Feeds

Do you use NAS drives? For work? One just LEAKED secret cash-machine blueprints

So says security biz in 'share everything to the web' flaw alert

Beginner's guide to SSL certificates

Some personal desktop storage devices are leaking top corporate secrets to the internet – in one case, the designs for a hole-in-the-wall cash machine.

That's according to intelligence biz Digital Shadows, which tries to work out how proprietary and personal information accidentally escapes network boundaries.

We're told one particular off-the-shelf network-attached storage (NAS) box grants outside access to its file system without authentication by default.

This "easy share" feature is supposed to make passing information to other users more convenient, although it appears to be a little too convenient: miscreants aware of the "share everything" design flaw are scanning the public internet for vulnerable models, and grabbing sensitive stuff, it's claimed.

It's conceivable that NAS boxes might accidentally face the internet due to lax controls: picture an employee taking his or her work home, and backing up to a personal storage system that can be accessed via their flat's broadband connection.

Off-site contractors could also make the same mistake if their machines are not locked down. There's even the danger of workers using cloud-based storage for back ups, which then leak their contents insecurely. Some desktop drives even mirror their files to the cloud automatically.

Above all, sysadmins should keep an eye out for staff using NAS drives that are reachable from the external web – such the over-sharing product Digital Shadows identified.

"The device publishes an interface on a public IP address, which includes a search function whereby anyone connecting to the device using a web browser is able to search the contents of the device," a spokesman for the East Sussex, UK-based security biz told The Reg yesterday.

"They can then click through to view the files. We have seen discussion of these devices with links to documents shared between individuals exploiting this vulnerability – often exploiting these devices for the purposes of identity theft."

In the interests of responsible disclosure, Digital Shadows did not name the affected NAS box although it has warned the hardware's maker, we're told. "Due to the nature of the vulnerability, we are keen not to go into details, other than to say it is a known vulnerability. We have been in touch with the device manufacturer to ensure that they are aware," the spokesman explained.

"But given the deployed base of these drives, it is very difficult for the manufacturer to deploy fixes: it would require an update to the firmware of the devices, which requires action on the part of the user to update, or to reconfigure the sharing settings."

In the case of the ATM blueprint leak, a contractor using a company laptop backed up his or her work to a consumer-grade storage device, which exposed its contents to the internet – all thanks to its factory settings. In a separate but similar leak, contract bidding documents belonging to a US technology firm ended up online, we're told.

Luckily, this type of cock-up is uncommon, but Digital Shadows is worried there's a growing use of devices that, by default, share their contents without requiring authentication to access the files. One simply has to know a vulnerable box's IP address, for instance.

"Innocent people are backing up often sensitive work information to these devices, and the content is accessible to anyone. Most scarily, no authentication or access control is applied, allowing individuals to retrieve and search the contents of the drive," the spokesman added.

"Users of these drives are unaware that this misconfiguration exists, the first they know is that they have been involved in an incident."

Alastair Paterson, chief exec of Digital Shadows, reminded El Reg that relying on "data loss prevention" software to detect leaks of secrets from corporate networks is borderline useless against vulnerable NAS drives – when the boxes are used beyond the companies' boundaries by off-site contractors, staff working from home, and so on. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.