{"id":3552,"date":"2021-12-08T13:34:06","date_gmt":"2021-12-08T12:34:06","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-93\/"},"modified":"2022-12-04T13:43:49","modified_gmt":"2022-12-04T12:43:49","slug":"qnap-upozorava-na-novi-crypto-miner","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2021\/12\/08\/qnap-upozorava-na-novi-crypto-miner\/","title":{"rendered":"QNAP upozorava na novi crypto-miner"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Proizvo\u0111a\u010d <em>network-attached storage<\/em> (<em>NAS<\/em>) ure\u0111aj <a href=\"https:\/\/www.qnap.com\/en\/security-advisory\/QSA-21-56\" target=\"_blank\" rel=\"noopener\">kompanija <em>QNAP<\/em>\u00a0 je izdala upozorenje<\/a> za korisnike povodom novog <em>crypto-mining<\/em> zlonamjernog softvera. Kompanija nije objavila nikakve detalje o ovoj vrsti napada na njihove ure\u0111aje, ali savjetuje korisnike da odmah preduzmu odre\u0111ene mjere za\u0161tite. Zlonamjerni softver na zara\u017eenom ure\u0111aju kreira proces pod nazivom <strong>[<em>oom_reaper<\/em>]<\/strong> koji po\u010dne da koristi oko 50% procesora i opona\u0161a <em>kernel <\/em>proces. <\/span><\/span><\/p>\n<div id=\"attachment_3679\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3679\" class=\"size-full wp-image-3679\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-1024x768-1.jpg\" alt=\"QNAP network-attached storage\" width=\"1024\" height=\"576\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-1024x768-1.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-1024x768-1-300x169.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-1024x768-1-768x432.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/qnap-1024x768-1-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3679\" class=\"wp-caption-text\"><em>Photo by Billy Freeman on Unsplash<\/em><\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ovaj sigurnosni incident je jo\u0161 pod istragom, ali iz kompanije <em>QNAP<\/em> savjetuju korisnike da a\u017euriraju svoje ure\u0111aje i aplikacije na njima. Jo\u0161 se preporu\u010duje da se izvr\u0161i promjena lozinki, jer se jo\u0161 ne zna da li se u napadu iskori\u0161tava ranjivost ili je u pitanju <em>brute-force<\/em> napada na ure\u0111aje dostupne na Internetu.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ako se primijeti infekcija ure\u0111aja, <em>QNAP<\/em> preporu\u010duje da se ure\u0111aj restartuje i instalira njihova alatka \u201c<em>Malware Remover<\/em>\u201d iz <em>App Center<\/em>-a. Detaljne instrukcije se mogu na\u0107i na stranici proizvo\u0111a\u010da <a href=\"https:\/\/www.qnap.com\/en\/security-advisory\/QSA-21-56\" target=\"_blank\" rel=\"noopener\">ovdje<\/a>.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Proizvo\u0111a\u010d network-attached storage (NAS) ure\u0111aj kompanija QNAP\u00a0 je izdala upozorenje za korisnike povodom novog crypto-mining zlonamjernog softvera. Kompanija nije objavila nikakve detalje o ovoj vrsti napada na njihove ure\u0111aje, ali savjetuje korisnike da odmah&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3679,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[63,131,172,132,64,126],"class_list":["post-3552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-lozinka","tag-nas","tag-network-attached-storage","tag-qnap","tag-sajber-prijetnja","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3552"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3552\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3679"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}