Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: us-cert.cisa.gov

Original release date: July 27, 2020

Summary

This is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdomโ€™s National Cyber Security Centre (NCSC).

CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network Attached Storage (NAS) devices manufactured by the firm QNAP. ย 

All QNAP NAS devices are potentially vulnerable to QSnatch malware if not updated with the latest security fixes. The malware, documented in open-source reports, has infected thousands of devices worldwide with a particularly high number of infections in North America and Europe. Further, once a device has been infected, attackers can prevent administrators from successfully running firmware updates.

This alert summarizes the findings of CISA and NCSC analysis and provides mitigation advice.

Technical Details

Campaigns ย 

CISA and NCSC have identified two campaigns of activity for QSnatch malware. The first campaign likely began in early 2014 and continued until mid-2017, while the second started in late 2018 and was still active in late 2019. The two campaigns are distinguished by the initial payload used as well as some differences in capabilities. This alert focuses on the second campaign as it is the most recent threat. ย 

It is important to note that infrastructure used by the malicious cyber actors in both campaigns is not currently active, but the threat remains to unpatched devices. ย 

Although the identities and objectives of the malicious cyber actors using QSnatch are currently unknown, the malware is relatively sophisticated, and the cyber actors demonstrate an awareness of operational security.

Global distribution of infections ย 

Analysis shows a significant number of infected devices. In mid-June 2020, there were approximately 62,000 infected devices worldwide; of these, approximately 7,600 were in the United States and 3,900 were in the United Kingdom. Figure 1 below shows the location of these devices in broad geographic terms.

Figure 1: Locations ofย QNAP NAS devices infected by QSnatch

Delivery and exploitation

The infection vector has not been identified, but QSnatch appears to be injected into the device firmware during the infection stage, with the malicious code subsequently run within the device, compromising it. The attacker then uses a domain generation algorithm (DGA)โ€”to establish a command and control (C2) channel that periodically generates multiple domain names for use in C2 communicationsโ€”using the following HTTP GET request:

HTTP GET https://[generated-address]/qnap_firmware.xml?=t[timestamp][1]

Malware functionalities ย 

Analysis shows that QSnatch malware contains multiple functionalities, such as: ย 

  • CGI password logger ย 
    • This installs a fake version of the device admin login page, logging successful authentications and passing them to the legitimate login page.
  • Credential scraper
  • SSH backdoor ย 
    • This allows the cyber actor to execute arbitrary code on a device.
  • Exfiltration
    • When run, QSnatch steals a predetermined list of files, which includes system configurations and log files. These are encrypted with the actorโ€™s public key and sent to their infrastructure over HTTPS.
  • Webshell functionality for remote access

Persistence

The malware appears to gain persistence by preventing updates from installing on the infected QNAP device. The attacker modifies the system hostโ€™s file, redirecting core domain names used by the NAS to local out-of-date versions so updates can never be installed.ย ย 

Samples

The following tables provide hashes of related QSnatch samples found in open-source malware repositories. File types fall into two buckets: (1) shell scripts (see table 1) and (2) shell script compiler (SHC)-compiled executable and linking format (ELF) shell scripts (see table 2). One notable point is that some samples intentionally patch the infected QNAP for Samba remote code execution vulnerability CVE-2017-7494. ย 

Table 1: QSnatch samples โ€“ shell scripts

SH Samples (SHA256)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ย 

Table 2: QSnatch samples โ€“ SHC-compiled ELF shell scripts

SH Samples (SHA256)
18a4f2e7847a2c4e3c9a949cc610044bde319184ef1f4d23a8053e5087ab641b
3615f0019e9a64a78ccb57faa99380db0b36146ec62df768361bca2d9a5c27f2
845759bb54b992a6abcbca4af9662e94794b8d7c87063387b05034ce779f7d52
6e0f793025537edf285c5749b3fcd83a689db0f1c697abe70561399938380f89

Mitigations

As stated above, once a device has been infected, attackers have been known to make it impossible for administrators to successfully run the needed firmware updates. This makes it extremely important for organizations to ensure their devices have not been previously compromised. Organizations that are still running a vulnerable version must run a full factory reset on the device prior to completing the firmware upgrade to ensure the device is not left vulnerable.

The usual checks to ensure that the latest updates are installed still apply. To prevent reinfection, this recommendation also applies to devices previously infected with QSnatch but from which the malware has been removed.

