Warning: DeadBolt Ransomware operators are actively exploiting a QNAP 0-DAY vulnerability, PATCH NOW!
DeadBolt ransomware operators are actively exploiting a QNAP Photostation 0-day vulnerability in the wild. The vulnerability affects Internet facing QNAP Devices with photo station.
QNAP released security updates 12 hours after detecting the surge in Ransomware attacks.
The Centre for Cyber security Belgium recommends system administrators patch vulnerable systems as soon as possible and analyse system and network logs for any suspicious activity.
This report has instructions to help your organisation.
In case of an intrusion, you can report an incident via: https://cert.be/en/report-incident
Create an inventory that includes all the software from your organisation and check per entry if it is vulnerable.
The vulnerability is fixed in the versions below:
- QTS 5.0.1: Photo Station 6.1.2 and later
- QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later
- QTS 4.3.6: Photo Station 5.7.18 and later
- QTS 4.3.3: Photo Station 5.4.15 and later
- QTS 4.2.6: Photo Station 5.2.14 and later
To protect your NAS from the DeadBolt ransomware, QNAP strongly recommends securing your QNAP NAS devices and routers by following these instructions:
- Disable the port forwarding function on the router.
- Set up myQNAPcloud on the NAS to enable secure remote access and prevent exposure to the internet.
- Update the NAS firmware to the latest version.
- Update all applications on the NAS to their latest versions.
- Apply strong passwords for all user accounts on the NAS.
- Take snapshots and back up regularly to protect your data.
QuMagie is a simple and powerful alternative to Photo Station. QNAP recommends using QuMagie to efficiently manage photo storage in your QNAP NAS.
QNAP NAS should not be directly connected to the internet.Use the myQNAPcloud Link feature provided by QNAP, or enable the VPN service, to limit your attack surface.
The CCB recommends organisations to upscale monitoring and detection capabilities and to detect any related suspicious activity, ensuring a fast response in case of an intrusion.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
When applying patches to systems that have been vulnerable to an RCE exploit, a proactive threat assessment should be performed to verify no exploitation occurred in the time between a patch becoming available and being applied.
Reference QNAP guide: https://www.qnap.com/en/security-advisory/qsa-22-24