Asustor NAS devices hit by Deadbolt ransomware attack

No ransom demands made yet, but Asustor NAS users should be on their guard

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Followingransomwareattacks against QNAP NAS devices, it is now Asustor’s turn to suffer, according to multiple reports of AsustorNAS devicesbeing attacked by the DeadBolt ransomware.

It’s still not known exactly how the attackers managed to compromise Asustor devices, as well as which models are susceptible to the attack. This is partly because the company is still keeping quiet about it, but user should hopefully receive a statement, as well as a patch, sooner rather than later.

Allegedly, AS6602T, AS-6210T-4K, AS5304T, AS6102T, or AS5304T are invulnerable to these attacks, while AS5304T, AS6404T, AS5104T, and AS7004T, seem to be affected.

We’re looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn’t take more than 60 seconds of your time. Thank you for taking part.

Click here to start the survey in a new window«

No ransom demand yet

No ransom demand yet

Initial reports suggest that the attackers managed to compromise a vulnerability found in Asustor’s EZ Connect utility, a feature that allows users to connect to the NAS system remotely.

The attackers have made no ransom demands yet.

In the case of QNAP, which was also attacked with DeadBolt, the operators demanded 0.03 bitcoin, or approximately $1,100, at press time. They also offered to sell the details on the vulnerability itself for five bitcoin (around $185,000), as well as a master decryption key against the malware for 50 bitcoin ($1.85 million).

QNAP NAS devices hit with surge of ransomware attacks>QNAP NAS devices left encrypted by Deadbolt ransomware>QNAP extends support for older NAS devices amid surge in attacks

Until we hear from Asustor, the best way to stay safe is to disconnect theendpointsfrom the internet entirely. Users who own one of the unaffected variants, but still would like to make some security precautions, should disable EZ Connect, automatic updates, SSH, block all NAS ports from the router, and only allow connections from within the network, some Asustor users are suggesting.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

QNAP users have had it rough, lately. Besides being attacked by Deadbolt, they also suffered a ransomware attack at the hands of eCh0raix ransomware. In late December last year, the affected users were demanded between .024 and .06 bitcoin ($880 - $2,200) for the decryption key.

A free decryptor is available online, but only for older versions of the ransomware. For the newer versions (1.0.5. and 1.0.6.), there is currently no free option to decrypt data following an infection.

To keep NAS devices secure and shield against future attacks, QNAP has prepared a series of recommendations and best practices, which can be foundhere.

Via:Tom’s Hardware

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Cisco issues patch to fix serious flaw allowing possible industrial systems takeover

Washington state court systems taken offline following cyberattack

The iPhone 18 series could include a variable aperture, ‘significantly enhancing’ the camera