Romaniac
Active Member
- Reaction score
- 52
- Location
- Denver and Seattle
Hello,
I would appreciate some info/help from anyone that knows security and/or synology well. This is a series of events that happened to an acquaintance. I am trying to eliminate variables, patch major security holes. Passwords, simple obvious things, etc. have been changed. Hard drive on laptop has been replaced.
Scenario:
User has a laptop at home. They do small biz Quickbooks, invoicing, email, banking, etc. They keep it to little or no surfing. No crazy sites or anything (user is a lady).
Recently, she was given access to an office Synology NAS via QuickConnect for very seldom access. Standard, restricted non-admin account. No access to DSM panel. She needed to go in and download a file or two here and there. She may have logged on once or twice since access given.
No SSL was set-up at that point. Brute-force auto lockout and IP ban appears to have been in place. SMB1 is disabled, I think, but I'll have to double check. No warnings countered on DSM.
Synology NAS is connected to a Cysco router (older) which is connected to comcast modem/router.
Initially, VPN was set-up for access, but her laptop was apparently having issues with it, even though other PCs on same home network connected OK. Credentials for VPN/access are username and passwords.
Long story short, some of her accounts appear to have been compromised (she was also getting hundreds of 'weird' emails, and phone calls from other countries, perhaps as a distraction...?); as this was happening, apparently there was a log-in to the bank account that wasn't her, and some money was caught moving (luckily, to same bank, so it got frozen). I think her comcast email may also have been compromised, which is one of her main email addresses, though am not sure if that was email used for bank account. But it looks like passwords may have been recorded.
Her synology login did not contain email or similar password used in any other accounts (She didn't create the password).
Would her access to synology have any part in this...? These events happened about a week or so after that access was setup.
I can see how if the same passwords may have been used would lead to an issue, but that wasn't the case.
I will add that I ended up with the old hard drive from laptop. Kaspersky Rescue Disk found a trojan (Win32 . injection . akadd). However, that was about it. I have not yet scanned it with anything else, but is this a factor?
Thanks for reading and helping!
I would appreciate some info/help from anyone that knows security and/or synology well. This is a series of events that happened to an acquaintance. I am trying to eliminate variables, patch major security holes. Passwords, simple obvious things, etc. have been changed. Hard drive on laptop has been replaced.
Scenario:
User has a laptop at home. They do small biz Quickbooks, invoicing, email, banking, etc. They keep it to little or no surfing. No crazy sites or anything (user is a lady).
Recently, she was given access to an office Synology NAS via QuickConnect for very seldom access. Standard, restricted non-admin account. No access to DSM panel. She needed to go in and download a file or two here and there. She may have logged on once or twice since access given.
No SSL was set-up at that point. Brute-force auto lockout and IP ban appears to have been in place. SMB1 is disabled, I think, but I'll have to double check. No warnings countered on DSM.
Synology NAS is connected to a Cysco router (older) which is connected to comcast modem/router.
Initially, VPN was set-up for access, but her laptop was apparently having issues with it, even though other PCs on same home network connected OK. Credentials for VPN/access are username and passwords.
Long story short, some of her accounts appear to have been compromised (she was also getting hundreds of 'weird' emails, and phone calls from other countries, perhaps as a distraction...?); as this was happening, apparently there was a log-in to the bank account that wasn't her, and some money was caught moving (luckily, to same bank, so it got frozen). I think her comcast email may also have been compromised, which is one of her main email addresses, though am not sure if that was email used for bank account. But it looks like passwords may have been recorded.
Her synology login did not contain email or similar password used in any other accounts (She didn't create the password).
Would her access to synology have any part in this...? These events happened about a week or so after that access was setup.
I can see how if the same passwords may have been used would lead to an issue, but that wasn't the case.
I will add that I ended up with the old hard drive from laptop. Kaspersky Rescue Disk found a trojan (Win32 . injection . akadd). However, that was about it. I have not yet scanned it with anything else, but is this a factor?
Thanks for reading and helping!