QNAP alerts NAS customers of new DeadBolt ransomware attacks

Taiwan-based network-attached storage maker QNAP warned customers on Thursday to secure their devices against attacks pushing DeadBolt ransomware payloads.

“According to the investigation by the QNAP Product Security Incident Response Team, the attack targeted NAS devices using QTS 4.3.6 and QTS 4.4.1, and the affected models were mainly TS-x51 series and TS-x53 series,” the NAS maker said.

In April, QNAP also urged NAS users to disable Universal Plug and Play port forwarding on their routers to prevent exposing them to attacks from the Internet.

With QNAP devices also being targeted by other ransomware families such as Qlocker and eCh0raix, all owners should immediately take the above measures to secure their data from future attacks.

First spotted in attacks targeting QNAP NAS devices in late January, DeadBolt ransomware hijacks the QNAP device’s login page to display a screen stating, “WARNING: Your files have been locked by DeadBolt.”

DeadBolt ransomware returned in February in another campaign targeting ASUSTOR NAS devices and allegedly using a zero-day vulnerability.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

Tell us about your needs.
Get an answer the same business day.

Tell us about your needs.
Get an answer the same business day.

Fill out the form below and get an answer from our experts within 1 business day.

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.


What happens next:

  • We reach out to learn about your objectives
  • We work together to define your project's scope
  • You get an all-inclusive, no engagement proposal

This field is for validation purposes and should be left unchanged.
Scroll to Top


Enter Your
Corporate Email

This site is registered on wpml.org as a development site.