Posted in

Netdragon Botnet Hijacks Feiniu NAS Devices

A new large-scale campaign is actively targeting Feiniu (fnOS) NAS devices, exploiting undisclosed vulnerabilities to compromise storage infrastructure. Unlike random IoT malware infections, this campaign specifically focuses on high-value hardware targets, allowing attackers to gain remote control and use these devices for malicious purposes.

By the end of January, analysts at Qi An Xin X Lab reported that approximately 1,500 NAS devices had been infected globally, including systems in China, the United States, and Singapore, spanning multiple industries such as software services and public administration.

This article explores:

  • How the Netdragon botnet compromises NAS devices
  • Technical details of malware persistence and evasion
  • Risks to data security and enterprise networks
  • Mitigation and recovery strategies

How Netdragon Compromises NAS Devices

Exploitation of Unpatched Vulnerabilities

  • Attackers exploit undisclosed security flaws in fnOS to gain entry
  • Deploy an HTTP backdoor interface once access is achieved
  • Install a modular malware system including:
    • Loader component for control
    • DDoS attack module to participate in botnet operations

This setup allows attackers to execute arbitrary commands remotely, effectively conscripting compromised NAS devices into a botnet army.


Impact on Device Integrity

  • Malware deletes critical files, notably rsa_private_key.pem, risking permanent data loss
  • Devices are used to launch large-scale denial-of-service (DDoS) attacks
  • Infection disrupts routine device maintenance, blocking system updates

Persistence and Evasion Mechanisms

Netdragon malware is highly sophisticated, employing multiple methods to remain undetected:

  1. Dual Foothold
    • User-space systemd services
    • Kernel-space kernel modules (async_memcpys.ko)
    • Redundancy ensures malware survives device reboots
  2. Sabotaging Updates
    • Modifies the hosts file to redirect update domains to 0.0.0.0
    • Prevents security patches from being applied
  3. Obfuscation & Concealment
    • Uses dynamic key packing to hide code
    • Deletes system logs and manipulates process lists
    • Interferes with network monitoring tools to mask abnormal traffic

Infection Propagation

  • Exploits exposed services on NAS devices
  • Backdoor listens on port 57199 for attacker commands
  • Malware ensures exclusive control by disabling competing malware

Mitigation and Recovery Strategies

Recovering from a Netdragon infection is complex due to disabled updates and active persistence mechanisms. Recommended steps include:

  1. Manual Malware Removal
    • Delete kernel module async_memcpys.ko
    • Remove user-mode service dockers.service
  2. Restore System Functionality
    • Repair the hosts file to restore update paths
    • Remove malicious firewall rules from nftables/iptables
  3. Network Monitoring & Hardening
    • Monitor for activity on backdoor port 57199
    • Segment NAS devices from critical enterprise networks
    • Apply security patches as soon as they become available
  4. Preventive Measures
    • Regular firmware updates
    • Restrict exposed services to internal networks only
    • Conduct periodic vulnerability assessments

Why This Matters

This campaign demonstrates how attackers are shifting from generic malware infections to highly targeted attacks against enterprise storage devices. The Netdragon botnet not only compromises NAS devices for DDoS operations but also threatens permanent data loss and system compromise due to its aggressive persistence and sabotage techniques.

Key takeaways for organizations:

  • Ensure NAS devices are patched and monitored continuously
  • Disable unnecessary exposed services
  • Implement network segmentation and robust monitoring to detect abnormal traffic
  • Have a detailed recovery plan in place for infected devices

Proactive defenses and timely remediation are critical to prevent NAS devices from becoming part of large-scale botnet operations.

Leave a Reply

Your email address will not be published. Required fields are marked *