Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

End of Bibblio RCM includes -->

Attacks Erase Western Digital Network-Attached Storage Drives

The company suspects a remote code execution vulnerability affecting My Book Live and My Book Live Duo devices and recommends that business and individual users turn off the drives to protect their data.

Companies and individuals using older models of Western Digital network-attached storage (NAS) drives suffered what appears to be an attack that possibly exploited a 2018 vulnerability to reset the drives to the factory defaults and deleting data, according to customer comments and company statements. 

Related Content:

New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks

Special Report: Building the SOC of the Future

New From The Edge: An Interesting Approach to Cyber Insurance

Western Digital has confirmed that many customers owning its WD My Book Live and My Book Live Duo storage appliances have suffered compromises through a remote code execution vulnerability. From log files posted to the company's support forum, the attack appeared to happen on June 23 and 24, when drives were reset to factory defaults.

Following the presumed attack, drives are left in a default state, but the default password does not appear to work, according to a user using the nickname "sunpeak," who kicked off a support thread on June 24 that now has more than 650 comments.

"I have a WD mybook live [sic] connected to my home LAN and worked fine for years," the user stated. "I have just found that somehow all the data on it is gone today, while the directories seem there but empty. Previously the 2T volume was almost full but now it shows full capacity."

Many of the responses were other users confirming that their drives had also been deleted. 

Western Digital stated that the company is currently investigating but has few details as of June 28. The factory reset "appears to erase all data on the device," and the company recommended that users disconnect their My Book Live devices from the Internet. 

"We are reviewing log files which we have received from affected customers to further characterize the attack and the mechanism of access," the company stated in its advisory. "The log files we have reviewed show that the attackers directly connected to the affected My Book Live devices from a variety of IP addresses in different countries."

Attacks that target hard drives to delete data are nothing new. In 2012, a cyberattack resulted in data being deleted on nearly 35,000 hard drives at Saudi Arabia's state-owned oil-and-gas firm Saudi Aramco. Thought to be the work of an Iranian group calling itself the Cutting Sword of Justice, the data-deleting tool — known as a wiper — often made the hard drives unrecoverable. 

Such attacks continue to go on. Just last month, a sophisticated group dubbed Agrius — also thought to be linked to Iran — deployed ransomware and wipers against Israel

The company introduced the drives to the market in 2010 and issued the last firmware update for the devices in 2015. In 2018, an analysis of four different NAS drives — including the Western Digital My Book Live, discovered vulnerabilities in every single one. Exploiting the vulnerability (CVE-2018-18472) consisted of sending a simple URL that added a file to the Web root of the device, raising the possibility that this vulnerability is the one being exploited by attackers. 

In a statement provided to the researchers at the time, Western Digital appears to have claimed the products had reached the end of their support life cycle and would not be updated. 

"These products have been discontinued since 2014 and are no longer covered under our device software support lifecycle," the company stated, according to the vulnerability report. "We encourage users who wish to continue operating these legacy products to configure their firewall to prevent remote access to these devices, and to take measures to ensure that only trusted devices on the local network have access to the device."

Currently, it is not clear whether every affected user had the device connected directly to the Internet or configured in a way to be accessible from the Internet. However, Western Digital appears to believe that such is the case. 

Since the attacker connected from a variety of Internet addresses, "this indicates that the affected devices were directly accessible from the Internet, either through direct connection or through port forwarding that was enabled either manually or automatically via UPnP," the company said.

In addition, the company has not found evidence of any other mechanism that could be the cause of the data deletion. 

"Our investigation of this incident has not uncovered any evidence that Western Digital cloud services, firmware update servers, or customer credentials were compromised," the company said in its statement. "As the My Book Live devices can be directly exposed to the internet through port forwarding, the attackers may be able to discover vulnerable devices through port scanning."

So far, the data loss appears to be caused by the deletion of the partition table, raising the possibility that lost files may be recovered. Already, certain photo recovery tools and other system utilities have had some luck in recovering the files, according to users publishing to the support forum.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file