{"id":31597,"date":"2019-11-04T05:08:05","date_gmt":"2019-11-04T05:08:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/"},"modified":"2019-11-04T05:08:05","modified_gmt":"2019-11-04T05:08:05","slug":"chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/","title":{"rendered":"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/03\/03\/chrome_patch_048967894375.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> Let&#8217;s check out some of the more recent security happenings <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/security\/\" rel=\"noopener noreferrer\">beyond what we&#8217;ve already covered<\/a>.<\/p>\n<h3 class=\"crosshead\"><span>Chrome bugs cleaned up<\/span><\/h3>\n<p>Anyone running Chrome will want to update and restart their browser in order to make sure they have the latest build, as usual. Google has patched a bunch of flaws including a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2019\/10\/31\/google-releases-security-updates-chrome\">use-after-free() vulnerability<\/a> (CVE-2019-13720) that was being actively exploited in the wild against victims. Make sure you&#8217;re running version 78.0.3904.87 or higher for Windows, Mac, and Linux to be safe.<\/p>\n<p>More technical details are <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/securelist.com\/chrome-0-day-exploit-cve-2019-13720-used-in-operation-wizardopium\/94866\/\">here<\/a>: essentially, a malicious JavaScript file on a webpage can exploit the vulnerability to potentially gain arbitrary code execution and install spyware and other horrible stuff on the computer. Kaspersky reckons the flaw was abused in an attempt to infect Chrome-using visitors of a Korean-language news website, in a campaign dubbed Operation WizardOpium.<\/p>\n<h3 class=\"crosshead\"><span>Crypto-miner spreads via BlueKeep hole<\/span><\/h3>\n<p>We hope you&#8217;ve all patched your Windows systems for <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/07\/24\/bluekeep_code_release\/\" rel=\"noopener noreferrer\">the BlueKeep RDP flaw<\/a>, which can be exploited to achieve remote-code execution on vulnerable machines. It appears Monero-mining malware is spreading among un-patched boxes via the security flaw. Microsoft <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/05\/15\/may_patch_tuesday\/\" rel=\"noopener noreferrer\">patched<\/a> the bug way back in May.<\/p>\n<p>Marcus Hutchins, with help from Kevin Beaumont, has detailed the spread of the BlueKeep-exploiting nasty <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.kryptoslogic.com\/blog\/2019\/11\/bluekeep-cve-2019-0708-exploitation-spotted-in-the-wild\/\">here<\/a> for Kryptos Logic.<\/p>\n<p>All the more reason to ensure you&#8217;re patched.<\/p>\n<h3 class=\"crosshead\"><span>ClamAV zero-day lands but don&#8217;t panic<\/span><\/h3>\n<p>Someone has popped onto Pastebin a zero-day code-execution exploit that can hijack systems running the open-source antivirus engine ClamAV. While this software is used quite widely, and thus such a bug could prove disastrous, the danger isn&#8217;t very great: exploitation is limited to a very narrow configuration, as <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/hackerfantastic\/status\/1190685521153937408\">discussed here on Twitter<\/a>.<\/p>\n<h3 class=\"crosshead\"><span>Azure Sphere gets a release date<\/span><\/h3>\n<p>Microsoft&#8217;s planned hardware-to-cloud Azure Sphere platform now has a general availability date. Microsoft says that the first devices embedded with the tech will be arriving in <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/28\/iot-innovation-azure-sphere-general-availability-february-2020\/\">February of 2020<\/a>.<\/p>\n<p>For those unfamiliar, Azure Sphere is Microsoft&#8217;s bid for a secure IoT platform. Redmond is combining on-chip secure enclave tech with a custom-made Linux kernel and its Azure cloud service. The idea is to offer embedded device makers an all-in-one security package that goes from the silicon level to the cloud management tools.<\/p>\n<h3 class=\"crosshead\"><span>NAS-ty malware surfaces<\/span><\/h3>\n<p>Last week, authorities in Finland <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.kyberturvallisuuskeskus.fi\/en\/news\/qsnatch-malware-designed-qnap-nas-devices\">warned of<\/a> a newly discovered piece of malware targeting QNAP network storage boxes.<\/p>\n<p>Known as QSnatch, the software nasty connects infected boxes to a command-and-control server and harvests usernames and passwords. The infection also has the potential to load up other modules should the attackers decide to do more with their botnet. <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/certbund\/status\/1189890405749460992\">According to<\/a> Germany&#8217;s CERT, the malware is already spreading rapidly and has got into at least 7,000 machines in that country alone.<\/p>\n<p>Ensure you&#8217;re running the latest version of the QNAS firmware to avoid being compromised. The exploited bug was <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.qnap.com\/en\/security-advisory\/nas-201902-13\">addressed<\/a> in February this year, though it looks like malware is finally spreading via the hole on unpatched boxes.<\/p>\n<h3 class=\"crosshead\"><span>Pwn2Own gets new targets<\/span><\/h3>\n<p>The popular Pwn2Own competition is set to add <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.zerodayinitiative.com\/blog\/2019\/10\/28\/pwn2own-miami-bringing-ics-into-the-pwn2own-world\">a new category<\/a>, as Trend Micro says it will be adding industrial control systems to the roster of target devices. Those who can hack the hardware will get a cash reward and, if tradition holds, will also be able to take home the hacked kit.<\/p>\n<h3 class=\"crosshead\"><span>PHP stands for &#8220;patch hella pronto&#8221;<\/span><\/h3>\n<p>Anyone running PHP, particularly PHP with the Nginx webserver and FastCGI, will want to take the time out to update their boxes following the discovery and patching of a vulnerability in the software stack. Discovered during a capture the flag competition, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/lab.wallarm.com\/php-remote-code-execution-0-day-discovered-in-real-world-ctf-exercise\/\">the bug<\/a> can be potentially exploited remotely to achieve code execution, depending on your configuration.<\/p>\n<p>The core problem (CVE-2019-11043) lies in PHP, it seems, so make sure you&#8217;ve updated to the latest versions <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11043\">listed here<\/a>.<\/p>\n<h3 class=\"crosshead\"><span>LabKey software found to contain RCE hole<\/span><\/h3>\n<p>Admins in the medical field will want to pay attention to <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/rhinosecuritylabs.com\/application-security\/labkey-server-vulnerabilities-to-rce\/\">these bugs<\/a> in LabKey, a software platform used with biomed research gear. If chained together, the flaws would potentially allow for remote code execution.<\/p>\n<p>Fortunately, given how niche the software is, the chances of active exploits targeting the bugs are not particularly high. Still, it would be a good idea to get a patch installed as soon as possible.<\/p>\n<h3 class=\"crosshead\"><span>India nuclear plants report malware infection<\/span><\/h3>\n<p>A nuclear power plant in India <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/indian-nuke-plants-network-reportedly-hit-by-malware-tied-to-n-korea\/\">discovered<\/a> a malware infection believed to be linked to North Korea. Fortunately, the software nasty, we&#8217;re told, was not found near any of the reactor controls.<\/p>\n<h3 class=\"crosshead\"><span>Credit cards for sale on the internet, gasp<\/span><\/h3>\n<p>Infosec outfit Group-IB says it has <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.group-ib.com\/media\/biggest-card-database-ever\/\">uncovered<\/a> an estimated 1.3 million cards offered for sale on the internet at a total estimated value of more than $130m. The card data largely belonged to bank customers in India.<\/p>\n<p>Meanwhile, a website called BriansCub that was selling more than 26 million credit and debit card records to fraudsters was <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/krebsonsecurity.com\/2019\/10\/briansclub-hack-rescues-26m-stolen-cards\/\">hacked<\/a>, and its contents leaked, allowing banks to cancel the compromised cards.<\/p>\n<h3 class=\"crosshead\"><span>Domain registrars warns of data thief<\/span><\/h3>\n<p>Customers of NetworkSolutions, Web.com, and Register.com were <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/notice.networksolutions.com\/\">warned at the turn of this month<\/a> that some of their data was <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/notice.web.com\/\">exposed<\/a> to hackers who managed to gain access to the trio&#8217;s internal databases.<\/p>\n<p>There were no payment cards nor passwords in the data store, though the miscreants would have been able to see basic contact information, such physical addresses, phone numbers, and email addresses. Those exposed would be wise to keep an eye out for spear-phishing attacks that might use that information to appear more authentic.<\/p>\n<h3 class=\"crosshead\"><span>Camgirl websites&#8217; security lapse<\/span><\/h3>\n<p>A network of websites through which netizens \u2013 mainly those in Spain and Europe \u2013 can watch people, typically women, strip off live over the web left a back-end database open to the internet, exposing some 13 million records including users and camgirls&#8217; email addresses, IP addresses, chat logs, and more. The system has since been secured and hidden from view. One group of security researchers, who contacted <em>El Reg<\/em> on Friday, planned to go public with the details this week, though they were seemingly <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/techcrunch.com\/2019\/11\/03\/camgirl-network-exposed-millions-users\/\">beaten to it<\/a> by cyber-biz Condition:Black over the weekend. It is understood no payment data was exposed.<\/p>\n<h3 class=\"crosshead\"><span>FireEye details SMS-stealing Chinese malware<\/span><\/h3>\n<p>FireEye says that the China-based APT41 crew is using a piece of malware known as <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/10\/messagetap-who-is-reading-your-text-messages.html\">Messagetap<\/a> to spy on text messages. The malware is said to be installed on the SMS servers at telco providers and gives the attackers the ability to pull select messages from surveillance subjects. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7800\/what-next-after-netezza?td=wptl1858\">What next after Netezza?<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/11\/04\/security_roundup_november1\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Including Spanish camgirl sites spill info, domain registrars hacked Roundup\u00a0 Let&#8217;s check out some of the more recent security happenings beyond what we&#8217;ve already covered.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":31598,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-31597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-04T05:08:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"429\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more\",\"datePublished\":\"2019-11-04T05:08:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/\"},\"wordCount\":1095,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/\",\"name\":\"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg\",\"datePublished\":\"2019-11-04T05:08:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg\",\"width\":648,\"height\":429},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/","og_locale":"en_US","og_type":"article","og_title":"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-11-04T05:08:05+00:00","og_image":[{"width":648,"height":429,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more","datePublished":"2019-11-04T05:08:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/"},"wordCount":1095,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/","url":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/","name":"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg","datePublished":"2019-11-04T05:08:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more.jpg","width":648,"height":429},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/chrome-bug-squashed-qnap-nas-nasty-hits-bluekeep-malware-spreads-and-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Chrome bug squashed, QNAP NAS nasty hits, BlueKeep malware spreads, and more"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=31597"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/31598"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=31597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=31597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=31597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}