Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Synology® and TWCERT/CC Jointly Announce Their Collaboration with International Cybersecurity Organizations

August 2019 by Marc Jacob

Synology® and the Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) jointly announced the recent ransomware attack, where the attacker obtained admin credentials by brute force and encrypted the data on various brands of NAS (Network Attached Storage), was under control after they took down the C&C server on July 22, thanks to the collaboration with international cybersecurity organizations. Synology and the TWCERT/CC urge all NAS users to reinforce system security settings to keep their data safe.

Synology began to receive user reports since July 19 indicating that the data on their NAS was encrypted by ransomware. The investigation report showed that the attacks weren’t based on DSM system vulnerabilities. Instead, they targeted those using weak passwords of the system default admin accounts. After the attacker gained admin access, they encrypted the files and asked for ransom. On July 22, there were dozens of affected Synology users reporting this attack to the Global Technical Support Department, and Synology estimated that over ten thousand different brands of NAS around the world may be exposed to risks and can be potential targets in this attack. On the same day, Synology traced and connected to the attacker’s C&C server, notifying the TWCERT/CC at the same time to initiate international collaboration. On July 26, with the information provided and forwarded by Synology and TWCRET/CC respectively, CFCS-DK identified the source of the attack and removed the C&C server.

Even though this matter is already under control, Synology suggested that all NAS users regardless of the brands strengthen data security by taking the following measures:

• Enable firewall and only connect to the Internet when necessary.
• Set up 2-step verification to prevent unauthorized login attempts.
• Disable the system default "admin" account.
• Use a strong password, and apply password strength rules to all users.
• Enable Auto Block in Control Panel to block IP addresses with too many failed login attempts.
• Run Synology Security Advisor to make sure there is no weak password in the system.
• Perform multi-version backup using Synology Hyper Backup, backing up the data on your NAS to multiple destinations such as on-premises storage, remote folders, and public cloud.

See previous articles


See next articles