Important: QSnatch collects confidential information from infected devices, such as login credentials and system configuration. Due to these data breach concerns, QNAP devices that had been infected may still be vulnerable to reinfection after removing the malware. We strongly recommend applying these settings to further secure your system and to prevent reinfection.

Change the admin password. Change other user passwords. Change QNAP ID password. Use a stronger database root password Remove unknown or suspicious accounts. Enable IP and account access protection to prevent brute force attacks. Disable SSH and Telnet connections if you are not using these services. Disable Web Server, SQL server or phpMyAdmin app if you are not using these applications. Remove malfunctioning, unknown, or suspicious apps Avoid using default port numbers, such as 22, 443, 80, 8080 and 8081. Disable Auto Router Configuration and Publish Services and restrict Access Control in myQNAPcloud. Subscribe to QNAP security newsletters.

Note: