Synology® Investigates Ongoing Brute-Force Attacks From Botnet
Taipei, Taiwan—August 4, 2021—Synology PSIRT (Product Security Incident Response Team) has recently seen and received reports on an increase in brute-force attacks against Synology devices. Synology's security researchers believe the botnet is primarily driven by a malware family called "StealthWorker." At present, Synology PSIRT has seen no indication of the malware exploiting any software vulnerabilities.
These attacks leverage a number of already infected devices to try and guess common administrative credentials, and if successful, will access the system to install its malicious payload, which may include ransomware. Devices infected may carry out additional attacks on other Linux based devices, including Synology NAS.
Synology PSIRT is working with relevant CERT organizations to find out more about and shut down known C&C (command and control) servers behind the malware. Synology is simultaneously notifying potentially affected customers.
Synology strongly advises all system administrators to examine their systems for weak administrative credentials, to enable auto block and account protection, and set up multi-step authentication where applicable.
System administrators that have found suspicious activity on their devices should reach out to Synology technical support immediately.
Synology at a glance
Staying at the forefront of data management, Synology innovates and adapts to ever-evolving technologies, and continues bringing new possibilities to the table, including but not limited to solutions for data storage and backup, file collaboration, video management, and network infrastructure – all designed with one goal in mind – presenting a centralized platform to simplify IT administration while driving digital transformation for businesses worldwide.