt ransomware, annoys some users, starts debate'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/01\/qnap-update-stops-deadbolt-ransomware-annoys-some-users-starts-debate\/\">[updated]QNAP update stops Deadbolt ransomware, annoys some users, starts debate<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24751,24752,24753,16919,18557,3765],"class_list":["post-18141","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-deadbolt","tag-forced-update","tag-icsci","tag-nas","tag-qnap","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18141"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18141\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}