NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
WildfireTech
Apr 29, 2018Guide
READYCLOUD Appears to have been hacked
I got my weekly security bulletin from my NetGear R6400 this morning and it is full of pages and pages of entries like this:
[LAN access from remote] from XXX.XXX.XXX.XXX:YYYYY to XXX.XXX.XXX.X...
- Apr 29, 2018
Hi WildfireTech
Can you please send in the logs and report from your router also if you have screenshots that would be also helpful. Sending logs
Regards
WildfireTech
Apr 29, 2018Guide
I have no port forwarding or port triggering configured. UPnP is disabled on my router and the NAS (no idea how to manage my ISP's Cable Modem).
Thanks
StephenB
Apr 30, 2018Guru
WildfireTech wrote:
I have no port forwarding or port triggering configured. UPnP is disabled on my router and the NAS (no idea how to manage my ISP's Cable Modem).
Port 80 is normal HTTP - it isn't the port that ReadyCloud or ReadyRemote use.
Is the second IP address that you redacted the IP address of the router? Or is it the IP address of the ReadyNAS?
Note that private IP addresses aren't routable, so it is safe to post addresses in the ranges 192.168.0.0.-192.168.255.255, 10.0.0.0-10.255.255.255 and 172.16.0.0 – 172.31.255.255 ( https://en.wikipedia.org/wiki/Private_network ).
- WildfireTechApr 30, 2018Guide
The reason I beleive that this has to do with ReadyCloud is that I:
1) Do not have Port Forwarding or Port Triggering of any form configured
2) Have UPnP configured on my router or the NAS
3) Have no DDNS entities set up that would direct users to my ISP address looking for anything
Therefore, the only reason I can come up with as to WHY anyone would know anythig about "me" on the internet is that they got into ReadyCloud which had the destination of the NAS.
I have de-coupled the NAS from ReadyCloud and changed the IP address on my private network.
- schumakuApr 30, 2018GuruThat's unrelated to you. ReadyCloud does unlikely communicate by whatever protocol by establishing (TCP is a guess only, these routers s**k) session on port 80 from the Internet to the NAS.
The ReadyCloud network connection is established also kind of a specialised VPN from the ReadyNAS to the ReadyCloud cloud infrastructure. In this VPN network (still using an otherwise assigned IPv4 address space) does the ReadyCloud communication take place.
The question is how it was possible to establish such a communication - all one does need is an IP address (whatever DDNS or DNS entries are not relevant, communication happens always on numeric IP addresses) - from the wild Internet to your NAS on the LAN. That's why I've raised the flag claiming it's unlikely ReadyCloud. - StephenBApr 30, 2018Guru
You should certainly change the admin password. Did you have a strong password on your NAS admin account before?
Also look at the http configuration on the NAS (system->settings->services) and see if "http admin" is checked.
And check with your router manufacturer (or ISP if you have an ISP-supplied router) and make sure that if your router firmware is up to date. Check your router to make sure that remote administration is disabled, and change the router admin password. There's no need to change the wifi network name or passphrase, though it does no harm.
If your router gives you traffic reports of internet usage, keep an eye on those reports (looking for unusual amount of internet traffic). If you do see such traffic (or experience very slow internet access from another device), then disconnect the ReadyNAS ethernet cable, and see if the issues disappear. Of course check the router logs too.
Netgear should be able to see traces in the logs (particularly packages installed on the NAS) if you were hacked.
WildfireTech wrote:
2) Have UPnP configured on my router or the NAS
Do you mean "do not have"?
WildfireTech wrote:
Therefore, the only reason I can come up ...
What I take from this is that you have no idea if there was a successful hack or what the attack vector actually was. There is evidence of a successful connection via port 80, but no evidence either way that a hacker was able to log into the NAS web ui (or what mechanism caused port 80 traffic to be forwarded by your router to the NAS).
You're just guessing/speculating that the attack vector was ReadyCloud. I'm not suggesting that's impossible (though as I said, ReadyCloud doesn't use port 80). The problem with locking on to an unconfirmed theory is that you stop looking for more possibilities (malware somehow getting on a PC, an attack through an app on a mobile device that is connected both to a cellular network and your network, your router being hacked instead of the NAS ...). FWIW, I agree with schumaku that your theory isn't likely to be correct.
If the NAS has been seriously hacked, then changing its private IP address will make absolutely no difference. There will be software on the NAS that connects outbound through your firewall, and that normally won't show up at all in your router logs. Even if you are right about the attack vector being ReadyCloud, leaving ReadyCloud now isn't an effective response for the same reason. Once the hacker is in, s/he will install tools that give them ongoing access.
- WildfireTechApr 30, 2018Guide
Thanks to everyone who has helped or chimed in. I'm dropping this issue for now as the activity seems to have ceased now that the NAS is no longer connected to ReadyCloud and I have changed the IP address. I'm also reaching out to my ISP to see if there is any maintenance needed on the router; please wish me luck in dealing with them.
I'll keep monitoring it for a while to see if anything weird starts happening.
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!