Executive Summary
Sophos recently reported on Deadbolt ransomware, a malware family targeting QNAP devices. QNAP released an advisory on the affected products.
Key Takeaways
- Deadbolt ransomware, first reported in early 2021, targets QNAP NAS devices.
- A recent variant of Deadbolt ransomware exploits CVE-2022-27593.
- Deadbolt threat actors use a unique ransom method, sending the victim the decryption key via a Bitcoin transaction if the ransom is paid.
What is Deadbolt ?
Deadbolt ransomware, which exploits CVE-2022-27593, was recently observed targeting QNAP NAS devices. The first reports on Deadbolt were released in early 2021. In an advisory, QNAP stated a new DeadBolt campaign was discovered on September 3rd, targeting QNAP NAS devices that are running Photo Station and exposed to the internet. CVE-2022-27593 involves an externally controlled reference that resolves to a resource outside of the intended control sphere, allowing threat actors to modify system files and launch ransomware attacks.
According to Trend Micro, Deadbolt is a 64-bit ELF file compiled using Go. Deadbolt must be run manually by the threat actor. It uses AES-128-CBC for encryption. Trend Micro noted it is possible to have more than one infection per device if the device has multiple ports open.
The threat actors behind Deadbolt employ a unique ransom method. The ransom note is displayed on the infected device’s web interface. It instructs the victim to pay a ransom to the specified Bitcoin address. Once payment is complete, the threat actors send a zero-value transaction to the victim with the AES decryption key included in the transaction details. Deadbolt also taunts the vendor with a ransom amount that, if paid, would allegedly count as a ransom payment for all affected victims.
QNAP provided the following recommendations for securing QNAP NAS devices:
- Disable the router’s port forwarding function.
- Use myQNAPcloud to enable secure remote access.
- Keep the NAS firmware up to date.
- Keep NAS applications up to date.
- Use strong passwords for all user accounts.
- Regularly backup data.
IOCs
PolySwarm has multiple samples of Deadbolt.
444e537f86cbeeea5a4fcf94c485cc9d286de0ccd91718362cecf415bf362bcf
81f8d58931c4ecf7f0d1b02ed3f9ad0a57a0c88fb959c3c18c147b209d352ff1
184747ba1f080561ceea7f0b96dd0a8c1de2b7b2bdc2fea39954949d29aeaca9
1ac1f9f9c519c7e141dcb1aa8157feca7943fd85db3d0a31f01e0fb44d239890
0a07c056fec72668d3f05863f103987cc1aaec92e72148bf16db6cfd58308617
You can use the following CLI command to search for all Deadbolt samples in our portal:
$ polyswarm link list -f Deadbolt
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or to subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports