PatchDay Alert
Analysis · 4 min read · 844 words By The Commentary Desk · Commentary

DeadBolt skipped the network intrusion and just encrypted the NAS directly

Most ransomware has to break in, escalate, and spread before it encrypts anything. DeadBolt found internet-exposed QNAP NAS devices, exploited a Photo Station bug, and encrypted the files in place. On a NAS, the device is the data, and that changes the whole attack.

DeadBolt skipped the network intrusion and just encrypted the NAS directly

The usual ransomware story has a lot of steps: phish a user, get a foothold, escalate to admin, move laterally, find the file servers and backups, then encrypt. DeadBolt skipped almost all of it. It scanned the internet for QNAP NAS devices, exploited a vulnerability in the Photo Station app, and encrypted the files sitting on the device, directly. No lateral movement, no privilege escalation, no domain to compromise. On a NAS, the box is the data, so reaching the box is reaching the data. CVE-2022-27593 was the September 2022 entry point, and it’s one of a long run of QNAP bugs that turned consumer and small-business storage appliances into direct ransomware targets.

What the bugs are

CVE-2022-27593 is an externally-controlled-reference flaw (CWE-610) in QNAP’s Photo Station app that let a remote, unauthenticated attacker modify system files and install ransomware, with no user interaction. QNAP detected the DeadBolt campaign exploiting it on September 3, 2022, and CISA added it to the Known Exploited Vulnerabilities catalog on September 8 with the ransomware flag. Photo Station isn’t installed by default, but it’s popular, and the affected devices were the ones exposing it to the internet.

It wasn’t the first time. The 2019 QNAP Photo Station and QTS cluster, CVE-2019-7192 (improper access control), CVE-2019-7193, CVE-2019-7194, and CVE-2019-7195, chained for unauthenticated remote code execution on QNAP devices and were exploited by ransomware crews including eCh0raix and Qlocker. CISA listed those on June 8, 2022. QNAP appears in the catalog repeatedly; these appliances are a sustained target.

Why a NAS is a different kind of ransomware victim

The thing that makes NAS ransomware distinct is the collapse of the usual attack chain into a single step. For an enterprise file server, ransomware has to traverse the network to reach it. For an internet-exposed NAS, the data and the internet-facing vulnerable service are the same device, so the “intrusion” and the “encryption” happen in one move. That has a few consequences worth sitting with:

  • The victims are often the least equipped. QNAP NAS devices are heavily used by home users, prosumers, and small businesses, exactly the populations without security teams, patch programs, or backups stored anywhere but the NAS itself.
  • Port forwarding is the enabler. People expose their NAS to the internet for remote access, often by enabling UPnP or port forwarding without fully realizing they’ve put their entire file store one vulnerability away from the world. DeadBolt found those devices by scanning.
  • The backup is on the box being encrypted. The cruel irony of NAS ransomware is that the NAS often is the backup, so encrypting it takes out both the primary data and the recovery copy at once.

DeadBolt also industrialized the model, encrypting thousands of devices and even offering QNAP itself a payment for a universal decryption key, which is a long way from the targeted, hands-on-keyboard enterprise ransomware playbook.

What to do

  • Disable port forwarding and UPnP for the NAS, and take it off the internet. This is the single most effective step. A NAS that isn’t reachable from the internet can’t be found by mass-scanning ransomware. Use the vendor’s secure remote-access offering or a VPN if you need remote access, not a forwarded port.
  • Update QTS/QuTS firmware and every installed app, especially Photo Station. Apply the fixed Photo Station versions for your QTS release, and keep apps current; these bugs are in the apps as much as the OS.
  • Remove apps you don’t use. Photo Station isn’t installed by default. If you’re not using it, uninstall it and shrink the attack surface.
  • Get backups off the NAS. The 3-2-1 rule exists for exactly this: keep at least one backup copy on separate media or offline, so encrypting the NAS doesn’t take your only copy with it. Test that you can restore from it.
  • For MSPs and IT providers: inventory client NAS devices. Small-business QNAP and similar boxes are easy to forget and are prime DeadBolt targets. Track them, get them off the internet, and keep them patched.

The reframe is for how you think about storage appliances. A NAS feels like infrastructure, set-and-forget, but an internet-exposed one is a single device holding all your data and running internet-facing services with a patchy update history, which is the ideal ransomware target precisely because the attack is so short. DeadBolt proved you don’t need a sophisticated intrusion to ransom someone when their entire file store answers on a forwarded port. Get the NAS off the internet, patch its apps, and keep a backup it can’t reach. We track the NAS entries because they hit the people least able to recover, and the fix is mostly a router setting away.

Sources

Share

Related field notes

One email, every weekday morning.

You're in. Check your inbox.

Get the digest

Free. Weekday mornings. Plain English CVE triage.

Check your inbox to confirm.