QNAP Force-Installs Update After Ransomware Attack

You may recall that only a few days ago, the DeadBolt ransomware group began encrypting QNAP NAS systems all over the world, claiming that they were doing so in order to take advantage of a zero-day vulnerability in the device’s software.

Customers using QNAP realized that their files had been encrypted and that their file names had been prefixed with the.deadbolt file suffix, when the assaults first started to take place.


The threat actor claims to be using a zero-day vulnerability to hack into QNAP devices and encrypt data with the DeadBolt ransomware, which appends the.deadbolt suffix to file names once they have been encrypted.

How Is Qnap Dealing With the Situation?

QNAP has forced Network Attached Storage (NAS) devices to be upgraded with software that contains the most recent security patch in order to protect its customers from the DeadBolt ransomware.

A day after becoming aware of the assault, QNAP issued a warning to clients, advising them to protect their Internet-connected NAS systems from DeadBolt by upgrading to the most recent QTS software version, deactivating UPnP, and turning off port forwarding.

Soon after issuing the warning QNAP took a more drastic step and forced all customers’ NAS

Read More: https://heimdalsecurity.com/blog/qnap-force-installs-update-after-ransomware-attack/