The new malware, discovered by researchers at Qihoo 360's Network Security Research Lab (360 Netlab), is exploiting an already-patched remote code execution (RCE) vulnerability, which allowed attackers to break into the device and use it for malicious crypto mining tasks.
“According to the vendor’s request, we are not disclosing the technical details of the vulnerability in order to protect QNAP NAS users, [and] we speculate that there are still hundreds of thousands of online QNAP NAS devices with the vulnerability,” 360 Netlab noted in its report.
- These are the best NAS drives on the market
- Here’s our list of the best mining GPUs
- Keep your crypto in these best Bitcoin wallets
The researchers first noticed reports of the campaign in the beginning of March, quickly realising that what they dubbed UnityMiner could potentially infect all QNAP NAS devices running firmware versions that have not been patched since August 2020.
Despite a fix being available for over six months, the researchers discovered over 4.2 million NAS devices all over the world that can be potentially exploited by the malware.
Commenting on the workings of the malware, the researchers note that “the attacker customized the program by hiding the mining process and the real CPU memory resource usage information, so when the QNAP users check the system usage via the WEB management interface, they cannot see the abnormal system behavior.”
QNAP and the researchers have advised users to immediately update the firmware on their devices to thwart the attacks.
- Check out our roundup of the best endpoint protection software