Synolocker 0-Day Ransomware Puts NAS Files At Risk 150
Deathlizard (115856) writes "Have a Synology NAS? Is it accessible to the internet? If it is, You might want to take it offline for a while. Synolocker is a 0-day ransomware that once installed, will encrypt all of the NAS's files and hold them for ransom just like Cryptolocker does for windows PC's. The Virus is currently exploiting an unknown vulnerability to spread. Synology is investigating the issue."
This is how we learn (Score:5, Insightful)
not to connect your NAS directly to the internet.
Re:This is how we learn (Score:5, Insightful)
It should be attached to a network fire-walled off from the Internet and only accessible if you are on the local LAN.
Re:This is how we learn (Score:5, Insightful)
Kind of defeats the cloud feature on Synology NAS doesn't it? Granted you should have it firewalled off except for the specific port it needs.
Re: (Score:2)
Oh also it can act as a firewall as well (not saying much for its capabilities though)
Re:This is how we learn (Score:5, Insightful)
Re:This is how we learn (Score:5, Informative)
When did 'server full of hard drives' turn into 'cloud storage?'
The useful thing about the cloud is that no-one knows what it actually is, so any company is free to call their product cloud-based without contest.
Re: (Score:2)
Re:This is how we learn (Score:5, Funny)
Well, by the original usage, a server full of drives would not be "cloud storage"
I want to dispute this - I had a server full of drives that I bought to be my "cloud storage". But when I tried to store my cloud in it, it started to leak out of the server. I ended up with a messy pool of water on the floor and a ruined server!
Re: (Score:3)
Technology Students in Southern California and Florida have managed to achieve a breakthrough in cloud-storage. Imagine for a moment, if you could possibly harness the entire storage volume of The Cloud, and then increase that by a trillion-fold! That's exactly what these students have achieved by a technique having to do with their ability to create an environment with sustained, extremely cold temperatures over a lengthy period of time. Imagine all the clouds you could see across the Wyoming horizon, and
Re: (Score:2)
For the love of $DIETY, enforce that trademark so no real company uses that catch phrase!
Re: (Score:1)
As a working stiff seriously just trying to keep up with my rent, I'll ask the Slashdots, is this idea kickstarter worthy, because I can't actually finance the application myself at this time? As always, I'll set the default answer at NO. But oh so how I wish I was proven wrong, yet there's that cynicism kicking in again. Have a nice day y'all, and thanks for the complement, while I get back to bulking SSL certificates. Ho hum.
Re: (Score:1)
Sorry to reply to myself but I just got an idea. "That's the power of the cloud, where the lightening comes from, cubed!"
Re:This is how we learn (Score:5, Funny)
The useful thing about the cloud is that no-one knows what it actually is, so any company is free to call their product cloud-based without contest.
Reminds me of the quote about "big data" being like sex in high school. Nobody's really sure what it is, but everyone thinks that everyone else is doing it, so everyone says they're doing it, too.
Re:This is how we learn (Score:5, Informative)
It basically runs a dynamic DNS client that lets you connect to your NAS away from home, via a web site. For this to work it must accept connections through your firewall, which it uses UPnP to set up.
Re: (Score:2)
Re: (Score:2)
Unfortunately, no one can be told what The Cloud is. You have to see it for yourself.
Re: (Score:3)
Really? So we had "Cloud" back in 1984 when NFS was released?
Re: (Score:2, Insightful)
Yes.
Re: (Score:3)
Kind of defeats the cloud feature on Synology NAS doesn't it?
It's called VPN. Learn it, live it, love it. Also, welcome to slashdot. You must need a welcome, because we know about VPNs here.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Ironically enough, the Synology NAS has an OpenVPN package that can be installed to act as a SSL/TLS VPN server. Simple and easy
Re: (Score:2)
Pretty much a standard architecture decisions that people are making, then bothered by the predictable results.
Client < - > Server ( Firewall < - > Application Layer with authentication < - > NAS )
You can scale any of the 3 server side layers as needed, add encryption to the client or application layer, and have granular control.
The issue is really that people (E.G. CEO/CFO/Shareholders) don't want to "PAY" for a proper architecture. If you don't build it secure, don't bitch when the solu
Re: (Score:2)
Are we sure this exploit only affects Synology users who have the web access feature turned on?
Re: (Score:2)
It should be attached to a network fire-walled off from the Internet and only accessible if you are on the local LAN.
But it is based on Linux, right? Why would it need to be fire-walled off from the Internet when so many Linux servers and appliances are on the Internet?
Re: (Score:2)
If it was meant to be connected to the internet it would be called ASOTAS
Re: (Score:3)
Re: (Score:2)
Is there a consumer-grade router that supports IPv6, and by default has a firewall enabled that's as effective as PAT?
While I realize NAT (PAT) isn't technically a firewall, it does provide much of the same security as one.
Nuke it from orbit, then restore from backups. (Score:2)
You do have backups, right?
Re: (Score:3, Funny)
Of course. But they are on another similar box connected to the internet of things which was crypted earlier.
Re:Nuke it from orbit, then restore from backups. (Score:4, Insightful)
Backup? What do people usually use NAS for, I always thought it's mostly for ripped/torrented movies and backups of other computers. Neither of these need backups.
Re: (Score:3)
Re: (Score:2, Funny)
They may have some unhappy customers right now; but 'NAS', in Synology's product lineup, includes a variety of devices that are aimed either at reasonably serious users or very serious pirates.
Translation: They have a built-in torrent client and FTP server. Therefore you can practically smell the salt water reeking from ye digital box.
I love how certain tools label people as scurvy dogs hell-bent on illegal activities.
Re:Nuke it from orbit, then restore from backups. (Score:5, Funny)
The deluxe edition comes with an eye-patch. They initially offered a parrot, but there where some shipment incidences*.
*: There's still some debate about the actual status of the parrots upon arrival. Synology insists on the parrots' being alive, but there have been customer reports on the parrots being: "passed on", "no more", "ceased", "expired and gone to meet it's maker", "a stiff", "Bereft of life", "resting in peace", among others.
Re: (Score:2)
Synology's NAS OS has a nice built in BT client with built in search that goes to all your favorite sites.
Re: (Score:2)
The NAS OS is linux and the BT client is just transmission with a web interface.
But it is nicely put together :)
Re: (Score:2)
(That said, I'm always a bit surprised at how many awful embedded firmwares are elderly-linux-with-dubious-GPL-compliance rather than BSD. It's not as though putting a dangerously awful proprietary web interface and lighthttpd on one is all that different from doing so on the other. I can only assume that the on
Re: (Score:3)
Synology now insists that this in fact reflective of their move to quantum computing technology, and that the parrot is both alive and dead.
Re: (Score:2)
No I think it was a Norwegian Blue, but I'm not sure we can af-fjord any more references to that sort of thing
Re: (Score:2)
I don't know how successful they've been in terms of market share; but their pitch for most of the 'rackstation' line suggests that they are hoping for relati
Re: (Score:2)
Network attached storage is all kinds of convenient; but if you are the attacker, and building a vendor-specific ransom package, it needs to be a vendor who sells enough devices that store important files, particularly ones that aren't just backups
Re:Nuke it from orbit, then restore from backups. (Score:5, Informative)
My Synology NAS is my home-based business' file server, a local machine backup (for my development machine and my digital audio workstation), and a media server for my ripped DVDs and Blurays, although this third function is just a nice bonus for me. Synology NAS devices have a very handy cloud backup application as well, which I use to backup all my most critical files to Amazon S3 services. I hope most people made use of this, because if Cryptolocker has taught us anything, it's that you absolutely need offsite backups that are NOT connected to your network.
I bought it specifically because it makes it easy to set up a multi-tiered backup strategy like that - something that takes on new importance when you spend a few years writing code on your own dime. As a file server, it's fantastic for small operations. I had a drive begin to fail last year, and so had a chance to test out the hot-swapping / RAID rebuilding feature. Worked like a charm - was super simple and zero down-time.
Personally, I've never once considered opening up my NAS to the outside internet. That always seemed crazy risky to me - after all, a single software mistake, a buffer overrun in a protocol stack of some sort, and *poof*, there's direct access to your file server and all it's critical data. I guess sometimes being paranoid pays off, but it gives me no pleasure to say so.
Re: (Score:2)
http://www.code42.com/crashplan/ [code42.com]
http://forum.synology.com/wiki/index.php/CrashPlan_Headless_Client [synology.com]
Although the synology forums are currently getting destroyed (guessing from this article).
