Feeds

Do you use NAS drives? For work? One just LEAKED secret cash-machine blueprints

So says security biz in 'share everything to the web' flaw alert

Beginner's guide to SSL certificates

Some personal desktop storage devices are leaking top corporate secrets to the internet – in one case, the designs for a hole-in-the-wall cash machine.

That's according to intelligence biz Digital Shadows, which tries to work out how proprietary and personal information accidentally escapes network boundaries.

We're told one particular off-the-shelf network-attached storage (NAS) box grants outside access to its file system without authentication by default.

This "easy share" feature is supposed to make passing information to other users more convenient, although it appears to be a little too convenient: miscreants aware of the "share everything" design flaw are scanning the public internet for vulnerable models, and grabbing sensitive stuff, it's claimed.

It's conceivable that NAS boxes might accidentally face the internet due to lax controls: picture an employee taking his or her work home, and backing up to a personal storage system that can be accessed via their flat's broadband connection.

Off-site contractors could also make the same mistake if their machines are not locked down. There's even the danger of workers using cloud-based storage for back ups, which then leak their contents insecurely. Some desktop drives even mirror their files to the cloud automatically.

Above all, sysadmins should keep an eye out for staff using NAS drives that are reachable from the external web – such the over-sharing product Digital Shadows identified.

"The device publishes an interface on a public IP address, which includes a search function whereby anyone connecting to the device using a web browser is able to search the contents of the device," a spokesman for the East Sussex, UK-based security biz told The Reg yesterday.

"They can then click through to view the files. We have seen discussion of these devices with links to documents shared between individuals exploiting this vulnerability – often exploiting these devices for the purposes of identity theft."

In the interests of responsible disclosure, Digital Shadows did not name the affected NAS box although it has warned the hardware's maker, we're told. "Due to the nature of the vulnerability, we are keen not to go into details, other than to say it is a known vulnerability. We have been in touch with the device manufacturer to ensure that they are aware," the spokesman explained.

"But given the deployed base of these drives, it is very difficult for the manufacturer to deploy fixes: it would require an update to the firmware of the devices, which requires action on the part of the user to update, or to reconfigure the sharing settings."

In the case of the ATM blueprint leak, a contractor using a company laptop backed up his or her work to a consumer-grade storage device, which exposed its contents to the internet – all thanks to its factory settings. In a separate but similar leak, contract bidding documents belonging to a US technology firm ended up online, we're told.

Luckily, this type of cock-up is uncommon, but Digital Shadows is worried there's a growing use of devices that, by default, share their contents without requiring authentication to access the files. One simply has to know a vulnerable box's IP address, for instance.

"Innocent people are backing up often sensitive work information to these devices, and the content is accessible to anyone. Most scarily, no authentication or access control is applied, allowing individuals to retrieve and search the contents of the drive," the spokesman added.

"Users of these drives are unaware that this misconfiguration exists, the first they know is that they have been involved in an incident."

Alastair Paterson, chief exec of Digital Shadows, reminded El Reg that relying on "data loss prevention" software to detect leaks of secrets from corporate networks is borderline useless against vulnerable NAS drives – when the boxes are used beyond the companies' boundaries by off-site contractors, staff working from home, and so on. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.