fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

QNAP Confirms Qlocker Ransomware Used HBS Backdoor Account

QNAP Confirms Qlocker Ransomware Used HBS Backdoor Account

QNAP is advising customers to update the HBS 3 disaster recovery app to block Qlocker ransomware attacks targeting their Internet-exposed Network Attached Storage (NAS) devices.

“The ransomware known as Qlocker exploits CVE-2021-28799 to attack QNAP NAS running certain versions of HBS 3 (Hybrid Backup Sync),” the Taiwan-based NAS appliance maker said in a security advisory issued today.

“To prevent infection from Qlocker, we recommend updating HBS 3 to the latest version.”

massive Qlocker ransomware campaign started breaching QNAP NAS devices during the week of April 19, replacing victims’ files with password-protected 7-zip archives.

While the attack vector was not known at the time, QNAP has now confirmed that the attackers abused the CVE-2021-28799 hard-coded credentials vulnerability.

This security flaw acts as a backdoor account, allowing attackers to access devices running out-of-date HBS 3 (Hybrid Backup Sync) versions.

QNAP added that CVE-2021-28799 has already been fixed in the following HBS 3 versions (HBS 2 and HBS 1.3 are not impacted):

  • QTS 4.5.2: HBS 3 v16.0.0415 and later
  • QTS 4.3.6: HBS 3 v3.0.210412 and later
  • QTS 4.3.3 and 4.3.4: HBS 3 v3.0.210411 and later
  • QuTS hero h4.5.1: HBS 3 v16.0.0419 and later
  • QuTScloud c4.5.1~c4.5.4: HBS 3 v16.0.0419 and later

Even though this is not the first time QNAP mentioned Qlocker exploits targeting the HBS 3 backdoor account, it is the first time the company links the flaw to the campaign’s primary attack vector.

Also Read: The DNC Singapore: Looking At 2 Sides Better

A warning that comes too late

Unfortunately for QNAP customers targeted in the Qlocker ransomware campaign, this warning comes too late since the threat actors behind these attacks have already stopped the onslaught.

However, this happened only after extorting hundreds of QNAP users and robbing them of $350,000 within a single month after forcing them to pay ransoms of 0.01 bitcoins (worth roughly $500 at the time) to obtain the password for their files.

Victim reports in our Qlocker support topic and BleepingComputer’s tests confirmed that all of the Qlocker Tor sites are no longer accessible, with victims who had their NAS files locker in password-protected archives no longer having a way to pay the ransom.

ID Ransomware submissions from Qlocker victims
ID Ransomware submissions from Qlocker victims during the last 31 days

It is not yet clear what prompted Qlocker’s sudden shutdown but what’s certain is that it follows an ongoing trend that started after DarkSide hit Colonial Pipeline‘s systems.

DarkSide’s unfortunate ransomware attack led to increased US law enforcement pressure on similar cybercrime operations. As a direct result, ransomware gangs started to either shut down entirely or restricting their targets to move out of law enforcement’s crosshairs.

While Qlocker ransomware might have shut down, this is not the only ransomware currently targeting QNAP NAS devices.

During the last few weeks, QNAP customers were also urged to secure their devices against new Agelocker and eCh0raix ransomware campaigns.

Also Read: 4 Best Practices on How to Use SkillsFuture Credit

Customers who want to further secure their NAS devices from attacks are advised to implement the following best practices.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us