Security News > 2021 > January > QNAP Warns NAS Users of 'dovecat' Malware Attacks
QNAP this week warned users of attacks targeting QNAP NAS devices with a piece of malware named "Dovecat."
The cybercriminals behind dovecat, QNAP explains, are installing Bitcoin miners on the compromised NAS devices, without user consent.
In a November 2020 knowledgebase article, the company pointed out that users of any NAS model series can detect potential compromise by looking for a dovecat process running on their devices.
At the time, the company also encouraged users to report all identified infections, and to ensure that they are running the latest versions of the NAS firmware and Malware Remover.
QNAP also tells users they should avoid using default port numbers, and encourages them to enhance the security of their NAS devices by following best practices that the company has already detailed.
"These actions can further enhance NAS security and make it harder for dovecat to enter your QNAP NAS," the company says, adding that it is focused on developing a solution that will help users remove the dovecat malware from the infected devices.
News URL
Related news
- QNAP fixes NAS backup software zero-day exploited at Pwn2Own (source)
- Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443) (source)
- VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Critical bug in EoL D-Link NAS devices now exploited in attacks (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
- QNAP pulls buggy QTS firmware causing widespread NAS issues (source)
- QNAP addresses critical flaws across NAS, router software (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- FBI spots HiatusRAT malware attacks targeting web cameras, DVRs (source)