Tuesday, February 22nd 2022

Asustor NAS Products Hit by Deadbolt Ransomware Attack - Unplug Them Now

If you've deployed an Asustor-made NAS (Network Attached Storage) to access your treasure trove of files across the wires of the Internet, you should disconnect it it from the Internet as soon as possible. A number of Asustor users have taken to Reddit and the company's forums, claiming their Asustor-bound files have been claimed and encrypted by a ransomware attack through a Deadbolt payload. This is the same ransomware that wreaked havoc with QNAP's NAS devices a while back.

The attack infects the user's NAS and proceeds to encrypt its contents, leaving each user with a message pointing towards a unique Bitcoin address. The offer: receive the decryption key in exchange for 0.03 Bitcoin (~$1,102, ~€976) - the same value asked at the time of the QNAP attack. Interestingly, Asustor doesn't seem to have received the same offer the perpetrators put forward to QNAP: 5 Bitcoin (~$183,906, ~€162,267) in return for information for the exploit data (€162,799) - or a universal decryption key for all affected users for 50 Bitcoin (~$1,8 million). That last bit there serves to put pressure on the company to pay up for the affected users, which could themselves pressure the company to take the deal.
For now, Asustor hasn't issued any guidance to affected users other than safely powering-off and disconnecting their NAS from the networks until the company releases a fix (which form exactly this fix will take is a mystery). Users should also be contacted by an Asustor technician after they fill out a web form. It's speculated that the hackers gained access to the Asustor NAS products via their EZ Connect utility. And apparently Asustor's own product demo was hosted in a now compromised storage solution, as its Asustor Data Master (ADM) Live Demo has been brought down.

An official listing of affected products isn't currently available. However, affected users have collated a listing of sorts according to their own reports. In them, affected models so far seem to be restricted to the AS5304T, AS6204T, AS6404T, AS5104T and AS7004T NAS devices. Others, such as the AS5004T, AS6602T, AS-6210T-4K and AS6102T, are (at least so far) free of infection reports. Users within the forums are recommending that other Asustor-deploying consumers disable the EZ Connect utility, automatic updates and SSH, alongside blocking all NAS ports and only allowing connections from within the users' network. In this case, it's better to be safe than sorry: until a list of vulnerable devices is shared by Asustor, it's best to assume all models are vulnerable.

For users who had their 2-bay NAS setup in RAID-1, there's now an unofficial tutorial requiring a Linux-bound PC that aims to help you recover your encrypted files.
Sources: Reddit, Asustor Forums, via Tom's Hardware
Add your own comment

27 Comments on Asustor NAS Products Hit by Deadbolt Ransomware Attack - Unplug Them Now

#26
zlobby
RealKGBOpening up your NAS to the whole Internet is like saying "'here's my address, but the door's locked haha you can't get' in surprise Pikachu face when someone breaks down the door"
I guess the real KGB would know?
Posted on Reply
#27
DeathtoGnomes
MakaveliPeerblock sounds like an app you need to load on each device?

If so doing it from the router sounds much more efficient since its covers everything that is on the network.
it may not be for everyone, but the only way to find out is try it out to see if it meets your needs. I've had it block every IP from 0.0.0.0 to 255.255.255.255 and everything went crazy trying to find a connection, it was interesting.
Posted on Reply
Add your own comment
Apr 12th, 2025 19:50 EDT change timezone

New Forum Posts

Popular Reviews

Controversial News Posts