Site icon NAS Compares

QSnatch and How To protect Your QNAP NAS from Online Intruders

Contents hide
5 📧 SUBSCRIBE TO OUR NEWSLETTER 🔔 Δ 🔒 Join Inner Circle Get an alert every time something gets added to this specific article! NOTIFY ME Want to follow specific category? Also Read...QNAP NAS Critical VulnerabilitQNAP NAS Deals on Black FridayQNAP NAS and Switch Deals on BQNAP NAS - Amazon Black FridayOptimizing Your QNAP NAS for WQNAP NAS Deals - Amazon Prime QNAP NAS Deals - Amazon Prime How to Install and Setup TailsHow to install and set up TailHow WD Red NAS WDDA Warnings a 📧 Subscribe You can also follow specific search terms: This description contains links to Amazon. These links will take you to some of the products mentioned in today's content. As an Amazon Associate, I earn from qualifying purchases. Visit the NASCompares Deal Finder to find the best place to buy this device in your region, based on Service, Support and Reputation - Just Search for your NAS Drive in the Box Below Need Advice on Data Storage from an Expert? Finally, for free advice about your setup, just leave a message in the comments below here at NASCompares.com and we will get back to you. Need Help? Where possible (and where appropriate) please provide as much information about your requirements, as then I can arrange the best answer and solution to your needs. Do not worry about your e-mail address being required, it will NOT be used in a mailing list and will NOT be used in any way other than to respond to your enquiry. Your Name (required) Your Country (required) Your Email (required) Subject Estimated Budget Storage in GB/TB Required (if NAS, DAS or SAN) Use case environment (Business/Home) Your Message (900 char. Or use Fast Track) By clicking SEND you accept this Privacy Policy Question will be added on Q&A forum. You will receive an email from us when someone replies to it. 🔒Private Fast Track Message (1-24Hours) Δ TRY CHAT Terms and Conditions If you like this service, please consider supporting us. We use affiliate links on the blog allowing NAScompares information and advice service to be free of charge to you.Anything you purchase on the day you click on our links will generate a small commission which isused to run the website. Here is a link for Amazon and B&H.You can also get me a ☕ Ko-fi or old school Paypal. Thanks!To find out more about how to support this advice service check HEREIf you need to fix or configure a NAS, check Fiver Have you thought about helping others with your knowledge? Find Instructions Here Or support us by using our affiliate links on Amazon UK and Amazon US Alternatively, why not ask me on the ASK NASCompares forum, by clicking the button below. This is a community hub that serves as a place that I can answer your question, chew the fat, share new release information and even get corrections posted. I will always get around to answering ALL queries, but as a one-man operation, I cannot promise speed! So by sharing your query in the ASK NASCompares section below, you can get a better range of solutions and suggestions, alongside my own. ☕ WE LOVE COFFEE ☕ This description contains links to Amazon. These links will take you to some of the products mentioned in today’s video. As an Amazon Associate, I earn from qualifying purchases

QSnatch Infects Thousands of QNAP NAS Drives

In the last few days, there have been reports from the U.S and UK cyber intelligence and security agencies (NCSC and the CISA) to report that there has been successfully reported attacks on over 60,000 QNAP NAS devices across different regions of the world, Highlighting that it is a return of the QSnatch malware intrusion that we highlighted last year. The Qsnatch security hack infiltrates NAS drive systems by targeting hardware that has not had system firmware updates regularly updated to the latest version. This is not the first time we have heard about malware and ransomware Intruders accessing data storage devices remotely, and will likely not to be the last. Today I want to talk about QSnatch, who has been affected and how to avoid your system being penetrated by malicious Invaders.

NOTE– If you are reading this article in efforts to resolve the effects of QSnatch, I recommend you skip to the bottom where the directions to reverse the effects, avoid the issue in future and also a video from the official QNAP UK channel that explained the ways in which you can remove QSnatch from your NAS system.

NAS Drives VS Malware, Ransomware and Virus’

The subject of being infiltrated by my malicious internet attacks is not new and certainly not limited to just QNAP. For almost a decade in which we have seen NAS drive manufacturers grow and evolve their hardware /software platforms from the early days of a glorified hard drive over the internet, to them becoming entire operating systems and multi-tiered software environments in 2020. More and more businesses are switching their data from third-party clouds, arguably a larger target for enterprising hackers, towards private data storage servers. Over the years NAS storage providers have become quite the desirable target for hackers and much like any technology, especially those that are connected to the internet, NAS manufacturers such as QNAP, Synology, QSAN, Asustor and more can only logically be one step ahead of the hackers at any time. As soon as a new firmware update arrives, the hackers get to work to find exploits, which are then closed in the next firmware update and the cycle repeats again. The key throughout all of this is to maintain your firmware updates as regularly as possible, both on the system itself and the individual apps. That said, we are all human and all of us can think of times when we clicked remind me tomorrow, update later, or restart later. Consequently, many NAS drives do not carry the latest firmware as regularly as they should and this leaves a small opening in your defences that hackers are all too willing to take advantage of. This is pretty much the core of the problem and the growth of intrusive malware like Qsnatch is heavily linked to systems that do not update their firmware regularly. One only has to glance at the security patches and notices from each NAS brand to see how fast seriously they monitor this.

