Ultimate magazine theme for WordPress.

Synology® and TWCERT/CC Jointly Announce Their Collaboration with International Cybersecurity Organizations

3

Synology® and the Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) jointly announced the recent ransomware attack, where the attacker obtained admin credentials by brute force and encrypted the data on various brands of NAS (Network Attached Storage), was under control after they took down the C&C server on July 22, thanks to the collaboration with international cybersecurity organizations. Synology and the TWCERT/CC urge all NAS users to reinforce system security settings to keep their data safe.

“Synology has always made protecting user data our first priority,” said Ken Lee, Manager of Security Incident Response Team at Synology Inc. “As a long-term active participant in the international cybersecurity community, Synology was able to promptly collaborate with international cybersecurity organizations when the attack launched, preventing it from turning into an outbreak.”

Synology began to receive user reports since July 19 indicating that the data on their NAS was encrypted by ransomware. The investigation report showed that the attacks weren’t based on DSM system vulnerabilities. Instead, they targeted those using weak passwords of the system default admin accounts. After the attacker gained admin access, they encrypted the files and asked for ransom. On July 22, there were dozens of affected Synology users reporting this attack to the Global Technical Support Department, and Synology estimated that over ten thousand different brands of NAS around the world may be exposed to risks and can be potential targets in this attack. On the same day, Synology traced and connected to the attacker’s C&C server, notifying the TWCERT/CC at the same time to initiate international collaboration. On July 26, with the information provided and forwarded by Synology and TWCRET/CC respectively, CFCS-DK identified the source of the attack and removed the C&C server.

“TWCERT/CC reacted promptly, obtained incident reports to initiate the international collaboration, and controlled the situation at an early stage, all thanks to our long-term partnership,” said Joy Chan, the director of the TWCERT/CC. “We look forward to seeing more brands follow in Synology’s footsteps to set up product safety teams and actively interact with cybersecurity organizations.”

Even though this matter is already under control, Synology suggested that all NAS users regardless of the brands strengthen data security by taking the following measures:

  • Enable firewall and only connect to the Internet when necessary.
  • Set up 2-step verification to prevent unauthorized login attempts.
  • Disable the system default “admin” account.
  • Use a strong password, and apply password strength rules to all users.
  • Enable Auto Block in Control Panel to block IP addresses with too many failed login attempts.
  • Run Synology Security Advisor to make sure there is no weak password in the system.
  • Perform multi-version backup using Synology Hyper Backup, backing up the data on your NAS to multiple destinations such as on-premises storage, remote folders, and public cloud.

To learn more about preventing ransomware attacks, please visit https://www.synology.com/solution/ransomware

 

Event timeline

7/19

  • Synology received user reports saying that the data on their NAS was encrypted by ransomware.
  • The report investigation ruled out possibilities that the attacks resulted from DSM system vulnerabilities; instead the attacks were launched using brute force.

7/22

  • Dozens of affected Synology users reported this attack to the Global Technical Support Department.
  • Investigated and estimated that over ten thousand different brands of NAS around the world may be exposed to risks and can be potential targets in this attack.
  • Synology traced and connected to the attacker’s C&C server.
  • Synology notified the TWCERT/CC to request an international collaboration.

7/26

  • The TWCERT/CC reported and collaborated with the CFCS-DK in Denmark, and took down the attacker’s C&C server according to the IP address.
  • Follow-up observation showed that the number of attacked users is slowing down.

Get real time updates directly on you device, subscribe now.

3 Comments
  1. Penelope Arnold says

    This is the right web site for everyone who wants to understand this topic. You know so much its almost hard to argue with you (not that I really would want to…HaHa). You certainly put a new spin on a topic that’s been discussed for ages. Great stuff, just wonderful!

  2. Victoria Vance says

    I love your writing style genuinely enjoying this web site.

  3. ???????? says

    Like!! Really appreciate you sharing this blog post.Really thank you! Keep writing.

Leave A Reply

Your email address will not be published.

Do NOT follow this link or you will be banned from the site!