{"id":1130,"date":"2021-12-08T09:33:01","date_gmt":"2021-12-08T09:33:01","guid":{"rendered":"http:\/\/egrowonline.com\/?p=1130"},"modified":"2021-12-08T09:33:01","modified_gmt":"2021-12-08T09:33:01","slug":"yet-another-bitcoin-mining-malware-targeting-qnap-nas-devices","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=1130","title":{"rendered":"Yet Another Bitcoin Mining Malware Targeting QNAP NAS Devices"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a target=\"_blank\" href=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEjLfLo4gI0vcmxla7TAdvT2l9aQcS7tvKRepAP9qV-sOHED8w2Sj--QSA-qsiUhCXBJFlwKGWCyaQg7c4B2dIiTmlMN4bmF8qd7pcj7fwgvrhoP03AIFngNBhbnC2fBEWBDGdnwQ3Ms1e87bVCdBF_stPR_Aov48eKV0FaRha5SVLaCCyU7mbCBZv7S\" style=\"clear: left; display: block; float: left;  text-align: center;\" rel=\"noopener\"><img decoding=\"async\" alt=\"Bitcoin Mining Malware\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\" src=\"https:\/\/thehackernews.com\/new-images\/img\/a\/AVvXsEjLfLo4gI0vcmxla7TAdvT2l9aQcS7tvKRepAP9qV-sOHED8w2Sj--QSA-qsiUhCXBJFlwKGWCyaQg7c4B2dIiTmlMN4bmF8qd7pcj7fwgvrhoP03AIFngNBhbnC2fBEWBDGdnwQ3Ms1e87bVCdBF_stPR_Aov48eKV0FaRha5SVLaCCyU7mbCBZv7S=s728-e1000\" title=\"Bitcoin Mining Malware\"\/><\/a><\/div>\n<p>Network-attached storage (NAS) appliance maker QNAP on Tuesday released a new advisory warning of a cryptocurrency mining malware targeting its devices, urging customers to take preventive steps with immediate effect.<\/p>\n<p>&#8220;A bitcoin miner has been reported to target QNAP NAS. Once a NAS is infected, CPU usage becomes unusually high where a process named &#8216;[oom_reaper]&#8217; could occupy around 50% of the total CPU usage,&#8221; the Taiwanese company <a target=\"_blank\" href=\"https:\/\/www.qnap.com\/en\/security-advisory\/QSA-21-56\" rel=\"noopener\">said<\/a> in an alert. &#8220;This process mimics a kernel process but its [process identifier] is usually greater than 1000.&#8221;<\/p>\n<div class=\"ad_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/go.thn.li\/backhub-dm2\" rel=\"nofollow noopener sponsored\" title=\"Automatic GitHub Backups\"><img loading=\"lazy\" decoding=\"async\" alt=\"Automatic GitHub Backups\" class=\"lazyload\" src=\"https:\/\/thehackernews.com\/images\/-HgiHdbUpRRQ\/YVHQqGahs-I\/AAAAAAAA4Zw\/NYGHBa999kAbbWpf3DZihmdmxCK2WjzgwCLcBGAsYHQ\/s300-e100\/rewind-2-300.png\" width=\"300\" height=\"250\"\/><\/a><\/center><\/div>\n<p>QNAP said it&#8217;s currently investigating the infections, but did not share more information on the initial access vector that&#8217;s being used to compromise the NAS devices. Affected users can remove the malware by restarting the appliances.<\/p>\n<p>In the interim, the company is recommending that users update their QTS (and QuTS Hero) operating systems to the latest version, enforce strong passwords for administrator and other user accounts, and refrain from exposing the NAS devices to the internet.<\/p>\n<p>QNAP NAS devices have long been a lucrative target for a number of malicious campaigns in recent years.<\/p>\n<p>In July 2020, cybersecurity agencies in the U.S. and U.K. <a target=\"_blank\" href=\"https:\/\/thehackernews.com\/2020\/07\/qnap-nas-malware-attack.html\" rel=\"noopener\">issued<\/a> a joint bulletin about a threat that infected the NAS devices with a data-stealing malware dubbed QSnatch (or Derek). In December 2020, the device maker warned of two high-severity cross-site scripting flaws (CVE-2020-2495 and CVE-2020-2496) that enabled remote adversaries to take over the devices.<\/p>\n<div class=\"ad_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/go.thn.li\/crowdsec-inside\" rel=\"nofollow noopener sponsored\" title=\"Prevent Data Breaches\"><img loading=\"lazy\" decoding=\"async\" alt=\"Prevent Data Breaches\" class=\"lazyload\" src=\"https:\/\/thehackernews.com\/images\/-2KtIyVEii6c\/Ya-ArbdzLXI\/AAAAAAAA4kM\/hae_ZYjtWAcZTCoQhmeQ46MDAsFUI5zDACNcBGAsYHQ\/s728-e100\/crowdec.jpg\" width=\"728\" height=\"90\"\/><\/a><\/center><\/div>\n<p>Then in March 2021, Qihoo 360&#8217;s Network Security Research Lab disclosed a cryptocurrency campaign that exploited two security flaws in the firmware \u2014 CVE-2020-2506 and CVE-2020-2507 \u2014 to gain root privileges and deploy a miner called <a target=\"_blank\" href=\"https:\/\/blog.netlab.360.com\/qnap-nas-users-make-sure-you-check-your-system\/\" rel=\"noopener\">UnityMiner<\/a> on compromised devices. And as of April this year, QNAP NAS devices have also been the target of <a target=\"_blank\" href=\"https:\/\/thehackernews.com\/2021\/04\/new-qnap-nas-flaws-exploited-in-recent.html\" rel=\"noopener\">eCh0raix and Qlocker ransomware<\/a> attacks.