Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
Reference:
Advisory #2022-22
Version:
1.0
Affected software:
Internet facing QNAP Devices with photo station
CVE/CVSS:
CVE-2022-27593 CVSS:9.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
https://www.qnap.com/en/security-advisory/qsa-22-24
DeadBolt ransomware operators are actively exploiting a QNAP Photostation 0-day vulnerability in the wild. The vulnerability affects Internet facing QNAP Devices with photo station.
QNAP released security updates 12 hours after detecting the surge in Ransomware attacks.
The Centre for Cyber security Belgium recommends system administrators patch vulnerable systems as soon as possible and analyse system and network logs for any suspicious activity.
This report has instructions to help your organisation.
In case of an intrusion, you can report an incident via: https://cert.be/en/report-incident
Scope
Create an inventory that includes all the software from your organisation and check per entry if it is vulnerable.
The vulnerability is fixed in the versions below:
Patch
To protect your NAS from the DeadBolt ransomware, QNAP strongly recommends securing your QNAP NAS devices and routers by following these instructions:
Mitigate
QuMagie is a simple and powerful alternative to Photo Station. QNAP recommends using QuMagie to efficiently manage photo storage in your QNAP NAS.
Extra Precautions
QNAP NAS should not be directly connected to the internet.Use the myQNAPcloud Link feature provided by QNAP, or enable the VPN service, to limit your attack surface.
Monitor/Detect
The CCB recommends organisations to upscale monitoring and detection capabilities and to detect any related suspicious activity, ensuring a fast response in case of an intrusion.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
When applying patches to systems that have been vulnerable to an RCE exploit, a proactive threat assessment should be performed to verify no exploitation occurred in the time between a patch becoming available and being applied.
Reference QNAP guide: https://www.qnap.com/en/security-advisory/qsa-22-24