QNAP has urged its customers to install and run its latest firmware and malware removal tools on their NAS boxes amid a surge in ransomware infections.
Two file-scrambling nasties, Qlocker and eCh0raix, are said to be tearing through vulnerable QNAP storage equipment, encrypting data and demanding ransoms to restore the information.
In response, QNAP said on Thursday users should do the following to avoid falling victim:
Install the latest software updates for the Multimedia Console, Media Streaming Add-on, and Hybrid Backup Sync apps on their QNAP NAS gear to close off vulnerabilities that can be exploited by ransomware to infect devices.
Install the latest Malware Remover tool from QNAP, and run a malware scan. The manufacturer said it has "released an updated version of Malware Remover for operating systems such as QTS and QuTS hero to address the ransomware attack."
Change the network port of the web-based user interface away from the default of 8080, presumably to mitigate future attacks.
Make sure they use strong, unique passwords that can't easily be brute-forced or guessed.
If possible, follow the 3-2-1 rule on backups: have at least three good copies of your documents stored on at least two types of media, at least one of which is off-site.
QNAP also warned:
How exactly is the ransomware getting onto people's network-attached storage systems? Well, look no further than these three critical vulnerabilities that QNAP patched this month and highlighted today in its warning to customers:
CVE-2020-36195 aka QSA-21-11: An SQL ..