QNAP, a Taiwan-based hardware and software services vendor, published a security advisory warning of a new crypto-mining malware variant that is targeting client network-attached storage (NAS) devices. While the advisory did not contain any information about how the malware gains a foothold on infected systems, the advisory notes that the crypto-miner has been observed as a process named “oom_reaper” with a process ID (PID) greater than 1000. This high PID number is atypical for kernel processes. The malware may take up to 50% of total CPU usage on infected devices. In late 2020 and early 2021, QNAP NAS devices were targeted by the Dovecat crypto-miner, as well as the credential theft botnet, Qsnatch.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security