Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Synology NAS brute-force attack: Employ Synology Best Practice to remediate StealthWorker Botnet attack
  • Cluster
    Install and configure Hyper-V Cluster On Windows Server Virtualization
  • edge7
    How to enable Adblocker on Microsoft Edge Windows
  • How to create edit save exit file
    Mastering Vim in Linux: How to Create, Edit, Save, and Quit Files Linux
  • Featured image 1
    Add and Remove Folders in Favorites in Microsoft Outlook Windows
  • Screenshot 2021 10 07 at 00.00.32
    How to fix this computer is a domain controller: The snap-in cannot be used on a domain controller Windows Server
  • images 5 1
    How to access MySQL Server from command Prompt Oracle/MSSQL/MySQL
  • prometheus feature image
    How to use Prometheus for Monitoring Linux
  • Microsoft Enterprise Root Certification Authority and Forest Domain to Azure migration
    Migrate Microsoft Enterprise Root Certification Authority and Forest Domain to Azure AWS/Azure/OpenShift

Synology NAS brute-force attack: Employ Synology Best Practice to remediate StealthWorker Botnet attack

Posted on 10/08/202120/02/2024 Christian By Christian No Comments on Synology NAS brute-force attack: Employ Synology Best Practice to remediate StealthWorker Botnet attack
Synology NAS

Synology NAS is a multi-functional Network-Attached Storage server, that serves as a file-sharing centre within an organization’s intranet. Moreover, it is specially designed for a variety of purposes, allowing users to perform the following tasks with the web-based Synology DiskStation Manager (DSM). In this guide, we shall discuss “Synology Best Practice to remediate StealthWorker Botnet attack”. Please see What Happens if You Turn Off Your Computer During an Update, and UEFI, TPM, BitLocker FAQs: Disable Sleep Mode.

On the 4th of August 2021, Synology issued a statement about an ongoing brute-force attack on NAS users. Taipei, Taiwan—August 4, 2021—Synology PSIRT (Product Security Incident Response Team) has recently seen and received reports on an increase in brute-force attacks against Synology devices.

Synology’s security researchers believe the botnet is primarily driven by a malware family called “StealthWorker.” At present, Synology PSIRT has seen no indication of the malware exploiting any software vulnerabilities.

These attacks leverage a number of already infected devices to try and guess common administrative credentials, and if successful, will access the system to install its malicious payload, which may include ransomware. Devices infected may carry out additional attacks on other Linux based devices, including Synology NAS.

Synology PSIRT is working with relevant CERT organizations to find out more about and shut down known C&C (command and control) servers behind the malware. Synology is simultaneously notifying potentially affected customers.

They strongly advises all system administrators to examine their systems for weak administrative credentials, to enable auto block and account protection, and set up multi-step authentication where applicable.

System administrators that have found suspicious activity on their devices should reach out to Synology technical support immediately.

Enhancing Synology NAS Security

System administrators should examine their systems for weak administrative credentials, to enable auto block and account protection, and set up multi-step authentication where applicable. System administrators who have found suspicious activity on their devices should reach out to Synology technical support immediately.

How to remediate this issue: The company advised users to go through the following checklist to defend their NAS devices against attacks:

  • Use a complex and strong password, and Apply password strength rules to all users.
  • Create a new account in the administrator group and disable the system default “admin” account.
  • Enable Auto Block in the Control Panel to block IP addresses with too many failed login attempts.
  • To enhance the security of your Synology NAS devices under brute-force attack, it is crucial to take proactive measures. Start by running Security Advisor to ensure there is no weak password in the system.

Synology Best Practice

Here are some other best practices to follow to ensure your Synology DiskStation is adequately protected. For these detailed steps below, please see “DSM Security: How to Protect Synology DS923+ NAS“.

1: Disable the default Admin account.
2: Use two-factor authentification for your accounts
3: Configure your firewall to protect any exposed services best
4: Change default NAS ports. Close any ports on your router that lead to your NAS that you do not need/use. And use HTTPS access for services you have exposed.
5: Close the SSH (22) port if you have it exposed. Configure a VPN to access your NAS from outside your LAN if needed.
6: Stay updated with your apps and DSM.

Lastly, accessing your NAS from the outside is best executed using a VPN.

In case your NAS is reporting attacks from the outside, probably on port 22, the default SSH port). Make sure to close it down, or change its value to a non-default one. Kindly refer to this related troubleshooting guide: Unable to access files in Synology Disk station from Windows 10.

I hope you found this blog post on Synology Best Practice to remediate StealthWorker Botnet attack helpful. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:disk

Post navigation

Previous Post: Unable to import Windows Reg File: The specified file is not a registry script
Next Post: The connection was denied because the user account is not authorized for remote login: How to add and remove Remote Desktop Users

Related Posts

  • Featured image 2
    Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
  • Turn On Or Off Auto Unlock For BitLocker Drive
    How To Turn On Or Off Auto-Unlock For BitLocker Drive In Windows 10/11 Security | Vulnerability Scans and Assessment
  • Veeam Zero Trust Data Resilience
    Demystifying Zero Trust with Veeam: Design your Architecture Backup
  • 5rgh65436
    New Windows 11 encryption features and security enhancements for Hybrid Work Security | Vulnerability Scans and Assessment
  • Windows BootProcess
    Measured Boot, Secure Boot, Trusted Boot, and Early Launch Anti-Malware: How to secure the Windows 10 boot process Security | Vulnerability Scans and Assessment
  • dfg
    802.1x and EAP Authentication Types Security | Vulnerability Scans and Assessment

More Related Articles

Featured image 2 Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
Turn On Or Off Auto Unlock For BitLocker Drive How To Turn On Or Off Auto-Unlock For BitLocker Drive In Windows 10/11 Security | Vulnerability Scans and Assessment
Veeam Zero Trust Data Resilience Demystifying Zero Trust with Veeam: Design your Architecture Backup
5rgh65436 New Windows 11 encryption features and security enhancements for Hybrid Work Security | Vulnerability Scans and Assessment
Windows BootProcess Measured Boot, Secure Boot, Trusted Boot, and Early Launch Anti-Malware: How to secure the Windows 10 boot process Security | Vulnerability Scans and Assessment
dfg 802.1x and EAP Authentication Types Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Cluster
    Install and configure Hyper-V Cluster On Windows Server Virtualization
  • edge7
    How to enable Adblocker on Microsoft Edge Windows
  • How to create edit save exit file
    Mastering Vim in Linux: How to Create, Edit, Save, and Quit Files Linux
  • Featured image 1
    Add and Remove Folders in Favorites in Microsoft Outlook Windows
  • Screenshot 2021 10 07 at 00.00.32
    How to fix this computer is a domain controller: The snap-in cannot be used on a domain controller Windows Server
  • images 5 1
    How to access MySQL Server from command Prompt Oracle/MSSQL/MySQL
  • prometheus feature image
    How to use Prometheus for Monitoring Linux
  • Microsoft Enterprise Root Certification Authority and Forest Domain to Azure migration
    Migrate Microsoft Enterprise Root Certification Authority and Forest Domain to Azure AWS/Azure/OpenShift

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.