Hackers Targeting Synology

Filed under: Tech PR |


F*cking hackers…..

Synology in Hacker’s Crosshairs

Synology as a company has grown leaps and bounds in the past several years.  One sign that they are now “big time” is they have been targeted twice by hackers in the past few months.  First it was a BitCoin miner hack now SynoLocker.

This is from direct from Synology:

You may have heard by now that DSM is undergoing a CryptoLocker hack called SynoLocker – as of yesterday (08/03/14). It’s a BitCoin Mining hack that encrypts portions of data, and ransoms the decryption key for .6 BitCoin ($350). So far, it looks like the matter is localized to non-updated versions of DSM 4.3, but we are actively working on, and researching the issue to see if it also effects DSM 5.0 as well.

In the interim, we are asking people to take the following precautions:

A. Close all open ports for external access as soon as possible, and/or unplug your Disk/RackStation from your router

B. Update DSM to the latest version

C. Backup your data as soon as possible

D. Synology will provide further information as soon as it is available.

If your NAS has been infected:

A. Do not trust/ignore any email from unauthorized/non-genuine Synology email. Synology email always has the “synology.com” address suffix.

B. Do a hard shutdown of your Disk/RackStation to prevent any further issues. This entails a long-press of your unit’s power button, until a long beep has been heard. The unit will shut itself down safely from that point.

C. Contact Synology Support as soon as possible at, http://www.synology.com/en-global/support/knowledge_base

So far it sounds like DSM 4.3 is the target, so if you haven’t updated to DSM 5, now is the time to do so.  We will keep up with this story as we here more.