To prevent QSnatch malware infections, CISA and NCSC strongly recommend that organizations take the recommended measures in QNAPโ€™s November 2019 advisory.[2]

CISA and NCSC also recommend organizations consider the following mitigations: ย 

  • Verify that you purchased QNAP devices from reputable sources. ย 
    • If sources are in question, run a full factory reset on the device prior to completing the firmware upgrade. For additional supply chain recommendations, see CISAโ€™s tip on Securing Network Infrastructure Devices.
  • Block external connections when the device is intended to be used strictly for internal storage.

References

Revisions

  • July 27, 2020: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.

...



๐Ÿ“Œ Storage Maker QNAP Warns of Malware Targeting Its NAS Devices


๐Ÿ“ˆ 40.17 Punkte

๐Ÿ“Œ US, UK Warn of Malware Targeting QNAP NAS Devices


๐Ÿ“ˆ 40.17 Punkte

๐Ÿ“Œ Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack


๐Ÿ“ˆ 36.32 Punkte

๐Ÿ“Œ Hackers Are Targeting a Three-Year Old Vulnerability in QNAP NAS Devices


๐Ÿ“ˆ 35.56 Punkte

๐Ÿ“Œ eCh0raix ransomware starts targeting QNAP NAS devices again


๐Ÿ“ˆ 35.56 Punkte

๐Ÿ“Œ Dovecat crypto-miner is targeting QNAP NAS devices


๐Ÿ“ˆ 35.56 Punkte

๐Ÿ“Œ QNAP Investigating New Attacks Targeting NAS Devices


๐Ÿ“ˆ 35.56 Punkte

๐Ÿ“Œ QNAP warns of new Checkmate ransomware targeting NAS devices


๐Ÿ“ˆ 35.56 Punkte

๐Ÿ“Œ Legacy Malware and Legacy Systems Are Not a Legacy Problem


๐Ÿ“ˆ 34.94 Punkte

๐Ÿ“Œ QNAP NAS Devices at Risk of Remote Malicious Code Injection


๐Ÿ“ˆ 33.64 Punkte

๐Ÿ“Œ AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad


๐Ÿ“ˆ 31.58 Punkte

๐Ÿ“Œ AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad


๐Ÿ“ˆ 31.58 Punkte

๐Ÿ“Œ AA20-275A: Potential for China Cyber Response to Heightened U.S.โ€“China Tensions


๐Ÿ“ˆ 31.58 Punkte

๐Ÿ“Œ Thousands of QNAP NAS devices have been infected with the QSnatch malware


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ Thousands of QNAP NAS devices have been infected with the QSnatch malware


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ QSnatch - Malware designed for QNAP NAS devices


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ QSnatch malware already infected thousands of QNAP NAS devices


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ Expert Comments On QSnatch Malware Infecting QNAP NAS Devices


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ CISA says 62,000 QNAP NAS devices have been infected with the QSnatch malware


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ CISA Warns that More than 62,000 QNAP NAS Devices Affected with QSnatch Malware


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ QNAP warns users to secure NAS devices against Dovecat malware


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ QSnatch malware infected over 62,000 QNAP NAS Devices


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ 62,000 QNAP NAS devices infected with persistent QSnatch malware


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ QSnatch Data-Stealing Malware Infected Over 62,000 QNAP NAS Devices


๐Ÿ“ˆ 30.81 Punkte

๐Ÿ“Œ AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector


๐Ÿ“ˆ 29.37 Punkte

๐Ÿ“Œ AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks


๐Ÿ“ˆ 29.37 Punkte

๐Ÿ“Œ QNAP Warns of New 'Deadbolt' Ransomware Attacks Targeting NAS Users


๐Ÿ“ˆ 29.16 Punkte

๐Ÿ“Œ Ransomware Strain Qlocker Targeting QNAP NAS Flaws โ€“ Patch It!


๐Ÿ“ˆ 29.16 Punkte

๐Ÿ“Œ Experts warn of a new eCh0raix ransomware campaign targeting QNAP NAS


๐Ÿ“ˆ 29.16 Punkte

๐Ÿ“Œ NAS: Qnap blendet Bannerwerbung auf eigenen NAS-Systemen ein


๐Ÿ“ˆ 29.11 Punkte

๐Ÿ“Œ Tape-in-NAS-System als kombinierte NAS- und Backup-Plattform jetzt auch als Ti-NAS RT in ...


๐Ÿ“ˆ 27.91 Punkte

๐Ÿ“Œ 37C3 - Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices


๐Ÿ“ˆ 26.63 Punkte

๐Ÿ“Œ eCh0raix Ransomware Targeting QNAP Devices


๐Ÿ“ˆ 26.26 Punkte











matomo