QNAP raises alarm over serious vulnerability in NAS devices - Technology News

Breaking News

QNAP raises alarm over serious vulnerability in NAS devices

The QNAP Product Security Incident Response Team (PSIRT) has released updates for its Network-Attached Storage (NAS) devices

NAS devices by the Taiwanese vendor are a popular target for hackers and have been on the receiving end of various cyber attack campaigns lately. Threat actors are known to actively seek out vulnerabilities in order to target QNAP devices that are accessible over the internet. 

Last month, the company released updates to safeguard devices from being exploited to mine cryptocurrency. The latest updates, however, come in response to reports of two ransomware campaigns, Qlocker and eCh0raix, that are on the prowl for vulnerable QNAP devices.

TechRadar needs you!

We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.

>> Click here to start the survey in a new window<<

In its advisory, QNAP suggests users update their Multimedia Console, Media Streaming Add-on, and Hybrid Backup Sync apps, to mitigate the ongoing ransomware threat. 

Sanitize devices

QNAP also urges its users to fetch and run its latest malware removal tool to ensure their devices are sanitized. 

If you have been hit by the ransomware, the company suggests you don’t power down your NAS device, even if you catch the data being encrypted. Instead, you are advised to immediately run the malware scan and contact QNAP’s technical support.

To avoid being targeted, QNAP’s PSIRT suggests all users practice sensible password policies. In fact, that advice should be applicable to everyone, especially with there being no dearth of password managers that can help you set strong passwords.

Meanwhile, QNAP says it is urgently working on a solution to remove malware from infected devices.

Via The Register



from TechRadar - All the latest technology news https://ift.tt/3tPDZGU

No comments