Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A NAS box is going to get hacked (X), have backups neglected/misconfigured/misdelegated and then have data accidentally deleted or experience disk crashes, etc. You can improve your chances by investing time and energy on taking good care of it, but even then you can still get bitten.

(X) devices from both vendors you mentioned are pretty frequent victims



Only devices with services exposed to Internet were hacked. Devices inside LAN, with external access provided by VPN, were not hacked.

This applies to any service or device that you run. NAS is no exception. Your printer could be hacked, if you exposed it to the Net.

Data can be accidentaly deleted anywhere, cloud providers or your own storage. You must make backups anyway.


No, that's 90s thinking. Current methods don't require the boxes/services to be directly internet-addressable.

An exception is when you have a completely isolated LAN that's not serving internet-connected computers. But that's pretty spartan.


The infections needed to have access to web console (in Synology case, that's port 5000).

Unless you are targeted, that's very difficult to achieve even in slightly secured networks (i.e. every possible toggle in settings is not ON).

When you are targeted, it does not matter, whether you use Synology or Dropbox, the approach is tailored to your situation.


For just one technique, read up on DNS rebinding attacks vs home "routers". Same works against NAS devices.

These devices are so common that it is cost effective to do against a bunch of device+vuln combos in a mass drive-by fashion (served by compromised or shady ad networks or any of the other 100 methods that get you to follow a bad link).

Or there's going to be another taiwanese device or PC compromised on your LAN and it'll automatically portscan & metasploit all your network in 5 minutes.

Also don't think getting "targeted" means you have to be James Bond-special. It can mean someone found a prominent blog they'd like to inject their rogue ads on. Or you pissed someone off online and they got some script kiddies to spend 10 minutes to ruin your day and get their laughs (or $20 in bitcoin).

Dropbox's security guys will detect these after they get used a few times (before they get to you), unlike your taiwanese NAS vendor who will only do something half-assed 2 weeks after it hits the news. Or nothing when it doesn't hit the news, as often happens.

All in all the mindset that you have "LAN" or "intranet" that's a significant security perimeter is outdated even if you're nobody. Don't make a network that's "hard and crunchy on the outside, soft and chewy on the inside".


Well, it the rebind attacks depends on multiple weak points. Our DNS cache does not allow for external DNS servers to return IP addresses from our internal range. But I guess not everyone's router does that.

But your point is valid.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: