Successful logins by users that dont exist

Don't miss a thing. Post your questions and discussion about other uncategorized NAS features here.
Skwor
Know my way around
Posts: 247
Joined: Thu Feb 27, 2020 1:38 am

Re: Successful logins by users that dont exist

Post by Skwor »

buiz_ wrote: Fri Apr 30, 2021 9:10 pm Those threads and the other posts in this thread deal with the many vulnerabilities of QTS. I get that. I got that before I started this thread. I know what I'm dealing with and I take the risks I want to take and that I find acceptable in relation to the importance of what I have on my NAS. I'm not a n00b throwing my vital data in the hands of hackers without caution or backup.

So if we can put that aside along with the dripping sarcasm then what I'm still looking for is an actual answer to my actual question. How can users that don't exist on my NAS show up as having successfully logged on my NAS? I showed a screenshot that also shows that those users did not actually seem to use/access any resources on my NAS. Compromized or not, I would assume that for a user called "Alex" to successfully log on to my NAS, that user should actually be existing on my NAS, yet that seems to not be the case. Anyone has some insights to this? And to be clear, I'm now looking for something more insightful than "your NAS is compromised, wipe it".
Unless your NAS has a new virtual network that accesses the multiverse those log-ins ARE from people/bots/apps at those IPs that literally logged into your device, whether directly or through a vulnerability it does not matter, they did, your NAS was exposed and was not properly secured at that time. If you can not get past that fact NO ONE here can help you further.

I repeat
There is a principle which is a bar against all information, which is proof against all argument, and which cannot fail to keep man in everlasting ignorance. That principle is condemnation before investigation.
—Edmund Spencer
Last edited by Skwor on Fri Apr 30, 2021 10:51 pm, edited 1 time in total.
NAS:
TS-453Be
2-4 Gig QNAP ram sticks
1x12 TB Seagate Iron Wolf and 3x12 TB Seagate Exos
Mainly used as a Plex Server and Photo manager (QuMagie is actually pretty good)

WD 12 TB Elements for each hard drive - External HD BU to the NAS movie database and Photos
syncthing
Know my way around
Posts: 136
Joined: Mon Aug 13, 2018 4:58 pm

Re: Successful logins by users that dont exist

Post by syncthing »

OneCD wrote: Thu Apr 29, 2021 5:16 am This post should be linked-to from any online thesauri trying to explain what "dripping-with-sarcasm" looks like. :DD
+1 :lol: :lol:
Mousetick
Experience counts
Posts: 1081
Joined: Thu Aug 24, 2017 10:28 pm

Re: Successful logins by users that dont exist

Post by Mousetick »

buiz_ wrote: Fri Apr 30, 2021 9:10 pm Anyone has some insights to this?
No, no one knows, apparently. As you have surmised, unknown inexistent users logging into your NAS is not normal and something is very very wrong. So it would be in your best interest to request assistance from QNAP. Only they can figure out what's going on.
buiz_
Starting out
Posts: 44
Joined: Mon Aug 17, 2015 1:26 am

Re: Successful logins by users that dont exist

Post by buiz_ »

Mousetick wrote: Sat May 01, 2021 4:19 am
buiz_ wrote: Fri Apr 30, 2021 9:10 pm Anyone has some insights to this?
No, no one knows, apparently. As you have surmised, unknown inexistent users logging into your NAS is not normal and something is very very wrong. So it would be in your best interest to request assistance from QNAP. Only they can figure out what's going on.
Thank you for addressing my question! I'll dig further and report back here in case I find something that may be useful to others.
Skwor
Know my way around
Posts: 247
Joined: Thu Feb 27, 2020 1:38 am

Re: Successful logins by users that dont exist

Post by Skwor »

buiz_ wrote: Sat May 01, 2021 2:55 pm
Mousetick wrote: Sat May 01, 2021 4:19 am
buiz_ wrote: Fri Apr 30, 2021 9:10 pm Anyone has some insights to this?
No, no one knows, apparently. As you have surmised, unknown inexistent users logging into your NAS is not normal and something is very very wrong. So it would be in your best interest to request assistance from QNAP. Only they can figure out what's going on.
Thank you for addressing my question! I'll dig further and report back here in case I find something that may be useful to others.
:shock: :roll:
NAS:
TS-453Be
2-4 Gig QNAP ram sticks
1x12 TB Seagate Iron Wolf and 3x12 TB Seagate Exos
Mainly used as a Plex Server and Photo manager (QuMagie is actually pretty good)

WD 12 TB Elements for each hard drive - External HD BU to the NAS movie database and Photos
User avatar
jaysona
Been there, done that
Posts: 856
Joined: Tue Dec 02, 2008 11:26 am
Location: Somewhere in the Great White North

Re: Successful logins by users that dont exist

Post by jaysona »

buiz_ wrote: Fri Apr 30, 2021 9:10 pm Those threads and the other posts in this thread deal with the many vulnerabilities of QTS. I get that. I got that before I started this thread. I know what I'm dealing with and I take the risks I want to take and that I find acceptable in relation to the importance of what I have on my NAS. I'm not a n00b throwing my vital data in the hands of hackers without caution or backup.
...and yet, you willingly expose a NAS that runs an OS riddled with more holes in it than a slice of Swiss Cheese has?

QTS has multiple 0-day vulnerabilities in it and there are ways to access the the NAS without needing to login.
So if we can put that aside along with the dripping sarcasm then what I'm still looking for is an actual answer to my actual question. How can users that don't exist on my NAS show up as having successfully logged on my NAS? I showed a screenshot that also shows that those users did not actually seem to use/access any resources on my NAS. Compromized or not, I would assume that for a user called "Alex" to successfully log on to my NAS, that user should actually be existing on my NAS, yet that seems to not be the case. Anyone has some insights to this? And to be clear, I'm now looking for something more insightful than "your NAS is compromised, wipe it".
Possibly, the user accounts do exist somewhere in the innards of the severely butchered and crippled Linux distro that QNAP has made, or new vulnerabilities have been exploited, maybe something else? Perhaps you should ask QNAP directly by opening a ticket.
I'm now looking for something more insightful than "your NAS is compromised, wipe it".
Your NAS has most likely been compromised, the only reaming prudent action to take is to wipe and reinitialize, I'd even go so far as to reinitialize the DOM as well using the firmware recovery procedure - as that's where I would focus my energies if I were an active malware developer. Just sayin' ;)
RAID is not a Back-up!

H/W: QNAP TVS-872x (i7-8700. 64GB) (Plex server & encoding host) / TVS-EC1080 (32Gig ECC) - VM host & seedbox
H/W: Asustor AS6706T (32GB) / Asustor AS7010T (16GB) (media storage)
H/W: TS-219 Pro / TS-509 Pro
O/S: Slackware 14.2 / MS Windows 7-64 (x5)
Router1: Asus RT-AX86U - Asuswrt-Merlin - 3004.388.6_2
Router2: Asus RT-AC66U - Asuswrt-Merlin - 386.12_6
Router3: Linksys WRT1900AC - DD-WRT v3.0-r46816 std
Router4: Asus RT-AC66U - FreshTomato v2021.10.15

Misc: Popcorn Hour A-110/WN-100, Pinnacle Show Center 250HD, Roku SoundBridge Radio (all retired)
Ditched QNAP units: TS-269 Pro / TS-253 Pro (8GB) / TS-509 Pro / TS-569 Pro / TS-853 Pro (8GB)
TS-670 Pro x2 (i7-3770s 16GB) / TS-870 Pro (i7-3770 16GB) / TVS-871 (i7-4790s 16GB)
Post Reply

Return to “Miscellaneous”