[WARNING] CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Introduce yourself to us and other members here, or share your own product reviews, suggestions, and tips and tricks of using QNAP products.
Post Reply
gnvdude
New here
Posts: 8
Joined: Sat May 31, 2014 8:01 am

[WARNING] CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Post by gnvdude »

Summary
This is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).

CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network Attached Storage (NAS) devices manufactured by the firm QNAP.

All QNAP NAS devices are potentially vulnerable to QSnatch malware if not updated with the latest security fixes. The malware, documented in open-source reports, has infected thousands of devices worldwide with a particularly high number of infections in North America and Europe. Further, once a device has been infected, attackers can prevent administrators from successfully running firmware updates.

This alert summarizes the findings of CISA and NCSC analysis and provides mitigation advice.

https://us-cert.cisa.gov/ncas/alerts/aa20-209a

https://www.ncsc.gov.uk/news/legacy-ris ... as-devices
Last edited by Toxic17 on Wed Jul 29, 2020 12:49 am, edited 3 times in total.
Reason: Updated Thread Title, added NCSC link, made Sticky, Moved thread to Users Corner
User avatar
dolbyman
Guru
Posts: 35249
Joined: Sat Feb 12, 2011 2:11 am
Location: Vancouver BC , Canada

Re: CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Post by dolbyman »

another reminder not to expose your NAS .. Qsnatch has been around for a year now
Last edited by Toxic17 on Wed Jul 29, 2020 12:49 am, edited 1 time in total.
User avatar
Toxic17
Ask me anything
Posts: 6477
Joined: Tue Jan 25, 2011 11:41 pm
Location: Planet Earth
Contact:

Re: [WARNING] CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Post by Toxic17 »

Updated Thread Title, added NCSC link, made Sticky, Moved thread to Users Corner
Regards Simon

Qnap Downloads
MyQNap.Org Repository
Submit a ticket • QNAP Helpdesk
QNAP Tutorials, User Manuals, FAQs, Downloads, Wiki
When you ask a question, please include the following


NAS: TS-673A QuTS hero h5.1.2.2534 • TS-121 4.3.3.2420 • APC Back-UPS ES 700G
Network: VM Hub3: 500/50 • UniFi UDM Pro: 3.2.9 • UniFi Network Controller: 8.0.28
USW-Aggregation: 6.6.61 • US-16-150W: 6.6.61 • 2x USW Mini Flex 2.0.0 • UniFi AC Pro 6.6.62 • UniFi U6-LR 6.6.62
UniFi Protect: 2.11.21/8TB Skyhawk AI • 3x G3 Instants: 4.69.55 • UniFi G3 Flex: 4.69.55 • UniFi G5 Flex: 4.69.55
User avatar
jaysona
Been there, done that
Posts: 854
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: [WARNING] CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Post by jaysona »

It appears that a new campaign is getting ready to ramp up.

One of my sacrificial NAS' has been getting some probes and login attempts on various ports. I rotate the https QTS login port from 443, 2443, 6443, 8443, 9090, 9898 & 9999, and over the past four days, the NAS has had failed login attempts. The failed attempts are usually one to three attempts, I presume so as to not trigger any lockouts, and the IP addresses are from well know TOR exit-node providers such as M247 and F3 Netze eV.

I suspect that the bots are scanning IP addresses and ports, looking at the responses, then saving the type of system, then a one or two time check is done, then the system is saved for the wider campaign once it launches.

So, I'd expect a new QTS attack campaign to start-up something within the next few weeks to a couple of months out.
RAID is not a Back-up!

H/W: QNAP TVS-871 (i7-4790. 16GB) (Plex server) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6604T (8GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AC86U - Asuswrt-Merlin - 386.7_2
Router2: Asus RT-AC68U - Asuswrt-Merlin - 386.7_2
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
User avatar
dolbyman
Guru
Posts: 35249
Joined: Sat Feb 12, 2011 2:11 am
Location: Vancouver BC , Canada

Re: [WARNING] CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Post by dolbyman »

fingerprinting devices ...then selling that info out to the folks who want to do the dirty work (infecting and ransom collection)
User avatar
jaysona
Been there, done that
Posts: 854
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: [WARNING] CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Post by jaysona »

Yes, this round of fingerprinting appears to be far more intelligent than previous fingerprinting that went on last year.

I can only wonder what new exploits have been found, what the attack vectors are and how large the attack surface is......

Two days ago, I changed the QTS port forward four times in 10 hours, and during that 10 hour period, QTS what probed and a login attempt was made three times. So the speed at which reconnaissance is being done appears to be pretty quick.
RAID is not a Back-up!

H/W: QNAP TVS-871 (i7-4790. 16GB) (Plex server) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6604T (8GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AC86U - Asuswrt-Merlin - 386.7_2
Router2: Asus RT-AC68U - Asuswrt-Merlin - 386.7_2
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
User avatar
jaysona
Been there, done that
Posts: 854
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: [WARNING] CISA Alert (AA20-209A) Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Post by jaysona »

So, it definitely seems like a new campaign is beginning, I had 14 new access attempts on the sacrificial NAS today, mostly from known TOR exit-node and VPN netblocks, however a few were from China and Russia as well, so it looks like the botnet is starting to come alive.
RAID is not a Back-up!

H/W: QNAP TVS-871 (i7-4790. 16GB) (Plex server) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6604T (8GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AC86U - Asuswrt-Merlin - 386.7_2
Router2: Asus RT-AC68U - Asuswrt-Merlin - 386.7_2
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
Post Reply

Return to “Users' Corner”