Comprehensive Guide to DEADBOLT Ransomware (.deadbolt)
Technical Breakdown:
1. File Extension & Renaming Patterns
-
Confirmation of File Extension:
.deadbolt - Renaming Convention:
- Appends the
.deadboltextension to encrypted files (e.g.,AnnualReport.docx→AnnualReport.docx.deadbolt) -
Entire filename may also be overwritten with a 40-character hexadecimal hash in newer variants (e.g.,
3fa4bb781a3c...deadbolt), making manual identification of original files harder. - Drops a ransom note named deadbolt.jpg at the root of every encrypted share as a wallpaper replacement.
2. Detection & Outbreak Timeline
- First Public Sightings: January & February 2022, clustered as two “waves”.
- Notable Victims: Primarily QNAP NAS devices (QTS OS firmware 4.x/5.x), a few ASUSTOR NAS, and rare Linux servers running exposed Docker containers.
- Peak Activity: Second wave (late February 2022) introduced an automated super-wide spray, affecting an estimated ~3 000 QNAP devices in 24 h.
3. Primary Attack Vectors
| Mechanism | Details & Indicators |
|—|—|
| Targeted Exploitation | Weaponizes ANY of the following CVEs on patch-night-shy or “shipping-with-default” NAS/SAN boxes:
– CVE-2021-28799 (QNAP Photo Station)
– CVE-2021-28385 (Multimedia Console)
– CVE-2022-22648 (Drupal 9/10 core remote-code)
– CVE-2022-26318 (OpenSSL & Log4j backports)
Each wave packaged payloads tuned to the fresh exploits discovered in those weeks. |
| Zero-Login Web DAM Abuse | Uses exposed Photo Station/Web Administration endpoints on port 8080/TCP (http) or 443/TCP (https) to upload the deadbolt.cgi payload through unvalidated file-upload forms. |
| Docker API Mis-Config | Unprotected TCP daemon (tcp://:2375) lets attackers spin a temp container mounting the rootfs and execute host-level binaries (drop deadbolt into /sbin). |
| Brute-Force RDP/SSH | Secondary vector on Windows-based NAS or Linux servers with weak/no MFA credentials. Finds users via admin, administrator, root gerunds, then elevates with CVE-2022-0847 (Dirty-pipe) for full root. |
Remediation & Recovery Strategies:
1. Prevention
- Patch Immediately: Apply latest QTS/QuTS hero firmware (5.0.x or later) and hotfixes; disable Photo Station, Video Station, and other unnecessary multimedia apps whose plugins historically open wide attack surfaces.
- Expose no Web-Apps: Close ports 80, 443, 8080, 8443, and 3000 unless absolutely required; use reverse-proxy + IP allow-list for shrink-surface.
- Segment LANS: Put NAS devices into isolated VLANs with only NTP & SMB ports (139/445) allowed; block outbound internet except for OS update servers.
- Admin MFA & 2FA: Enable QNAP 2-step verification, or set strong 14+-char complex passwords stored in an enterprise password manager.
-
Container API hardening: Bind Docker to
127.0.0.1only (DOCKER_OPTS="-H unix:///var/run/docker.sock"). If remote API is needed, wrap with mutual-TLS. - Offline & Immutable Backups: Maintain at least one air-gapped or immutable copy (e.g., QNAP immutable snapshots, Azure Blob with soft-delete, or tape). Validate backup restoration quarterly.
2. Removal
- Disengage & Quarantine:
- Unplug network LAN cable or disable the NAS NIC; do not power off.
- Boot into Rescue Mode (QNAP):
- Power cycle; hold Reset for 3 seconds → selects “Firmware/Recovery mode”.
- Do NOT format storage pools.
- Patch First, Scan Second:
- Flash latest firmware from QTS web-rescue wizard.
- Run full AV scan using QNAP Malware Remover (
QTS App Center).
- Purging Deadbolt Binaries:
- SSH in (admin cmd only post-patch):
bash
ps aux | grep deadbolt
kill -9 <PID>
rm -f /var/deadbolt.sh /run/deadbolt.cgi /opt/deadbolt /root/.config/autostart/deadbolt
- Delete all
*deadbolt.jpg/deadbolt.txtransom-drop notes.
3. File Decryption & Recovery
- Recovery Feasibility: At time of writing NO viable master-key has been recovered for the second wave (AES-256 keys stored per-device); however:
- Early Jan 2022 wave: QNAP obtained the leaked master-key for DeadBolt build 1.x. Free QNAP DeadBolt Decryptor v3.1 is available on the App Center or downloadable directly.
- Feb-March 2022+ builds: The key rotation update randomized keys; decryption therefore depends solely on restoring backups or paying ransom (not recommended).
- Essential Tools/Patches:
- QNAP Security Advisory QSA-22-02 – contains lv0-3 patches for CVE scores 9.8–10.0 used by DeadBolt.
-
DeadBolt Decryptor v3.1 – download directly via
wget https://download.qnap.com/QPKG/QTS-DeadBolt_Decrypt-3.1.qpkg. - Asustor Download Center – offers Asustor ADM 4.0.0.RRS1 hotfix that permanently disables the vulnerable service name “Photo Gallery 3”.
4. Other Critical Information
-
Ransom Demand & Dead-Man Switch:
Ransom note sets a 7-day timer after which decryption supposedly expires; however, paying on-chain yields mixed customer-support—many victims report no decryption keys delivered. -
Ticker Algebra:
Threat actors code-static message “FIGHTING FOR THE USERS” into ransom notes—probably pop-culture reference rather than meaningful group attribution. - Unusual Payload Behavior:
- Attacker renames NAS device via SNMP SysDescr & SSID to
DeadBolt-1.0. - On patched devices, DDNS service fails silently due to DNS black-holing of the attacker’s command-and-control domain; this gives a visible SCADA alert that allows quicker containment.
Stay safe: keep firmware updated, use network segmentation, and test your backups.