Re: (Score:2)
Re: (Score:2)
No, crashplan isn't a vm running linux with rsync, it's a backup service. If you bothered to spend 30 seconds clicking on either link, you'd have seen that. Instead you started babbling about "serious backups" using rsync
Re: (Score:3)
You do realize that for the S3 backup to work Synology or the NAS (and the NAS has you Synology login info) has your login information for S3, and that if this thing is owning the NAS there is a pretty damn good chance the malware has owned your S3 instance as well right? The only way it wouldn't is if the S3 backup is totally manual.
Re: (Score:2)
That's actually a very good point. The S3 backup is completely automated which means, of course, that everything the malware would need to screw with your S3 (or other) account is right there for the taking - the keys have to be local and accessible. Granted, we haven't heard any confirmation of this malware having those sorts of capabilities, but we've seen incredibly sophisticated banking trojans out in the wild that do things that are far more sophisticated.
Damn. Well, all the more reason to stay patc
Re: (Score:3)
You do realize that for the S3 backup to work Synology or the NAS (and the NAS has you Synology login info) has your login information for S3, and that if this thing is owning the NAS there is a pretty damn good chance the malware has owned your S3 instance as well right? The only way it wouldn't is if the S3 backup is totally manual.
Amazon has a very extensive authentication system [amazon.com] -- you can easily configure the Synology with an S3 access key that only has "List Files" and "Upload Files" permissions, but not "Delete Files" or "Overwrite Files". This way, even if the Synology box gets owned or a user fat-fingers something, the files on S3 aren't at risk. You don't (and shouldn't) need to use your AWS root access keys for S3.
I have a similar setup with Amazon's Glacier: my standard access key has only list, upload, and retrieve permissi
Re: (Score:2)
If the keys are stored on the box in any way then they are compromised because the box is. The synology box is rooted, any information stored on that box is compromised. If for example your root key for S3 is backed up on the NAS then it's compromised.
People are glossing over this, if the box is rooted everything it knows and stores is compromised, that's how people need to be analyzing this instead of blowing it off as no big deal.
Re: (Score:2)
If the keys are stored on the box in any way then they are compromised because the box is. The synology box is rooted, any information stored on that box is compromised. If for example your root key for S3 is backed up on the NAS then it's compromised.
Agreed. That's why you shouldn't use the root S3 access key for anything (in fact, don't generate one at all). Use service-limited, least-access keys for AWS accounts: there's no reason a NAS should have an access key capable of creating EC2 instances. It should have list+write access only to S3 (and/or Glacier). If users want to delete files from S3, they should have to log in with a different user (perhaps to the AWS console) and specifically do that.
Amazon provides good options in this regard, and it's t
Re: (Score:1)
Re: (Score:3)
Re: (Score:3)
Backups need backups too. Your data isn't safe unless there are backups all the way down.
But seriously, having two copies is enough most of the time, provided they are somewhat separate (i.e. not on two identical, connected NAS machines).
Re: (Score:2)
Re: (Score:2)
Why don't you just restore from your offsite backup?
Airfare would probably be just as expensive.
"Investagating"? (Score:3)
Really?
Re:"Investagating"? (Score:5, Funny)
A've encrypted all the farst As (the nanth letter of the alphabet) an each word on Slashdot (except an sags). You must pay me sax mallion dollars to get them back.
Re: (Score:2)
Goddammit. There are three Is in "investigating."
*palmface*
Re: (Score:2)
Well, they need gates. And gates aren't free.
RTFS (Score:2)
Amazing! Somebody is paying attention.
Interesting (Score:4, Interesting)
Re: (Score:3)
My bit of pondering is whether that 0.6btc can be tracked/identified at companies handling bitcoins, and especially at companies converting between btc and real money?
Could you basically get the police (Europol/Interpol?) involved, and when a company reports that a user is trying to use/convert the btc you paid with, have that user charged with ransoming data, or taking stolen goods (i.e. either as the original thief, or as a fence)?
If the 0.6btc is acquired by the person via a laundry-service, charge him/h
Re: (Score:2)
Wasn't the whole objective of Bitcoin to create a system where you *couldn't* do that?
Re: (Score:2)
Bitcoins must, as far as I can tell, have something that identifies them; at the very least, you need to be sure that only 1 person mined a given coin (solved a given mathematical challenge), to avoid endless, easily mined coins.
Am starting to think one should investigate the possibility of making a blacklist of coins known to be acquired via illegal methods.
Re: (Score:2)
Rereading your post, it looks like you weren't implying the link between a person and a bitcoin userid like I thought. But still, part of the value of bitcoins is that there is no central authority to revoke your currency. Hence the use in black market applications etc.
Well, until that one group that has 50%+1 of the coins decides it wants to become that authority, I suppose.
Re: (Score:1)
That's what I was thinking.
Now this is just data, but what if this kind of thing gets used for real ransom demands?
Like kidnapping someone's child and demanding ransom in bitcoin.
Is it feasible that one could get away with that?
Wouldn't that be the death of TOR and bitcoin?
I mean I'm all for privacy but not if it facilitates kidnapping.
Re: (Score:2)
Clearly, ransoms are Veblen goods.
Cheeky bastards (Score:5, Funny)
From TFA: the message that pops up to the victims ends with:
Copyright 2014 SynoLocker(TM) All Rights Reserved.
I have a real hard time respecting that copyright...
Re:Cheeky bastards (Score:4, Insightful)
I have a real hard time respecting that copyright...
And yet you are still required by law to respect it, even though the act of creating and disseminating that code is illegal.
Update from Synology-sec issue patched 12/2013 (Score:5, Informative)
Re: (Score:1)
Re: (Score:3)
Re: (Score:1)
Also hopefully you have a newer version of the hardware. They EOL'd a bunch last year and people were not happy. In other words they get 4.0 and thats it. Think mine EOLs in 2 years.
I get that some want full control but shouldn't the default be to auto-install?
The upgrades have been haphazard from synology. They usually take 1-3 patches before they fix everything. Also sometimes they tell it to do 'scrubbing'. Which then has the effect of overheating the drives. Then people lose their data and blame
Re: (Score:3)
[quote]Unlike a desktop OS, browser, or other software, the DiskStation does not normally remind you to do this. You have to check manually.[/quote]
It's trivially easy to set up a Synology NAS to email/sms/skype/etc you about both OS and package upgrades being available, at least on the versions of DSM I've used.
Re: (Score:2)
Unlike a desktop OS, browser, or other software, the DiskStation does not normally remind you to do this.
My NAS on DSM 5 popups the update window shortly after connecting if a new update is available...
Not a Zero Day (Score:2)
There is no mention in the article of this being a zero day vulnerability, in fact the article specifically says "it’s not clear yet how SynoLocker’s operators installed the malware".
As others have said Synology is reporting the vulnerability was patched in December [synology.com]. Hardly a zero day.
/.ed (Score:5, Interesting)
Forum post so far:
Hello Everyone,
We’d like to provide a brief update regarding the recent ransomware called “SynoLocker,” which is currently affecting certain Synology NAS servers.
Based on our current observations, this issue only affects Synology NAS servers running some older versions of DSM (DSM 4.3-3810 or earlier), by exploiting a security vulnerability that was fixed and patched in December, 2013. At present, we have not observed this vulnerability in DSM 5.0.
For Synology NAS servers running DSM 4.3-3810 or earlier, and if users encounter any of the below symptoms, we recommend they shut down their system and contact our technical support team here: https://myds.synology.com/supp... [synology.com].
-When attempting to log in to DSM, a screen appears informing users that data has been encrypted and a fee is required to unlock data.
-A process called “synosync” is running in Resource Monitor.
-DSM 4.3-3810 or earlier is installed, but the system says the latest version is installed at Control Panel > DSM Update.
For users who have not encountered any of the symptoms stated above, we highly recommend downloading and installing DSM 5.0, or any version below:
-For DSM 4.3, please install DSM 4.3-3827 or later
-For DSM 4.1 or DSM 4.2, please install DSM 4.2-3243 or later
-For DSM 4.0, please install DSM 4.0-2259 or later
DSM can be updated by going to Control Panel > DSM Update. Users can also manually download and install the latest version from our Download Center here: http://www.synology.com/suppor... [synology.com].
If users notice any strange behavior or suspect their Synology NAS server has been affected by the above issue, we encourage them to contact us at security@synology.com.
