![]() ![]() These features describe the malware's capabilities but don't reveal its end-goal. Extracts and steals usernames and passwords for all NAS users.Prevents the native QNAP MalwareRemover App from running.Prevent future firmware updates by overwriting update source URLs.Modify OS timed jobs and scripts (cronjob, init scripts).NCSC-FI members have not yet discovered how this new threat spreads and infects QNAP NAS systems however, once it gains access to a device, QSnatch burrows into the firmware to gain reboot persistence.Īn analysis of the malware's code revealed the following capabilities: The only report comes from the National Cyber Security Centre of Finland (NCSC-FI), the first cybersecurity organization to spot the malware last week. Information on how QSnatch works is still scant, at the time of writing. Thousands more are believed to be infected worldwide, in what appears to be an ongoing outbreak. Over 7,000 infections have been reported in Germany alone, the German Computer Emergency Response Team (CERT-Bund) said today. ![]() ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |