• Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us
Newsletter
Crypto Hoarding
  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us
No Result
View All Result
  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us
No Result
View All Result
Crypto Hoarding
No Result
View All Result
Home Cryptocurrency Hackers

Hackers Exploit QNAP Vulnerabilities to Turn NAS Devices Into Crypto Miners – Tom’s Hardware

Admin by Admin
March 9, 2021
in Cryptocurrency Hackers
0
Hackers Exploit QNAP Vulnerabilities to Turn NAS Devices Into Crypto Miners – Tom’s Hardware
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Qihoo 360’s Network Security Research Lab said Friday that vulnerabilities in QNAP products have been exploited to turn NAS devices into cryptocurrency miners. Those devices were tampered with to hide their CPU usage, too, making it difficult for their owners to discover something was wrong if they checked their system’s diagnostics.

It seems like the efforts were pretty straightforward: Attackers reportedly exploited vulnerabilities in QNAP products to gain root access to them, installed mining software that was configured to use only half of the available CPU cores, and then covered their tracks by making CPU usage rates and temperatures appear normal.

Related articles

Chainalysis introduces its Web3 based blockchain analysis tool: Blog – The Financial Express

Chainalysis introduces its Web3 based blockchain analysis tool: Blog – The Financial Express

May 21, 2022

After Luna Collapse, Terra Looks to New Blockchain. This Week’s Top Bitcoin and Crypto News – CNET

May 21, 2022

The cryptocurrency mined by a single NAS isn’t worth the trouble of finding a vulnerability, exploiting it, and configuring it in this manner. The attackers probably had no intention of limiting their efforts to a single NAS, however. Schemes like this are all about achieving as much scale as possible as quickly as possible.

Put another way: It wouldn’t matter if each affected NAS only net the hackers $0.01 every day so long as they were able to infect a decent number of devices. They would also offset the costs of crypto mining—namely the upfront costs of buying a device and the ongoing cost of powering it—to their victims. All gain, no pain.

Note that while CPU mining of cryptocurrencies generally takes a back seat to GPU and ASIC mining, certain algorithms (specifically CryptoNightR used in Monero) can provide decent returns. Even an old Core i5-7600K 4-core CPU can do about $0.15-$0.20 per day (not counting electrical costs), while an i9-9900K can do nearly $0.50 per day. Infecting tens of thousands of NAS devices obviously gets into large sums of cryptocurrency very quickly, and Monero also happens to be a ‘privacy coin’ — meaning it’s not possible to track where coin transfers go.

The researchers didn’t offer many specifics, however, because they “speculate that there are still hundreds of thousands of online QNAP NAS devices with the vulnerability.” That’s a fraction of the nearly 4.3 million online devices they said they found using one of their security tools, but it’s still nothing to sneeze at.

That number might be lower if the researchers had followed the industry standard process of giving vendors 90 days to respond to vulnerability disclosures. Instead the researchers at 360 Netlab said they discovered the scheme on March 2 and disclosed it to QNAP on March 3. They published a blog post about it on March 5.

The researchers said they rushed to share their discovery with the public “due to the possible big impact” of the security flaws. We’ve reached out to QNAP to confirm the timeline established in 360 Netlab’s blog post as well as its potential impact and will update this post if the company responds.

For now, the researchers at 360 Netlab said the vulnerabilities it discovered were present in all of the QNAP NAS firmware released before August 2020. Ensuring a device has the most recent firmware should limit its exposure, and the researchers provided a list of IPs and URLs to block for additional security, too.

Share76Tweet47

Related Posts

Chainalysis introduces its Web3 based blockchain analysis tool: Blog – The Financial Express

Chainalysis introduces its Web3 based blockchain analysis tool: Blog – The Financial Express

by Admin
May 21, 2022
0

Chainalysis has introduced its new, Web3-native blockchain analysis tool called the Chainalysis Storyline, aiming to visualise smart contract extensions, as...

After Luna Collapse, Terra Looks to New Blockchain. This Week’s Top Bitcoin and Crypto News – CNET

by Admin
May 21, 2022
0

After two linked cryptocurrencies collapsed and became almost worthless, a plan emerged to create a new blockchain for the luna...

Avoiding Risks by Using Secure Online Crypto Platform – HackRead

Avoiding Risks by Using Secure Online Crypto Platform – HackRead

by Admin
May 20, 2022
0

Cryptocurrency theft has become a common issue in the online trading space, thus making most investors take a step back...

Has your Instagram account been hacked? Here’s how to protect yourself on social media – The Globe and Mail

Has your Instagram account been hacked? Here’s how to protect yourself on social media – The Globe and Mail

by Admin
May 20, 2022
0

Instagram users are reporting an influx of hackers getting access to personal accounts via their networks.Dado Ruvic/ReutersInstagram users are reporting...

Crypto is making New York winemakers angry – POLITICO

Crypto is making New York winemakers angry – POLITICO

by Admin
May 19, 2022
0

With help from Sam Sabin and Derek Robertson Rick Rainey, managing partner of Forge Cellars near Seneca Lake, gets wine...

Load More
  • Trending
  • Comments
  • Latest

SteveWillDoIt reveals hacker stole his crypto wallet: “I lost a lot of money” – Dexerto

July 26, 2021
Major Changes Coming to XRP Ledger As Ripple-Backed Startup Launches Key Amendment in Beta Testnet – The Daily Hodl

Major Changes Coming to XRP Ledger As Ripple-Backed Startup Launches Key Amendment in Beta Testnet – The Daily Hodl

April 21, 2021
Forte’s PTI gets financial transaction licenses for blockchain games – VentureBeat

Forte’s PTI gets financial transaction licenses for blockchain games – VentureBeat

February 11, 2022
DOGE passes Uniswap and Litecoin to become 8th largest cryptocurrency by market cap – Cointelegraph

DOGE passes Uniswap and Litecoin to become 8th largest cryptocurrency by market cap – Cointelegraph

April 15, 2021
Why is Ethereum used for NFTs? – Cointelegraph

Why is Ethereum used for NFTs? – Cointelegraph

0

Rivals Ripple and R3 partner up | PaymentsSource – American Banker

0
Ripple seeks shelter in D.C. from Libra’s political storm – American Banker

Ripple seeks shelter in D.C. from Libra’s political storm – American Banker

0

Litecoin Gets Bullish Speculation, at Last, as Upgrade Approaches – Coindesk

0
Why is Ethereum used for NFTs? – Cointelegraph

Why is Ethereum used for NFTs? – Cointelegraph

May 21, 2022
Chainalysis introduces its Web3 based blockchain analysis tool: Blog – The Financial Express

Chainalysis introduces its Web3 based blockchain analysis tool: Blog – The Financial Express

May 21, 2022
Can Litecoin’s [LTC] long-awaited MWEB update shine a light to end this darkness – AMBCrypto News

Can Litecoin’s [LTC] long-awaited MWEB update shine a light to end this darkness – AMBCrypto News

May 21, 2022

After Luna Collapse, Terra Looks to New Blockchain. This Week’s Top Bitcoin and Crypto News – CNET

May 21, 2022
Crypto Hoarding

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Categories tes

  • Bitcoin
  • Blockchain
  • Cryptocurrency Hackers
  • Ethereum
  • Litecoin
  • Ripple

Newsletter

[mc4wp_form]

  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us

© 2017 JNews - Crafted with love by Jegtheme.

No Result
View All Result
  • Home
  • Bitcoin
  • Ethereum
  • Blockchain
  • Cryptocurrency Hackers
  • Ripple
  • Litecoin
  • Contact Us

Copyright (c) 2021 - Crypto Hoarding - All Rights Reserved - web design by TechyRack