Тёмный

Massive Botnet may have Compromised Synology Devices (make sure you’re safe) 

WunderTech
Подписаться 37 тыс.
Просмотров 10 тыс.
50% 1

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 59   
@notreallyme425
@notreallyme425 11 дней назад
At least they’re not blowing up
@leonidiakovlev
@leonidiakovlev 11 дней назад
Some people build their smart home based on Zigbee devices (smart switches, plugs). They are not a part of the LAN, they have a separate dedicated network, so they cannot theoretically access Internet.
@erichubbard7754
@erichubbard7754 9 дней назад
Zwave devices work great
@Nasguy-b7q
@Nasguy-b7q 2 часа назад
They just released quts hero with zfs for the 453E. This is a major game changer for me. Smaller NAS devices can have enterprise level protection. Gotta hand it to QNAP they really have been working on the right stuff. Wish Synology didn't loose their minds as they had something special years ago. Now enjoying the same with their competitor. What you can do with the hardware and m2s is really cool. Lots of fun...
@Nasguy-b7q
@Nasguy-b7q 7 дней назад
Great content as always! Thank you, as you are even in you videos. Too many synology fanboys these days. Mike Faucher is good as well.
@danielmcgowan9534
@danielmcgowan9534 11 дней назад
I thought security cameras were placed on a network that doesn't access the Internet. Use a second port on the Synology to join the security caamera network to get the video feed. Then the Synology has access to the Internet. That way you still have surveillance, but the cameras are not exposed to the Internet.
@sitte24
@sitte24 11 дней назад
or use VLANs
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
That works well if you have a way to connect all cameras to one Switch for the cameras (or a combination of Switches). If you don't, VLANs work too.
@QuikTechSolutions
@QuikTechSolutions 4 дня назад
Excellent video! Good information to share. Thanks. 🙏🏻
@WunderTechTutorials
@WunderTechTutorials 4 дня назад
Thanks, Tony! Appreciate you watching!
@oroville12345
@oroville12345 11 дней назад
This is exactly why you can only connect to my nas with tailscale.
@mitchellsmith4601
@mitchellsmith4601 11 дней назад
That’s a mistake. Use your own VPN on our own appliance, or firewall, and don’t ever expose your NAS to the Internet. And don’t ever put your security in a third party’s hands, even if it is Tailscale.
@tableround3019
@tableround3019 11 дней назад
I was going to say precisely the opposite. Great, now Synology is forcing us to use Tailscale and Jellyfin instead of Synology’s in house software apps.
@oroville12345
@oroville12345 11 дней назад
@@mitchellsmith4601 you sir do have a very good point but I am just lazy 😂.
@sibu7
@sibu7 11 дней назад
@@mitchellsmith4601 I wish Synology had an official WireGuard package. I don't understand why they only support Tailscale out of the box. Tailscale is based on WireGuard but you have to use and trust third-party infrastructure, which is what I want less of when I use my NAS.
@EuroPC4711
@EuroPC4711 11 дней назад
@@tableround3019how do you come to the conclusuon, that Synology forces us to use Tailscale? Im Fine with QuickConnect and VPN on my Netgate.
@DavidM2002
@DavidM2002 11 дней назад
I have 6 security cameras around my home. Rather than segmenting my network, I have created a filter on my Synology router to restrict those cameras so that they can only access the NAS to which they send the captured event JPG's and MP4's and zero internet access. Do you think that is sufficient ?
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
Did you set it up as a web filter, and then block all of the categories?
@DavidM2002
@DavidM2002 11 дней назад
@@WunderTechTutorials I set it up as a web filter only to block all web site and only to allow it to get a time signal from nist.gov . I just changed it to block all categories as well. ( As an aside, I find the Synology router filter settings a bit odd. If you set up an Allow filter, that's all you get. But if you set up a Block filter, there is also an Allow tab. And sometimes, the filter name just shows a red frame and won't let you proceed. )
@DeadlyDragon_
@DeadlyDragon_ 7 дней назад
I do NOT recommend using your storage device as a router. You should have separation of duties with your network hardware. As any vulnerabilities discovered in the underlying firmware of your synology could compromise your entire NAS and in this case since it is also your router you have now given the attacker full control over your home network.
@DavidM2002
@DavidM2002 7 дней назад
@@DeadlyDragon_ You may have misunderstood my post. I have a Synology ROUTER as well as my Synology NAS. I do not use my NAS as a router. And, I very much agree with you.
