[RANSOMWARE] >>READ 1st Post<< Deadbolt

Introduce yourself to us and other members here, or share your own product reviews, suggestions, and tips and tricks of using QNAP products.
Post Reply
remainz
Starting out
Posts: 16
Joined: Tue Jan 22, 2019 8:17 pm

Re: [RANSOMWARE] Deadbolt

Post by remainz »

When I run

Code: Select all

$ kill 11943*
-sh: kill: (11943) - Operation not permitted
Am I not admin because I logged in as admin?
chumbo
Know my way around
Posts: 130
Joined: Sun May 03, 2020 8:43 pm

Re: [RANSOMWARE] Deadbolt

Post by chumbo »

dolbyman wrote: Wed Jan 26, 2022 11:02 pm So you actually believe QNAP is gonna pay 2 million bucks ransom?...riiight
I didn't say I believe they will, I said I hope they will, because it's the right and fair thing to do (or else quickly provide a patch that unlocks all the files).
And with the attitude the it's so unlikely for them to do so, you are only encouraging that very outcome. ("Well if nobody believes we would do it, why should we?" kind of thing).
Better be righteous than incredulous.
Last edited by chumbo on Thu Jan 27, 2022 5:27 am, edited 1 time in total.
QNAP TS-251+ 8Gb, Windows 10 x64.
I'm a total noob when it comes to networking and security so please address me as if I were your grandmother
User avatar
dolbyman
Guru
Posts: 35273
Joined: Sat Feb 12, 2011 2:11 am
Location: Vancouver BC , Canada

Re: [RANSOMWARE] Deadbolt

Post by dolbyman »

You cannot "patch" encrypted files back to the way they were...

Just remove the drives, hope for a miracle and setup your NAS from scratch with empty drives .. anything else is fairy tales and lies.

btw .. you were warned a while ago .. and you ignored the warning
viewtopic.php?f=21&t=154832
Hulli
Starting out
Posts: 49
Joined: Thu Mar 28, 2013 9:56 pm

Re: [RANSOMWARE] Deadbolt

Post by Hulli »

remainz wrote: Wed Jan 26, 2022 11:33 pm When I run

Code: Select all

$ kill 11943*
-sh: kill: (11943) - Operation not permitted
Am I not admin because I logged in as admin?
Try this

Kill -9 11943
P3R
Guru
Posts: 13192
Joined: Sat Dec 29, 2007 1:39 am
Location: Stockholm, Sweden (UTC+01:00)

Re: [RANSOMWARE] Deadbolt

Post by P3R »

alexhjones wrote: Wed Jan 26, 2022 9:34 pm Official QNAP news release on Deadbolt: https://www.qnap.com/en/security-news/2 ... e-together
The only thing they did is that they took the January 7th statement (that probably was an attempt to mitigate the effects of the QLocker2 campaign though they never spelled that out) and mention Deadbolt by name.

Oh yes, they also tell us that we now "Fight Against Ransomware Together". :-0 That may backfire as it could be perceived as an attempt to shift some responsibility away from the company... :S

If you didn't read and follow the January 7th statement and is now a victim of Deadbolt, it's useless information. It's of course good that they do that if there are any exposed systems that are still unaffected by Deadbolt but as usual when it come to security with Qnap, it's far too late. This time at least two years too late.
RAID have never ever been a replacement for backups. Without backups on a different system (preferably placed at another site), you will eventually lose data!

A non-RAID configuration (including RAID 0, which isn't really RAID) with a backup on a separate media protects your data far better than any RAID-volume without backup.

All data storage consists of both the primary storage and the backups. It's your money and your data, spend the storage budget wisely or pay with your data!
P3R
Guru
Posts: 13192
Joined: Sat Dec 29, 2007 1:39 am
Location: Stockholm, Sweden (UTC+01:00)

Re: [RANSOMWARE] Deadbolt

Post by P3R »

chumbo wrote: Thu Jan 27, 2022 12:06 am I didn't say I believe they will, I said I hope they will, because it's the right and fair thing to do...
It may be fair to the affected customers but it's not the right thing to do. Paying ransoms and thereby financing organized crime to continue and strengthen their activities is, or at least should be, very controversial. Except for the relatively few affected victims, it's negative for the rest of the world that use IT equipment. Paying the ransom is never the right thing to do, it's at best the least awful thing to do.

Also since we now have users paying ransom that report the unlock key didn't work, how could Qnap be sure that the master key they may receive would work? They could be throwing 2 million dollars into a black hole...
RAID have never ever been a replacement for backups. Without backups on a different system (preferably placed at another site), you will eventually lose data!

A non-RAID configuration (including RAID 0, which isn't really RAID) with a backup on a separate media protects your data far better than any RAID-volume without backup.

All data storage consists of both the primary storage and the backups. It's your money and your data, spend the storage budget wisely or pay with your data!
jswain
New here
Posts: 9
Joined: Tue Jul 05, 2016 5:32 pm

Re: [RANSOMWARE] Deadbolt

Post by jswain »

What alternative NAS drivers are you also using and are they better when it comes to security?
User avatar
dolbyman
Guru
Posts: 35273
Joined: Sat Feb 12, 2011 2:11 am
Location: Vancouver BC , Canada

Re: [RANSOMWARE] Deadbolt

Post by dolbyman »

Unclear what you mean by drivers ? .. what drivers are you talking about ?
darcon
Starting out
Posts: 11
Joined: Wed Jan 26, 2022 5:59 am

Re: [RANSOMWARE] Deadbolt

Post by darcon »

I'm sorry that some of you got hit and it's not your fault, but QNAP should not pay the ransom. If they do pay it will only increase the target on their back and this will likely happen again.

QNAP does need to better educate their customer base about the risks of putting your NAS on the Internet. It's fine to do so if you want, but adequate, timely backups is a minimum requirement if you want to prevent data loss going forward. They should also trim their app gallery significantly to help reduce the surface area of attack and give them more time to secure the apps that are kept. The more code you have running on your NAS, the more vulnerable to these sorts of zero-days it is. Also, they should create a locked down "NAS Mode" for people like me who only use their QNAP for a backup target, or at least let us disable unneeded apps (I'm looking at you myQNAPcloud).
Chadw1701a
New here
Posts: 5
Joined: Wed Jan 26, 2022 8:39 am

Re: [RANSOMWARE] Deadbolt

Post by Chadw1701a »

Has anyone tested to see if a factory reset gets rid of the ransomware yet?
Hardware: TS-653A
chumbo
Know my way around
Posts: 130
Joined: Sun May 03, 2020 8:43 pm

Re: [RANSOMWARE] Deadbolt

Post by chumbo »

Are there any recommendations on how to behave if one is a victim of Deadbolt?

I've simply turned off my NAS altogether. Is that taking it too far? Is simply disconnecting it from the internet enough?
I don't know anything about how ransomware work but my assumption is that it's like a virus/trojan in that, once a device is infected, it no longer needs the internet to operate. So I'm assuming that as soon as I'd turn my NAS back on, Deadbolt would wake up and continue encrypting my files.
I had made a quick search on one part of my drive for the .deadbolt extension and found nothing so I know that not all my files have yet been encrypted so....is my approach the right one? And then just wait for some additional news/solutions from QNAP.
(I also shut off all my other USB connected HDD).
QNAP TS-251+ 8Gb, Windows 10 x64.
I'm a total noob when it comes to networking and security so please address me as if I were your grandmother
QNAPDanielFL
Easy as a breeze
Posts: 488
Joined: Fri Mar 31, 2017 7:09 am

Re: [RANSOMWARE] Deadbolt

Post by QNAPDanielFL »

I am sorry for not responding yesterday. This all happened while I was taking a sick day so I was not very active on the forums.

I hope to have more to say soon.

We are also testing on our end. But I want to ask for user experience if people find the snapshots are deleted or if they can recover from snapshots?
Does running programs like PhotoRec allow for recovering files, (though without file structure)?

I saw a reference to the 7z log trick and I was not sure what that is. Does anyone know?
"I powered-off mine as soon as I noticed, so I only lost a few files, but this way I lost the option of doing the 7z log trick."

We are working on figuring out a better solution on our end. But if you have information you think I should share with the PSIRT team, please let me know.

If you have questions you would like me to ask the PSIRT team, please let me know.
robdou
Starting out
Posts: 14
Joined: Sun Aug 08, 2010 10:17 pm

Re: [RANSOMWARE] Deadbolt

Post by robdou »

I own 2 NAS at 2 location both affected. This morning, when I connected to the web user interface I saw the classic modified interface telling me to pay 0.03BC. At same time I saw that accessing the filestation was still possible. Another way to manage the NAS was via QManager App on my Iphone. With that app I was able to turn off the NAS remotely
luckydekko
New here
Posts: 5
Joined: Wed Jan 26, 2022 8:12 am

Re: [RANSOMWARE] Deadbolt

Post by luckydekko »

QNAPDanielFL wrote: Thu Jan 27, 2022 2:02 am I am sorry for not responding yesterday. This all happened while I was taking a sick day so I was not very active on the forums.

I hope to have more to say soon.

We are also testing on our end. But I want to ask for user experience if people find the snapshots are deleted or if they can recover from snapshots?
Does running programs like PhotoRec allow for recovering files, (though without file structure)?

I saw a reference to the 7z log trick and I was not sure what that is. Does anyone know?
"I powered-off mine as soon as I noticed, so I only lost a few files, but this way I lost the option of doing the 7z log trick."

We are working on figuring out a better solution on our end. But if you have information you think I should share with the PSIRT team, please let me know.

If you have questions you would like me to ask the PSIRT team, please let me know.
On my end after I lucked out by getting to the dash board it was as if someone went in and turned off all security to let this happen. Even saw that malware ran a check… nothing
Comy86
Starting out
Posts: 15
Joined: Thu Jan 27, 2022 2:15 am

Re: [RANSOMWARE] Deadbolt

Post by Comy86 »

Someone on bleepingcomputer forum has paid and received the decrypt key and someone else is trying to find a solution with that key and the original crypted files
Maybe someone with QNAP SSH knowledge can lend him a hand
https://www.bleepingcomputer.com/forums ... ion/page-3
Post Reply

Return to “Users' Corner”