Synology NAS devices are hacked to target Linux systems

Synology NAS devices are hacked to target Linux systems
Synology, the Taiwanese manufacturer of Network Attached Storage (NAS) devices, has issued a security advisory warning customers of an increase in brute force attacks on their devices. Sharing their observations, the hardware vendor's Product Security Incident Response team (PSIRT) says it appears the attacks are being orchestrated by the StealthWorker botnet. Furthermore, the PSIRT adds that the attacks do not appear to exploit any vulnerabilities in software running on the NAS and appear to be purely crude in nature.

TheComparison needs you! We take a look at how our readers are using VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey will take no more than 60 seconds of your time and we would greatly appreciate it if you would share your experiences with us.
Click here to launch the survey in a new window
“These attacks exploit a number of already infected devices to try to guess common administrative credentials and, if successful, will gain access to the system to install their malicious payload, which may include ransomware. Infected devices can lead to additional attacks on other Linux-based devices, including Synology NAS, ”Synology shares in its review.

Check these passwords

Internet-connected NAS devices are always in the crosshairs of malicious actors. Qnap, another popular Taiwanese NAS provider, has borne the brunt of malicious campaigns that have targeted devices for everything from ransomware deployment to cryptocurrency mining. To protect against the current attack, Synology advises its users to ensure that devices have strong administrative credentials. In addition, Synology users should enable auto-lock and account protection features on their NAS devices, and enable multi-step authentication to add another layer of security beyond passwords. Synology, for its part, is working with the "relevant" Computer Emergency Response Teams (CERTs) to disable the command and control (C2) servers known to power the StealthWorker malware.