@DeadlyDragon_
@DeadlyDragon_ 7 дней назад
@@DavidM2002 whoaaa ok so today I learned synology has started making networking gear. huh.. I don't know how I feel about that but time will tell how reliable it is.
@RockTheCage55
@RockTheCage55 11 дней назад
So when you say don't connect the Synology to the internet how far do you go with that statement? Are you talking don't enable quickconnect or are you saying directly connect to the internet through something like port forwarding? Turning quickconnect definitely adds a lot of flexibility when your out & about. You could essentially do the same thing different ways like for example using tailscale. You could take what your saying to extreme to by putting your synology into a vlan & not allowing internet (which becomes a pain because of updates). Can you explain?
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
Port forwarding. I don't think anyone should port forward the DSM port, and most probably shouldn't use a reverse proxy either outside of very specific scenarios. Your risk with just about anything is minimal when it's behind your firewall, and adding VLANs locally and following security best practices strengthens it even further.
@RockTheCage55
@RockTheCage55 10 дней назад
@@WunderTechTutorials thanks for the clarification
@michaelgambrell3467
@michaelgambrell3467 4 дня назад
@@WunderTechTutorials What about when that port forward is a reverse proxy to a container running Jellyfin?
@kevinhughes9801
@kevinhughes9801 9 дней назад
Good stuff thanks
@nixxblikka
@nixxblikka 11 дней назад
Love the Idea of using a virtual DSM as honeypot. I thought about this too, but unfortunately No second ISP available
@TSSC
@TSSC 10 дней назад
Your current settings isn’t necessarily proof for that, for instance upnp, wasn’t active at an earlier point in time. If someone was logged in as admin they could have enabled and the disabled. No malware, but how about exfiltration?
@WunderTechTutorials
@WunderTechTutorials 10 дней назад
It was disabled on the router so they wouldn't have been able to get it to work. They could have downloaded the data, but they didn't move or delete any data as there was nothing in the logs. My suspicion is they simply validated that they could sign in a few times and never did anything, but again, that's really just my thought with the information I have available.
@RogierYou
@RogierYou 11 дней назад
Does setting NexDNS on the router as the dns server help block this traffic if you use all their network protection lists?
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
If the domain was classified as malware, it's possible but I'm not sure how known this was on a wider scale until recently.
@steveyg777
@steveyg777 11 дней назад
Is there a way to test if my nas was attacked or has some kind of malware installed and running? Is there also a way to diagnose attacks on my router too? (Sorry, i feel like I'm a noob in this area). I did have dmz enabled for my xbox for a few months in the hope that i had a better and faster connection for multiplayer gaming (cod servers suck). I'm not sure if a way to examine attacks on my xbox though. I have some packages installed from syno community, are they checked thoroughly by the community before being made available?
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
The way I used Pi-hole in the video is the only way that I'm aware of, but that's assuming that you've had it installed and have been using it. Other than that, I don't think there's an answer right now on that but hopefully soon. I'd probably remove the DMZ from your Xbox. Depending on the router, you are potentially opening every single port to your Xbox which isn't good. If CoD requires port forwarding, check the specific ports required and manually handle them.
@steveyg777
@steveyg777 11 дней назад
@@WunderTechTutorials thanks. I have got an Asus rog ax11000 gt pro router which includes guest network pro (a more user friendly vlan system, even though it is possible to install merlin and use actual vlan) and ai protection that actively blocks attacks etc. Hopefully it handled any attacks. I'll have a look at registered attacks on the router, but i think it just gives ip address instead of url so i wouldn't be able to search for that specific url. Information for other people with higher spec routers.
@tonyvalenti6614
@tonyvalenti6614 11 дней назад
Thanks for another great informative video! So, you now make me wonder. I have Synology Routers and NAS’s. I only use Synology packages. I do use Tailscale and update it manually since it takes Synology a while to make the update available. I do have a VLAN with Primary, Guest, and IoT networks along with Firewall rule setup between them. I have a separate computer I’m using as a Plex server and that is the only port I am forwarding. Given all this and what you shared am I in pretty good shape or at great risk? Oh, of course I disabled the Admin account completely.
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
Thank you! Yes, it sounds like you're in good shape. With stuff like this, the malware could have come preinstalled (depending on the manufacturer) or installed from some sort of breach. The former is practically impossible to guard from, but that's why those devices go on an IoT network. The latter is what you protected against, so without looking at it and only giving an opinion, I'd say you're good!
