Hackers Exploit QNAP Vulnerabilities to Turn NAS Devices Into Crypto Miners

Source: Tom's Hardware added 09th Mar 2021

  • hackers-exploit-qnap-vulnerabilities-to-turn-nas-devices-into-crypto-miners

(Image credit: Shutterstock)

Qihoo 360’s Network Security Research Lab said Friday that vulnerabilities in QNAP products have been exploited to turn NAS devices into cryptocurrency miners. Those devices were tampered with to hide their CPU usage, too, making it difficult for their owners to discover something was wrong if they checked their system’s diagnostics.

It seems like the efforts were pretty straightforward: Attackers reportedly exploited vulnerabilities in QNAP products to gain root access to them, installed mining software that was configured to use only half of the available CPU cores, and then covered their tracks by making CPU usage rates and temperatures appear normal.

The cryptocurrency mined by a single NAS isn’t worth the trouble of finding a vulnerability, exploiting it, and configuring it in this manner. The attackers probably had no intention of limiting their efforts to a single NAS, however. Schemes like this are all about achieving as much scale as possible as quickly as possible.

Put another way: It wouldn’t matter if each affected NAS only net the hackers $0.01 every day so long as they were able to infect a decent number of devices. They would also offset the costs of crypto mining—namely the upfront costs of buying a device and the ongoing cost of powering it—to their victims. All gain, no pain.

Note that while CPU mining of cryptocurrencies generally takes a back seat to GPU and ASIC mining, certain algorithms (specifically CryptoNightR used in Monero) can provide decent returns. Even an old Core i5-7600K 4-core CPU can do about $0.15-$0.20 per day (not counting electrical costs), while an i9-9900K can do nearly $0.50 per day. Infecting tens of thousands of NAS devices obviously gets into large sums of cryptocurrency very quickly, and Monero also happens to be a ‘privacy coin’ — meaning it’s not possible to track where coin transfers go.

The researchers didn’t offer many specifics, however, because they “speculate that there are still hundreds of thousands of online QNAP NAS devices with the vulnerability.” That’s a fraction of the nearly 4.3 million online devices they said they found using one of their security tools, but it’s still nothing to sneeze at.

That number might be lower if the researchers had followed the industry standard process of giving vendors 90 days to respond to vulnerability disclosures. Instead the researchers at 360 Netlab said they discovered the scheme on March 2 and disclosed it to QNAP on March 3. They published a blog post about it on March 5.

The researchers said they rushed to share their discovery with the public “due to the possible big impact” of the security flaws. We’ve reached out to QNAP to confirm the timeline established in 360 Netlab’s blog post as well as its potential impact and will update this post if the company responds.

For now, the researchers at 360 Netlab said the vulnerabilities it discovered were present in all of the QNAP NAS firmware released before August 2020. Ensuring a device has the most recent firmware should limit its exposure, and the researchers provided a list of IPs and URLs to block for additional security, too.

Read the full article at Tom's Hardware

brands: Core  Decent  Discovery  It  Million  One  QNAP  Recent  WAS  
media: Tom's Hardware  
keywords: Core i5  Software  

Related posts


Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88

Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88

Related Products



Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91

Warning: Invalid argument supplied for foreach() in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91