<\/p>\n<p><\/p>\n<\/div>\n<p><script type=\"e840cb33e0efbf5b7cb1e40d-text\/javascript\">\n\/\/<![CDATA[\nhead.ready(\"jqueryfile\",function(){$(\"a[href^='#link_share']\").each(function(){var e=$(this).attr(\"data-sm\"),t=\"\";\"facebook\"==e&#038;&#038;(t=\"https:\/\/www.facebook.com\/sharer.php?u=\"+share_url),\"twitter\"==e&#038;&#038;(t=\"https:\/\/twitter.com\/intent\/tweet?url=\"+share_url+\"&#038;text=\"+share_title+\"&#038;via=TheHackersNews\"),\"linkedin\"==e&#038;&#038;(t=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=\"+share_url),\"reddit\"==e&#038;&#038;(t=\"https:\/\/www.reddit.com\/submit?url=\"+share_url),\"hackernews\"==e&#038;&#038;(t=\"https:\/\/news.ycombinator.com\/submitlink?u=\"+share_url+\"&#038;t=\"+share_title),\"email\"==e&#038;&#038;(t=\"mailto:?&#038;subject=News Article\u2014\"+share_title+\"&#038;body=Check out this article from The Hacker News. n n n\"+share_title+\" \u2014 \"+share_url),\"whatsapp\"==e&#038;&#038;(t=\"https:\/\/api.whatsapp.com\/send?text=\"+share_title+\" \u2014 \"+share_url),\"facebook-m\"==e&#038;&#038;(t=\"fb-messenger:\/\/share\/?link=\"+share_url+\"&#038;app_id=280117418781535\"),\"telegram\"==e&#038;&#038;(t=\"https:\/\/telegram.me\/share\/url?url=\"+share_url+\"&#038;text=\"+share_title),$(this).attr(\"href\",t)}),$(\".show-comments\").on(\"click\",function(){var e=document.createElement(\"script\");e.src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&#038;appId=280117418781535&#038;version=v2.12\",document.body.appendChild(e),$(\".sharebelow-comment\").hide(),$(\".comments\").show()});var e=$(\".articlebody\").offset().top,t=!1;$(window).scroll(function(){$(window).scrollTop()>e&&!t&&(jQuery.ajax({url:\"https:\/\/thehackernews.com\/feeds\/posts\/default?alt=json-in-script&max-results=4\",type:\"get\",cache:!1,dataType:\"jsonp\",success:function(e){for(var t=\"\",s=\"\",r=0;r<e.feed.entry.length;r++){for(var a,l=0;l<e.feed.entry[r].link.length;l++)if(\"alternate\"==e.feed.entry[r].link[l].rel){t=e.feed.entry[r].link[l].href;break}100<(a=(a=\"content\"in e.feed.entry[r]?e.feed.entry[r].content.$t:\"summary\"in e.feed.entry[r]?e.feed.entry[r].summary.$t:\"\").replace(\/<S[^>]*>\/g,\"\")).length&&(a=a.substring(0,90));var n=(n=e.feed.entry[r].title.$t).substring(0,50),o=(o=e.feed.entry[r].media$thumbnail.url.replace(\/\/s72-c-e100\/,\"\/s260-e100\"));s+='\n\n<article class=\"latest cf\"><a target=\"_blank\" class=\"latest-link\" href=\"'+t.replace(\"https:\/\/\",\"https:\/\/\")+'\">\n\n<div><img decoding=\"async\" src=\"'+o+'\" alt=\"'+n+'\"\/><\/div>\n\n\n\n<div>\n\n<div class=\"latest-h3\">'+n+'...<\/div>\n\n<\/div>\n\n\n\n<div class=\"latest-desc\">'+a+\"...<\/div>\n\n<\/a><\/article>\n\n\"}s+=\"\",document.getElementById(\"result\").innerHTML=s}}),t=!0)})});\n\/\/]]>\n<\/script><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/thehackernews.com\/2021\/12\/warning-yet-another-bitcoin-mining.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network-attached storage (NAS) appliance maker QNAP on Tuesday released a new advisory warning of a cryptocurrency mining malware targeting its devices, urging customers to take preventive steps with immediate effect. &#8220;A bitcoin miner has been reported to target QNAP NAS. Once a NAS is infected, CPU usage becomes unusually high where a process named &#8216;[oom_reaper]&#8217; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1131,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[37],"tags":[50,1016,1163,93,1165,1164,350],"class_list":["post-1130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bitcoin","tag-bitcoin","tag-devices","tag-malware","tag-mining","tag-nas","tag-qnap","tag-targeting"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"http:\/\/egrowonline.com\/wp-content\/uploads\/2021\/12\/AVvXsEjLfLo4gI0vcmxla7TAdvT2l9aQcS7tvKRepAP9qV-sOHED8w2Sj-QSA-qsiUhCXBJFlwKGWCyaQg7c4B2dIiTmlMN4bmF8qd7pcj7fwgvrhoP03AIFngNBhbnC2fBEWBDGdnwQ3Ms1e87bVCdBF_stPR_Aov48eKV0FaRha5SVLaCCyU7mbCBZv7Ss728-e1000.png","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/1130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1130"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/1130\/revisions"}],"predecessor-version":[{"id":1132,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/1130\/revisions\/1132"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/media\/1131"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1130"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}