Software

OSes

QNAP NAS user? You'd better check your hosts file for mystery anti-antivirus entries

NAS-ty: Strange activity sinkholes antivirus update checks


Network attached storage maker QNAP's customers have reported being hit by a mystery malware that disables software updates by hijacking entries in host machines' hosts file.

The full effects are, as yet, unknown – but users have reported that the most visible symptom is that some 700 entries are added to the /etc/hosts file that redirect a bunch of requests to IP address 0.0.0.0.

This, said forlorn QNAP forum user ianch99, stopped his antivirus from updating by sinkholing all of the software's requests to the vendor's website. Others reported that the Taiwanese NAS appliance maker's own MalwareRemover was borked, though it is not known whether these two things are linked.

"If you remove these entries, the update runs fine but they return on after rebooting," posted ianch99. So far the only cure appeared to be a script provided by QNAP itself, which one helpful Reddit user posted the link to after apparently being given it by one of the storage firm's techie in live chat.

No time for nap, update your QNAP: RAIDed NAS data corruption bug squashed

READ MORE

Other users publicly wondered about the QNAP's seeming reluctance to say anything about the issue, with a Reg reader telling us: "The wider QNAP-using population could perhaps do with a heads-up from your esteemed organ."

QNAP failed to respond when The Register asked the company to comment on these goings-on, and has made no public statement at the time of writing.

A couple of years ago firmware from the Taiwanese headquartered biz was discovered to have a catastrophic bug that corrupted data on RAID drives during a rebuild "through faulty calculations". It was eventually patched.

For those who haven't poked around the quieter corners of their operating systems, /etc/hosts forces domain name lookups made from the host machine to go to specified IP addresses. The normal non-malicious use is to enforce blocking of unwanted sites.

While useful for persistent windups on colleagues by doing silly things like redirecting Google to Bing, that very same simplicity makes it an attractive target for malware authors bent on stopping updates to counter-malware programs, as Malwarebytes pointed out a few years ago. ®

Send us news
30 Comments

Want to keep Windows 10 secure? This is how much Microsoft will charge you

Hint: It will keep going up

Microsoft lifts years-old compatibility hold for Windows 11

It probably wasn't only sound driver problems that kept users away

US House approves FISA renewal – warrantless surveillance and all

PLUS: Chinese chipmaker Nexperia attacked; A Microsoft-signed backdoor; CISA starts scanning your malware; and more

Microsoft to use Windows 11 Start menu as a billboard with app ads for Insiders

This wasn't what most had in mind when Redmond promised to make the feature 'great again'

Open source versus Microsoft: The new rebellion begins

Neither side can afford to lose, but one surely must

German state ditches Windows, Microsoft Office for Linux and LibreOffice

'Complete digital sovereignty' ... sounds familiar

Head of Israeli cyber spy unit exposed ... by his own privacy mistake

Plus: Another local government hobbled by ransomware; Huge rise in infostealing malware; and critical vulns

It's 2024 and North Korea's Kimsuky gang is exploiting Windows Help files

New infostealer may indicate a shift in tactics – and maybe targets too, beyond Asia

How a single buck bought bragging rights in the battle to port Windows 95 to NT

It reached the desktop and then ...

Chrome for Windows-Arm laptops officially lands in time for Snapdragon X Elite kit

At last, no more crappy emulation or experimental builds

Windows Format dialog waited decades for UI revamp that never came

'Temporary' isn't always

Microsoft gets new Windows boss as Start Menu man Parakhin 'to explore new roles'

More MS moves just a week after new AI unit and other changes announced