I have one question:
as it is a coordinated action recently why nobody asks what is a cause of this? In particular, how attackers knows IP addresses of devices very often behind firewalls?
And if the answer is not the fact that DDNS of QNAP has been compromised and attackers knows DDNS addresses of al machines?
Disabling the deault admin
- dolbyman
- Guru
- Posts: 35274
- Joined: Sat Feb 12, 2011 2:11 am
- Location: Vancouver BC , Canada
Re: Disabling the deault admin
Sure .. instead of securing your device properly you can smash it with a hammer or drop it from a building .. all up to you
By forwarding ports to the QNAP, your NAS is NOT behind a firewall/NAT anymore you have EXPOSED it... all IP ranges are scanned up and down almost constantly.. with these many carelessly exposed devices and the easy to extort basically untraceable ransom via Cryptocurrency .. a valuable target
Unlikely,as said above.. just the regular port scans or even public databases like shodan
https://www.shodan.io/search?query=qnap