1 min read

Synology NAS Devices Targeted in Large-Scale Brute-Force Attack

Silviu STAHIE

August 10, 2021

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Synology NAS Devices Targeted in Large-Scale Brute-Force Attack

Synology has identified an attack campaign against its network-attached storage (NAS) devices, spearheaded by a malware named StealthWorker trying to compromise devices by logging in using common credentials.

NAS devices are prized targets, and attackers are always looking for ways to compromise them. Sometimes they use vulnerabilities, but they can be more direct at times. In the current wave of attacks, attackers try to log in using weak or common credentials. Once they're in, they deploy malicious payloads, such as ransomware.

"Synology's security researchers believe the botnet is primarily driven by a malware family called StealthWorker," saidthe company. "At present, Synology PSIRT has seen no indication of the malware exploiting any software vulnerabilities."

The attack is an automated process driven by a botnet. Compromised devices will try to carry out additional attacks against other Linux devices, including other Synology NAS.

"Synology PSIRT is working with relevant CERT organizations to find out more about and shut down known C&C (command and control) servers behind the malware. Synology is simultaneously notifying potentially affected customers," the company also said.

Since this attack doesn’t leverage any particular vulnerability, users have been advised to change their credentials if they are weak. Synology NAS also allows users to auto-block IPs after a number of unsuccessful login attempts. Of course, it's also essential to set up multi-step authentication as soon as possible so that, even if attackers somehow get ahold of valid credentials, they encounter another layer of security. Closing unnecessary ports that are not in use is also advisable.

NAS devices usually hold valuable information, like backups or private data. They are among the most-attacked IoT devices out there, and criminals always look for new ways to compromise them.

tags


Author



Right now

Top posts

John Oliver Shows the Dark Side of Data Brokerage on Last Week Tonight

John Oliver Shows the Dark Side of Data Brokerage on Last Week Tonight

April 15, 2022

3 min read
Bitdefender Labs Warns of Phishing Scams Targeting MetaMask Users

Bitdefender Labs Warns of Phishing Scams Targeting MetaMask Users

April 14, 2022

3 min read
Why and how to hide your IP address while traveling

Why and how to hide your IP address while traveling

April 13, 2022

2 min read
How Bitdefender Can Help Restore Your Privacy in the Digital Age

How Bitdefender Can Help Restore Your Privacy in the Digital Age

April 04, 2022

3 min read
How Strong is VPN Encryption?

How Strong is VPN Encryption?

February 28, 2022

3 min read
Top Three Ways Internet Users Unknowingly Help Cybercriminals

Top Three Ways Internet Users Unknowingly Help Cybercriminals

February 25, 2022

4 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Researchers Find Several JavaScript Processing Flaws in Word, Adobe Acrobat, Other Apps Researchers Find Several JavaScript Processing Flaws in Word, Adobe Acrobat, Other Apps
Vlad CONSTANTINESCU
2 min read
Microsoft May Patch Tuesday Causes AD Authentication Failures Microsoft May Patch Tuesday Causes AD Authentication Failures
Vlad CONSTANTINESCU
1 min read
Rejuvenated FluBot Campaign Moves to Finland; iPhone Users Also Targeted Rejuvenated FluBot Campaign Moves to Finland; iPhone Users Also Targeted
Filip TRUȚĂ

May 11, 2022

3 min read