Connect with us

Hi, what are you looking for?



QNAP Warns NAS Users of ‘dovecat’ Malware Attacks

QNAP this week warned users of attacks targeting QNAP NAS (network-attached storage) devices with a piece of malware named “dovecat.”

QNAP this week warned users of attacks targeting QNAP NAS (network-attached storage) devices with a piece of malware named “dovecat.”

The networking and storage solutions provider says it has received reports from users who had their devices infected with the malware, and, after analyzing the attacks, discovered that the use of weak passwords on Internet-connected devices was the root cause of infection.

The cybercriminals behind dovecat, QNAP explains, are installing Bitcoin miners on the compromised NAS devices, without user consent.

In a November 2020 knowledgebase article, the company pointed out that users of any NAS model series can detect potential compromise by looking for a dovecat process running on their devices.

At the time, the company also encouraged users to report all identified infections, and to ensure that they are running the latest versions of the NAS firmware and Malware Remover.

This week, the company also urged users to update the QTS operating system to the latest version, install Security Counselor and execute it with Intermediate Security Policy (or above), install a firewall, and enable Network Access Protection, so that accounts are protected from brute force attacks.

Furthermore, users should make sure that strong administrative passwords are set on their devices, and that any SSH and Telnet services that are not in use are disabled, along with any other unused services and apps.

QNAP also tells users they should avoid using default port numbers (such as 80, 443, 8080, and 8081), and encourages them to enhance the security of their NAS devices by following best practices that the company has already detailed.

Advertisement. Scroll to continue reading.

“These actions can further enhance NAS security and make it harder for dovecat to enter your QNAP NAS,” the company says, adding that it is focused on developing a solution that will help users remove the dovecat malware from the infected devices.

Related: QNAP Issues Advisory on Zerologon Vulnerability

Related: Hackers Are Targeting a Three-Year Old Vulnerability in QNAP NAS Devices

Related: US, UK Warn of Malware Targeting QNAP NAS Devices

Related: Vulnerabilities Exposed Hundreds of Thousands of QNAP NAS Devices to Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.