Forgot your password?
typodupeerror
This discussion has been archived. No new comments can be posted.

Synolocker 0-Day Ransomware Puts NAS Files At Risk

Comments Filter:
  • by SuricouRaven (1897204) on Tuesday August 05, 2014 @06:30AM (#47605605)

    When did 'server full of hard drives' turn into 'cloud storage?'

    The useful thing about the cloud is that no-one knows what it actually is, so any company is free to call their product cloud-based without contest.

  • by Dutch Gun (899105) on Tuesday August 05, 2014 @07:13AM (#47605715)

    My Synology NAS is my home-based business' file server, a local machine backup (for my development machine and my digital audio workstation), and a media server for my ripped DVDs and Blurays, although this third function is just a nice bonus for me. Synology NAS devices have a very handy cloud backup application as well, which I use to backup all my most critical files to Amazon S3 services. I hope most people made use of this, because if Cryptolocker has taught us anything, it's that you absolutely need offsite backups that are NOT connected to your network.

    I bought it specifically because it makes it easy to set up a multi-tiered backup strategy like that - something that takes on new importance when you spend a few years writing code on your own dime. As a file server, it's fantastic for small operations. I had a drive begin to fail last year, and so had a chance to test out the hot-swapping / RAID rebuilding feature. Worked like a charm - was super simple and zero down-time.

    Personally, I've never once considered opening up my NAS to the outside internet. That always seemed crazy risky to me - after all, a single software mistake, a buffer overrun in a protocol stack of some sort, and *poof*, there's direct access to your file server and all it's critical data. I guess sometimes being paranoid pays off, but it gives me no pleasure to say so.

  • by bhoar (1226184) on Tuesday August 05, 2014 @07:52AM (#47605839)
    Updated posted 8/5/2014 by Jeremie on the English language Synology Forum: [We’d like to provide a brief update regarding the recent ransomware called “SynoLocker,” which is currently affecting certain Synology NAS servers. Based on our current observations, this issue only affects Synology NAS servers running some older versions of DSM (DSM 4.3-3810 or earlier), by exploiting a security vulnerability that was fixed and patched in December, 2013. At present, we have not observed this vulnerability in DSM 5.0.]
  • by AmiMoJo (196126) * <mojo@@@world3...net> on Tuesday August 05, 2014 @08:28AM (#47605961) Homepage

    It basically runs a dynamic DNS client that lets you connect to your NAS away from home, via a web site. For this to work it must accept connections through your firewall, which it uses UPnP to set up.

You know that feeling when you're leaning back on a stool and it starts to tip over? Well, that's how I feel all the time. -- Steven Wright

Working...