news-details

A successful collaboration is made by Synology, TWCERT/CC with International Cyber security Organizations

Synology and the Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) jointly reported the recent ransomware attack, where the attacker obtained admin credentials by brute force and encrypted the data on various brands of NAS (Network Attached Storage), was under control after they took down the C&C server on July 22, thanks to the collaboration with international cybersecurity organizations. Synology and the TWCERT/CC urge all NAS users to reinforce system security settings to keep their data safe.

Synology has constantly made ensuring user data our first priority, said Ken Lee, Manager of Security Incident Response Team at Synology Inc. As a long-term active participant in the international cybersecurity community, Synology was able to promptly collaborate with international cybersecurity organizations when the attack launched, preventing it from turning into an outbreak.

Synology started to receive user reports since July 19 demonstrating that the data on their NAS was encrypted by ransomware. The investigation report showed that the attacks werent based on DSM system vulnerabilities. Instead, they targeted those using weak passwords of the system default admin accounts. After the attacker gained admin access, they encrypted the files and asked for ransom. On July 22, there were dozens of affected Synology users reporting this attack to the Global Technical Support Department, and Synology estimated that over ten thousand different brands of NAS around the world may be exposed to risks and can be potential targets in this attack. On the same day, Synology traced and connected to the attackers C&C server, notifying the TWCERT/CC at the same time to initiate international collaboration. On July 26, with the information provided and forwarded by Synology and TWCRET/CC respectively, CFCS-DK identified the source of the attack and removed the C&C server.

TWCERT/CC reacted promptly, obtained incident reports to initiate the international collaboration, and controlled the situation at an early stage, all thanks to our long-term partnership, said Joy Chan, the director of the TWCERT/CC. We look forward to seeing more brands follow in Synologys footsteps to set up product safety teams and actively interact with cybersecurity organizations.

Despite the fact that this matter is already under control, Synology suggested that all NAS users regardless of the brands strengthen data security by taking the following measures:
Enable firewall and only connect to the Internet when necessary.
Set up 2-step verification to prevent unauthorized login attempts.
Disable the system default "admin" account.
Use a strong password, and apply password strength rules to all users.
Enable Auto Block in Control Panel to block IP addresses with too many failed login attempts.
Run Synology Security Advisor to make sure there is no weak password in the system.
Perform multi-version backup using Synology Hyper Backup, backing up the data on your NAS to multiple destinations such as on-premises storage, remote folders, and public cloud.
To learn more about preventing ransomware attacks, please visit https://www.synology.com/solution/ransomware

Event timeline
7/19
Synology received user reports saying that the data on their NAS was encrypted by ransomware.
The report investigation ruled out possibilities that the attacks resulted from DSM system vulnerabilities; instead the attacks were launched using brute force.
7/22
Dozens of affected Synology users reported this attack to the Global Technical Support Department.
Investigated and estimated that over ten thousand different brands of NAS around the world may be exposed to risks and can be potential targets in this attack.
Synology traced and connected to the attackers C&C server.
Synology notified the TWCERT/CC to request an international collaboration.
7/26
The TWCERT/CC reported and collaborated with the CFCS-DK in Denmark, and took down the attackers C&C server according to the IP address.
Follow-up observation showed that the number of attacked users is slowing down.

Related News Post