Apologies for any problems or inconvenience caused. We will keep you updated with latest information as we address this issue.
Article needs a rewite, simple, yet just the same. (Score:2)
As for the article...
First part says "According to the user, there’s a small window of opportunity to minimise the damage. That is, if you can backup files faster than the program encrypts them."
Then buried where many don't wonder (towards the end, it mentions "1) Power off the DiskStation immediately to avoid more files being encrypted"
I would think the wise thing would be to exchange the location of the two sentences. least you have some would be hero actually try to find where to start saving at.
Oh! NAS files, not NSA files (Score:1, Offtopic)
I misread this as
Synolocker 0-Day Ransomware Puts NSA Files At Risk
That would have been a much more interesting article to read, methinks :)
Re: (Score:2)
Re: (Score:2)
the VIRUS... what?! (Score:1)
Are all the security geeks busy at Blackhat such that nobody realized this mistake?
Dyslexia makes things more interesting (Score:2)
Here I was, reading the headline as:
Synolocker 0-Day Ransomware Puts NSA Files At Risk
If only....
Re: (Score:2)
That's not entirely fair. That's still a pretty recent version - if you purchase from Amazon or NewEgg you have a good bet of getting it even on an x14 model, and certainly will get that or older on any other model - and there's no "Automatic Update" mechanism on Synology systems. Plus they're essentially storage appliances; users aren't expected to log into and manage them frequently. And the feature that seems to put people at risk is a selling point of the device.
I'm not bashing Synology; I have two S
Re: (Score:2)
Re:What a load of FUD! (Score:5, Interesting)
A NAS device is not a toaster. It's a file server running a lightweight but fully-featured operating system. You don't need to be a professional network administrator, but you do need to be careful enough to at least check in regularly for updates. One presumes such hardware was purchased because you had valuable data you wished to manage or protect. Honestly, a NAS is really not a purchase for "normal" people. Power-users and up, I'd say, are the minimum personnel requirements.
Even so, Synology machines are not hard to patch. They download OS updates automatically by default. All you have to do is log in via the administration page once in a while and click the "update" button, since it pops up right on the page after it sees you have an update to install. And every update has a link right next to it that points to a web page detailing exactly what changed or what was fixed. I'd suppose the reason there's no "auto-update" is because an update requires a 5-10 minute patch and reboot cycle, and you generally don't want your file server automatically rebooting at it's own convenience.
I'm presuming (since information is a bit scarce) that users either failed to patch their machines for six months or longer due to neglect, or they made a deliberate choice not to do so for some reason, yet kept their internet-facing services wide open (note that these are not installed or enabled by default). Unfortunately, that's pretty much a guaranteed recipe for an attack of this sort. It's a crappy way to have to learn a lesson.
Re: (Score:3)
Mine nags me every time there's an update released. There's no unattended update option, but that makes sense for a NAS.
Re: (Score:2)
That's still a pretty recent version - if you purchase from Amazon or NewEgg you have a good bet of getting it even on an x14 model, and certainly will get that or older on any other model - and there's no "Automatic Update" mechanism on Synology systems. [...]
I'm not bashing Synology; I have two Syns running in my system
I'm having a hard time reconciling those statements because it doesn't match my experience at all. First, it's my understanding that all Synologys come "bare" and you have to download and install the OS when you first power them on. My DS412+ that I bought a couple of months ago certainly did. It's initial boot gave me a web page with instructions for downloading and installing the most recent OS version.
Second, Synologys don't automatically reboot themselves, but can easily be configured (as in truly easi
Re: (Score:2)
Re: (Score:2)
There's plenty of free options out there, if you really need that much storage, you need to care how it works and how well.
Sure, but the free options generally don't come in something the size of a shoe-box, with nearly silent fans, and 8 hot-swappable drive bays. Besides, as others have said, I've got better thigns to do with my time than futz around with mass storage.
Re: (Score:2)
It has a huge Wife Acceptance Factor, for one. We have iPhone apps that let you select any of the movies I've ripped onto it and play them back directly to our Apple TV (or any of another of settop boxes). Throw music onto it and the songs show up in iTunes for people on our LAN. Save a file to a certain folder on our laptop home directories and it gets synced to the NAS (ala Dropbox), made available on our iPads, then backed up to Amazon Glacier.
In short, it does everything you'd ever want a NAS to do but