QNAP warns users of brute-force attacks targeting NAS systems

Spread the love

QNAP warns of brute-force attacks targeting its NAS systems. The Taiwanese company advises its users to take additional security measures. It is not the first time that QNAP devices have been attacked by hackers.

According to the company, multiple users of QNAP devices reported various attempts by hackers to break into their devices through brute-force attacks. “If a weak or predictable password is used, it is very easy for the hackers to access the device,” said QNAP.

The Taiwanese company therefore advises its customers to set a strong password, change the default access port number of the device and disable the admin account, among other things. The latter can be done by first creating a new user account via the settings menu of the NAS system and then deactivating the default admin account.

Also in 2019, the Anomali Threat Research Team discovered that ransomware attacks were perpetrated on QNAP’s NAS systems with the eCh0raix ransomware. At the time, QNAP also recommended using strong passwords, among other things, but also disabling ssh and telnet and not using ports 8080 and 443 as the default.

You might also like
Exit mobile version