Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Ransomware on my QNAP NAS
#11
Is the QNAP exposed to the 'net??!!

It should be behind a firewall with myQNAPcloud disabled.

...Do you have a Windows PC in your home? If so then it's possible that the PC was compromised and the QNAP shares were attacked from the PC.

If you have a compromised device on your network then everything on your network with file sharing or SSH (Remote Login) is potentially compromised. Check your Macs to see if file sharing is enabled on any of them and if it is enabled then look carefully for similar ransomware messages.

...Did you install the Security Counselor app from the App Center as advised in the ransomware message boards and QNAP support docs?
Reply
#12
Sarcany wrote:
Is the QNAP exposed to the 'net??!!

It should be behind a firewall with myQNAPcloud disabled.

...Do you have a Windows PC in your home? If so then it's possible that the PC was compromised and the QNAP shares were attacked from the PC.

If you have a compromised device on your network then everything on your network with file sharing or SSH (Remote Login) is potentially compromised. Check your Macs to see if file sharing is enabled on any of them and if it is enabled then look carefully for similar ransomware messages.

...Did you install the Security Counselor app from the App Center as advised in the ransomware message boards and QNAP support docs?

Is myQNAPcloud particularly risky if you only allow yourself (the admin) access, and have 2-factor authentication enabled?
Reply
#13
rjmacs wrote:
Is myQNAPcloud particularly risky if you only allow yourself (the admin) access, and have 2-factor authentication enabled?

2FA just makes you a slightly harder target if they're going through the front door.

If you expose your devices and data to remote access through a website, you are are vulnerable. Even with a strong password you're still subject to whatever vulnerabilities exist on the site.

Look at the big headlines if you aren't watching the smaller stuff. Look what happened with Microsoft -- Office 365 servers worldwide opened up wide, even with 2FA. And private Exchange servers, even with 2FA. And SolarWinds opened up back-doors to thousands upon thousands of company databases. And forget about SIM-swapping, when there are services that will forward text messages for a thousand phones for under $20.

When a server gets hacked, they can amalgamate the data with the stuff they've got from other hacks. The result is smart, automated hits upon thousands (maybe millions) of people's data across the 'net from multiple vectors.

If you want remote access to your device, use a SSL VPN. Many home routers now have OpenVPN built in. You can use that. (They can also host PPTP VPNs. Don't use that.) And never ever EVER leave UPnP enabled on any device, especially not your router/firewall.
Reply
#14
Thanks! My 2FA isn't text message based - it's the Google Authenticator app, which I'm fairly sure is tied to my device. But, that doesn't protect me from weaknesses in QNAP's infrastructure.
Reply
#15
I did have myQNAPcloud running.

Here's what I have done:
* Complete reinitialization of the QNAP, down to factory defaults and reformatting hard drives.
* Did not reactivate myQNAPcloud; the QNAP was unregistered from myQNAPcloud as part of the initialization process.
* QNAP passwords, and TimeMachine QNAP access password changed.
* Scanned my macs with Malwarebytes and Avast. Nothing found.
* Searched macs for any txt files that ransomware leaves behind to tell you what to do, none found.
* Started a trial subscription to Avast to monitor activity going forward.

QNAP runs a version of Linux. My geek son thinks the ransomware was able to add files, but couldn't get any further in linux to modify files that were there. Whatever vulernability it used to get as far as it did was limited and couldn't manage real damage.
Reply
#16
I don't know if Malwarebytes has the stuff to detect ransomware.

It would seem to me in the best interests of the ne'er do wells to hide it well so it couldn't be removed without major surgery.

There's one other possibility that I've heard of — fake ransomware attacks,

Good that you went proactive, but it's possible the only threat was an empty one, that there was no ransomeware.

Sort of like the 'Your Flash Player is out of date. Click here to update.

Or like a bank robber with his hand in his jacket pocket giving the teller a note saying 'Give me the money, i have a gub'.

Again, smart to treat the threat as real, but it might be that it's not.

I suppose one could argue the threat is real as one was expressed, but that the execution is not.
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)