According to a study by Trend Micro, cybercriminals are increasingly targeting NAS devices. These are often only poorly protected and thus serve as an entrance gate. […]
Cyber-gangsters are increasingly focusing their attacks on so-called network-attached storage devices (NAS) and exploiting their lack of protection in a targeted manner, which makes them easier to find. This is reported by the IT security specialist Trend Micro.
Updates, secure passwords
“In many environments, NAS systems are loyal workhorses that perform their tasks without any problems. However, it is precisely because of this that they are regularly forgotten. Unfortunately, from a security point of view, these devices are then only neglected: they do not receive any patches, the AAA principle (authentication, authorization and billing) is hardly used and in many cases not even the default password is changed. All this makes them tempting targets for cyber criminals,” warns Udo Schneider, IoT Security Evangelist Europe at Trend Micro.
According to Trend Micro, threats to NAS devices come in particular from well-known ransomware families such as “REvil and Qlocker”, botnets such as “StealthWorker” and cryptominers such as “UnityMinder” and “Dovecat”. However, targeted attacks, for example by the malware “QSnatch”, also pose a danger to you. NAS devices are a crucial part of storage and backup strategies for companies and individuals. Therefore, these devices should be comprehensively protected against attacks with modern best practices.
No standard configuration
The experts therefore recommend never connecting NAS devices directly to the Internet. Access and security data of all connected devices should also be changed regularly. Preset default passwords should never be retained. If possible, two-factor authentication should be activated if it is available. And also unused services, for example, unnecessary software and applications, should be uninstalled.