@tonyvalenti6614
@tonyvalenti6614 11 дней назад
@@WunderTechTutorials Excellent! I’m trying best I can to secure and backup responsibly. Thanks again!
@EuroPC4711
@EuroPC4711 11 дней назад
Tank you!
@enricoschiappa3643
@enricoschiappa3643 11 дней назад
The advice of don't expose NAs to internet = put your files on Google Drive or Microsoft One Drive (or similar service)! From my point of view, using a NAS implies to access my data from the internet, otherwise I would have get a big HD and connet it to my PC for the same results. Why pay for a NAS and not able to access my files when I'm out of my home/office? Instead NAS users should be instructed and NAS companies as Synology should build their systems based on this principle to expose safely as possible their NAS to the internet. Otherwise it would be like to have a car in my garage and avoid to drive because I might have an accident. Well learn to drive safely and get a good insurance or do not buy a car!
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
The advice really revolves around using a VPN. There are safe and unsafe ways of doing things, but exposing the NAS to the world is generally viewed as an unsafe approach, while using a VPN is generally viewed as the most safe approach. Every user should assess the situation themselves, but not exposing the NAS to the world doesn't mean you can't connect to it remotely.
@Nasguy-b7q
@Nasguy-b7q 7 дней назад
Sadly if you use Plex, it needs to access the www even if you don't ever access it externally. So your hands could be tied other places.
@DeadlyDragon_
@DeadlyDragon_ 7 дней назад
@@Nasguy-b7q Plex does not expose your NAS to the internet. It connects via NFS on the backend. Now if your plex gets compromised sure an argument could be made there. But that is an additional layer an attacker would need to break through. If you properly setup plex to run under a service account with non root privileges the damage can be restricted to a specific scope vs your entire NAS. This is known as risk acceptance. Opening anything to the internet has an associated risk that you must accept or mitigate.
@DeadlyDragon_
@DeadlyDragon_ 7 дней назад
@@WunderTechTutorials Precisely this. VPN is the only way you should be accessing your NAS from the internet. The VPN sets up an encrypted tunnel between you on the outside world and it bridges you into your internal network. Your VPN should be using some form of certificate based authentication for example OpenVPN or Wireguard.
@pepeshopping
@pepeshopping 11 дней назад
DUH.
@mikehomner4724
@mikehomner4724 11 дней назад
What about Plex??
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
I can't definitively say but I haven't seen anything on Plex up to this point.
@mikehomner4724
@mikehomner4724 11 дней назад
@@WunderTechTutorials Thank you!
@Nasguy-b7q
@Nasguy-b7q 7 дней назад
Plex needs access to the internet to function regardless if you ever use it externally.
@matthewdavis7218
@matthewdavis7218 11 дней назад
I checked my logs and saw my username accessed shared folders via smb3 through my laptop with my lan ip. I was asleep at these times. My firewall is set to block all IPs that aren’t on my LAN. Router UPNP was on without my knowledge. Does this sound like suspicious activity or is this routine connections for smb3?
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
Do you have anything that could have been running? Backup utility, etc? What was port forwarded with uPnP?
@matthewdavis7218
@matthewdavis7218 11 дней назад
⁠​⁠@@WunderTechTutorialsOn the laptop, no. It was actually in sleep mode. To my knowledge nothing was port forwarded.
@WunderTechTutorials
@WunderTechTutorials 11 дней назад
@@matthewdavis7218 I'd say that it's most likely fine, but I can't say for certain. Either way, monitor everything for a few days and reset the password for your account if possible.
@matthewdavis7218
@matthewdavis7218 11 дней назад
@@WunderTechTutorials Thanks. Appreciate the help. Your videos have been very helpful.
Далее
Is Synology KILLING their BEST Applications?
14:47
Просмотров 36 тыс.
The Home Server I've Been Wanting
18:14
Просмотров 185 тыс.
The PROS and CONs of UniFi in 2024
21:59
Просмотров 59 тыс.
TCP/IP for Programmers
3:03:31
Просмотров 138 тыс.
This isn't a normal mini PC... and I love it.
14:17
Просмотров 316 тыс.
A RISC-V Stick-on
8:44
Просмотров 249 тыс.
The Synology Tier List
23:32
Просмотров 10 тыс.
18 Weird and Wonderful ways I use Docker
26:18
Просмотров 206 тыс.