Examples:

QNAP Security Updates & Advisory – https://www.qnap.com/en/security-advisories?ref=security_advisory_details

Synology Security Updates & Advisory – https://www.synology.com/en-uk/security/advisory

What Are The Effects of QSnatch

If the Qsnatch malware makes its way into your QNAP NAS system, it will perform several processes in the early stages of its infection (the first two are clear indications of knowing you might have been infiltrated):

1, QSnatch will block the QNAP NAS’ inbuilt update alerts and prevent the system for from installing future firmware updates (though often manual firmware updates and updating through the QFinder Pro client tool will still work to eradicate the effects.

2, QSnatch will then block the program ‘Malware Remover’ from booting and updating

3, From there, QSnatch will create a ‘back door’ means for intruders to access your NAS, ultimately creating a new login credential and account towards your NAS Drive

4, Finally, the QSnatch malware will then record all user and password credentials for users on the NAS and transmit them over the internet to the intruders remotely.

So, you can see why it would be hugely damaging for the QSnatch malware to make its way into your system. Originally this malware was identified late last year and QNAP posted several ways in which you can both reverse the effects, as well as preventing this from happening. These measures are:

A full breakdown of all the things you can do to remove and/or avoid the QSnatch Malware infecting your system can be found HERE.

Should you Stop Using your QNAP NAS Now?

The Short answer? You can definitely continue using your NAS drive (as long as you implement the latest firmware, check your logs and change/amend anything that seems a bit ‘off’.

The Long answer a bit more involved. In short, every single NAS brand is going to be a target to hackers and data theft – in many ways it is one of the prices of innovation. Hearing stories of QSnatch, WannaCry or MegaLocker are always going to make you feel that your data is in the crosshairs of a nefarious intruder, but you need your data and as long as you maintain the latest security patches, your files are as safe as they can be in this modern age of data. Even switching to 3rd party cloud services (Google Drive, DropBox, AWS, OneDrive, etc) will not make you exempt, as those platforms have incredibly secure internal infrastructure BUT leave almost all matters of local client file handling and vetting to the end user – between the speed of upload/download speeds and the increasing utility of many users all sharing a ‘cloud drive’ for projects, it just takes 1 unprotected system to potentially infect all the others.

Ultimately, as unfortunate as the QSnatch infection is (and completely understandable as the situation would contain) the best way to avoid these things is to stay on top of your storage system firmware updates, make sure you have a robust off-site/off-system backup in place (RAID is NOT a Backup) and utilize snapshots where possible. The brunt of the QSnatch malware (As the name suggests) is about the theft of data, large or small). However, in most cases (especially Ransomware) when data has been taken, the system will then be blocked/encrypted from the end-user to access, with a follow-up email and a payment link to ‘help’ you get it back! So, regularly review your access logs, change things up if there is even a whiff of suspicion in your mind and stay on top of those updates and backups.

 


📧 SUBSCRIBE TO OUR NEWSLETTER 🔔


    🔒 Join Inner Circle

    Get an alert every time something gets added to this specific article!


    Want to follow specific category? 📧 Subscribe

    This description contains links to Amazon. These links will take you to some of the products mentioned in today's content. As an Amazon Associate, I earn from qualifying purchases. Visit the NASCompares Deal Finder to find the best place to buy this device in your region, based on Service, Support and Reputation - Just Search for your NAS Drive in the Box Below

    Need Advice on Data Storage from an Expert?

    Finally, for free advice about your setup, just leave a message in the comments below here at NASCompares.com and we will get back to you. Need Help? Where possible (and where appropriate) please provide as much information about your requirements, as then I can arrange the best answer and solution to your needs. Do not worry about your e-mail address being required, it will NOT be used in a mailing list and will NOT be used in any way other than to respond to your enquiry.

      By clicking SEND you accept this Privacy Policy
      Question will be added on Q&A forum. You will receive an email from us when someone replies to it.
      🔒Private Fast Track Message (1-24Hours)

      TRY CHAT Terms and Conditions
      If you like this service, please consider supporting us. We use affiliate links on the blog allowing NAScompares information and advice service to be free of charge to you.Anything you purchase on the day you click on our links will generate a small commission which isused to run the website. Here is a link for Amazon and B&H.You can also get me a ☕ Ko-fi or old school Paypal. Thanks!To find out more about how to support this advice service check HEREIf you need to fix or configure a NAS, check Fiver Have you thought about helping others with your knowledge? Find Instructions Here  
       
      Or support us by using our affiliate links on Amazon UK and Amazon US
          
       
      Alternatively, why not ask me on the ASK NASCompares forum, by clicking the button below. This is a community hub that serves as a place that I can answer your question, chew the fat, share new release information and even get corrections posted. I will always get around to answering ALL queries, but as a one-man operation, I cannot promise speed! So by sharing your query in the ASK NASCompares section below, you can get a better range of solutions and suggestions, alongside my own.

      ☕ WE LOVE COFFEE ☕

        This description contains links to Amazon. These links will take you to some of the products mentioned in today’s video. As an Amazon Associate, I earn from qualifying purchases

      Exit mobile version