jhand00 wrote: ↑Tue Jan 22, 2019 11:13 am
I did have qnapcloud enabled. My guess is that it was through that, but other possibilities are that I had https access available from the Internet, along with port forwarding to a Plex server on the QNAP server.
Glad to know I am not going mad! Don't bother with the 3 and 10 second resets, they do not fix the problem.
Out of interest, I downgraded to 4.3.4.0675 firmware and the hosts file did not have the 700+ entries. I then upgraded to 4.3.4.0695 and they came back

. I am thinking it is related to the config settings that persist on the /share/CACHEDEV1_DATA device. There is a new Malware Remover version 3.4.0 that came out yesterday so QNAP know that they have an issue here. I ran this and it says it "Malware was detected and removed. You must restart the NAS". You do this and then it runs on restart and says the same thing --> endless loop.
I am checking my backups and will reset the entire machine inc. raid array using latest firmware to get out of this. Total waste of my time.
Last thoughts:
I bought the QNAP based on its reputation and I feel personally let down. All software has problems but it seems that QNAP is reluctant to be honest with its customers. In order to detect malware, you are usually responding to an exploit that has a designation and documented behaviour. Most if not all, anti-malware software will inform the user that it has detected a known signature. None that I know of just says "I have found malware" except QNAP's application. If I knew what malware was found, I could mitigate any risks that it may have introduced with my system and my data. With QNAP, we are flying blind and have no idea what has been compromised.
Some users have commented that they never use any of the internet facing features due to security concerns. If so, what are you saying about QNAP and also why buy something when you "shouldn't use" many of the features you bought the unit for in the first place.