The United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC) issued a joint advisory about a massive ongoing campaign spreading the QSnatch data-stealing malware.
The malicious code specifically targets QNAP NAS devices manufactured by Taiwanese company QNAP, it already infected over 62,000 QNAP NAS devices.
The QSnatch malware implements multiple functionalities, such as:
In November 2019, security experts first spotted the QSnatch malware that at the time infected thousands of QNAP NAS devices worldwide. At the time, the German Computer Emergency Response Team (CERT-Bund) reported that over 7,000 devices have been infected in Germany alone.
QSnatch (aks Derek) is a data-stealing malware that was first details by the experts at the National Cyber Security Centre of Finland (NCSC-FI) in October 2019. The experts were alerted about the malware in October and immediately launched an investigation.
“CISA and NCSC have identified two campaigns of activity for QSnatch malware. The first campaign likely began in early 2014 and continued until mid-2017, while the second started in late 2018 and was still active in late 2019. The two campaigns are distinguished by the initial payload used as well as some differences in capabilities. This alert focuses on the second campaign as it is the most recent threat.” reads the alert. “Analysis shows a significant number of infected devices. In mid-June 2020, there were approximately 62,000 infected devices worldwide; of these, approximately 7,600 were in the United States and 3,900 were in the United Kingdom.”
Experts pointed out that any QNAP NAS device that was not updated is potentially vulnerable to QSnatch malware. The experts observed that once a device has been infected, the malicious code can prevent the installation of firmware updates.
According to the alert, the malware is relatively sophisticated and attackers demonstrate an awareness of operational security.
The infection vector is yet to be identified, anyway, the threat actors in both campaigns are not currently active. In the second campaign observed by the agencies, attackers were injecting the malware during the infection stage and subsequently using a domain generation algorithm (DGA) to set up a C2 channel.
The two agencies urge organizations to ensure their devices have not been previously infected, they recommend a full factory reset of the device before performing the firmware upgrade.
To prevent QSnatch malware infections, agencies recommend that organizations take the recommended measures in QNAP’s November 2019 advisory.
CISA and NCSC also recommend organizations consider the following mitigations:
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, QSnatch)
[adrotate banner=”5″]
[adrotate banner=”13″]