logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)
  • How the combination of XDR and SIEM can improve SOC operations
  • MOVEit Transfer zero-day was exploited by Cl0p gang (CVE-2023-34362)
  • Cybercriminals Exploit Legitimate Websites for Credit Card Theft
  • Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-33641 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33642 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33640 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33643 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33631 (magic_r300-2100m_firmware) 31 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Uninformed QNAP NAS devices are breached for cryptomining

Posted on 9 March 2021

From en.secnews.gr

QNAP NAS

Not updated network-attached storage (NAS) Appliances of QNAP are in the crosshairs hackers, trying to take control and install cryptomining malware for cryptocurrency mining.

Read more…

Posted in News

Post navigation

Previous post: Hackers hiding Supernova malware in SolarWinds Orion linked to China
Next post: SharpSphere : .NET Project For Attacking vCenter
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.