This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# The following is a list of potentially malicious domains accessed by a QNAP malware. | |
# The domains are relevant for the time period between 2020-08-21 and 2020-09-04. | |
# If your QNAP accessed any of these devices, it is highly likely to be infected. | |
0bc.tl | |
0bcj.tl | |
0bcjk.tl | |
0ks.co.zw | |
0ksw.co.zw | |
0kswm.co.zw |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# The following is a list of domains accessed by QNAP NAS devices | |
# The list represents the baseline domains. It can be used to enforce compliant behavior of the device. | |
# Any additional app installaed on the QNAP will likely access domains not in this list. | |
qnap.com | |
*.qnap.com | |
*.myqnapcloud.com | |
pool.ntp.org | |
api.twonky.com | |
gm.iotcplatform.com |