Will We Never Learn?

Will We Never Learn?

As further proof that we are not only losing this cybersecurity war, we seem to be barely engaged with the pace of our adversaries.

Case in point is the discovery this week of a new strain of malware that has infected thousands of network-attached storage (NAS) devices for the apparent purpose of establishing a botnet beachhead from which to launch future DDoS attacks or a huge global crypto-mining operation.

It may also be a back-door set-up for future hosted malware payload delivery, but whatever the purpose, it’s a world-wide outbreak and the only cure is to perform a full factory reset of the infected devices.

No alt text provided for this image

The targeted devices appear to be from the Taiwanese NAS vendor QNAS and the malware is aptly named QSnatch. Once it gains access to the NAS device, it burrows into the firmware rendering it resistant to reboots. As a result, system owners can’t run the native QNAP MalwareRemover App, because it gets rejected and while it is busy extracting and stealing all user IDs and passwords, it manages to prevent all firmware updates by simply overwriting the update source URLs.

But in addition to all of that, QSnatch definitely can connect to a remote command-and-control, download, and then run whatever other modules it so chooses, according to the National Cyber Security Centre of Finland (NCSC-FI), who were the first cybersecurity organization to discover the infection.

As with so many other “fixes”, the prevailing advice is for QNAP NAS owners to disconnect their devices from the internet, change all of the passwords and all of the accounts, remove all unknown user accounts, confirm that the firmware is up-to-date and all of the applications are also updated and to remove any unknown or unused applications from the device and install a new access control list.

Sure. No problem.

No alt text provided for this image

We embrace NAS devices because they are one of the easiest and cheapest ways to get more data storage space and access/navigate it from anywhere without the storage caps and other ongoing expenses of cloud services. But, unlike cloud services, NAS devices add another layer of complexity to the cybersecurity puzzle that someone needs to deal with. Not to say cloud computing is secure, but compared to a native NAS device cluster, it starts to resemble Fort Knox.

It is almost as if we consciously ignore the lessons of the past and plunge headlong into these technology “advances” based on the promise of efficiency, cost savings and speeds and feeds with no regard for expansion of our threat landscape, and then we are always shocked to hear that we’ve been compromised yet again.

QSnatch is not the first by the way. We saw an earlier ransomware strain that infected Synology NAS devices, and other prior ransomware strains that impacted QNAP devices as well.

While we’re in this vein, we also discovered this week that over 21 million login credentials stolen from Fortune 500 companies were posted for sale on the dark web, most already cracked and available in plaintext form.

No alt text provided for this image

But the truly extraordinary news here is that roughly 5 million of them were ridiculous, with the catchy “password” password appearing along with closely similar variants in the top 5. In addition, almost 25% of all the passwords found were identical or only a few minutes of computer cracking cycles similar to others from the same user. Among my favorites are “000000”, “111111” and “123456”. It’s no wonder that Healthcare is so often and so successfully attacked.

Will we never learn?

Derek Krein, CASP, GSTRT

Award Winning: Security Architect ?? Strategist ?? Innovator ?? Problem Solver ?? Evangelist ?? Speaker

5 年

Seems the simple things always come back to haunt us.

要查看或添加评论,请登录

Steve King, CISM, CISSP的更多文章

  • Connected Device Security: A Growing Threat

    Connected Device Security: A Growing Threat

    Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have…

    3 条评论
  • China’s Ticking Time-Bomb.

    China’s Ticking Time-Bomb.

    It should now be clear to even the casual observer that China has been spying on us for years and stealing reams of…

    7 条评论
  • Comparing Major Crises To COVID-19: A Teachable Moment

    Comparing Major Crises To COVID-19: A Teachable Moment

    Lessons from past financial crises might prepare us for the long and short-term effects of COVID-19 on the economy and…

  • The Escalating Cyber-Threat From China

    The Escalating Cyber-Threat From China

    A Modern-day Munich Agreement In an article penned back in May of 2015 in a policy brief published by the Harvard…

    1 条评论
  • Cybersecurity: Past, present, future.

    Cybersecurity: Past, present, future.

    We have made a flawed assumption about cybersecurity and based on that assumption we have been investing heavily on…

    15 条评论
  • Three Marketing Tips for Improved Conversion Rates

    Three Marketing Tips for Improved Conversion Rates

    While we are all devastated to one degree or another by this outbreak and with the knowledge that it will likely change…

  • Coronavirus in the Dark.

    Coronavirus in the Dark.

    So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a…

    13 条评论
  • Panicky Investors Issue Dire Warning On Coronavirus

    Panicky Investors Issue Dire Warning On Coronavirus

    Sequoia Capital just issued a dire warning to its portfolio companies. “Coronavirus is the black swan of 2020.

    5 条评论
  • AI in Cybersecurity? Closing In.

    AI in Cybersecurity? Closing In.

    "AI Needs to Understand How the World Actually Works" On Wednesday, February 26th, Clearview AI, a startup that…

    8 条评论
  • Do CapitalOne Shareholders Have a Case Against AWS?

    Do CapitalOne Shareholders Have a Case Against AWS?

    An adhesion contract (also called a "standard form contract" or a "boilerplate contract") is a contract drafted by one…

    1 条评论

社区洞察

其他会员也浏览了