NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
SuperFlyBoy1
May 30, 2013Aspirant
ReadyNAS Vault using rsync??
I was just checking one of the shares (our main one) on the NV+ we have in the office, and apparently there was a rsync enabled to 64.64.131.102, which I do not think was set by me. (The only admin in the company)
The ReadyNAS is also secured with a password, and our network is protected by a Sonicwall TZ 210. (which probably allows the rsync protocol to get through, outbound)
Could this be a some sort of hack to have all our information backed up somewhere else where a competitor or any other individual/organization has access to our files?
No password was set either.
It was just detected as users were complaining about permissions on files and folders on the share, which caused me to go through all the settings. I was quite surprised to see rsync enabled, actually.
We just updated the firmware to the latest one, which gave us the ReadyNAS Vault option - was this part of the upgrade??
Thanks for any info...
The ReadyNAS is also secured with a password, and our network is protected by a Sonicwall TZ 210. (which probably allows the rsync protocol to get through, outbound)
Could this be a some sort of hack to have all our information backed up somewhere else where a competitor or any other individual/organization has access to our files?
No password was set either.
It was just detected as users were complaining about permissions on files and folders on the share, which caused me to go through all the settings. I was quite surprised to see rsync enabled, actually.
We just updated the firmware to the latest one, which gave us the ReadyNAS Vault option - was this part of the upgrade??
Thanks for any info...
15 Replies
Replies have been turned off for this discussion
- StephenBGuru - Experienced UserI'm not a vault user, but according to this link the data is in the amazon S3 cloud: http://readynasvault.zendesk.com/entrie ... ly-stored- I suppose they could also use other storage suppliers.
64.64.131.102 is owned by IIC internet (also known as onlinestoragesolution.com), which offers its own on-line storage solution. Does that ring a bell? - SuperFlyBoy1Aspirant
Yes, I did lookup the IP, but IIC Internet is unknown to us.StephenB wrote: I'm not a vault user, but according to this link the data is in the amazon S3 cloud: http://readynasvault.zendesk.com/entrie ... ly-stored- I suppose they could also use other storage suppliers.
64.64.131.102 is owned by IIC internet (also known as onlinestoragesolution.com), which offers its own on-line storage solution. Does that ring a bell?
Interesting that somehow this was done when nobody else has access to the ReadyNAS. - SuperFlyBoy1AspirantI do note that under System -> Config Backup -> Backup, nothing has been selected there.
However, rsync probably backs up independently of these selections, correct?
Edited to Add: Noted that these are only system configs backed up. - StephenBGuru - Experienced UserI was assuming that the rsync to 64.64.131.102 was a frontview backup job. Is it something else? For instance something you are seeing running via ssh?
Maybe this is obvious, but I think I'd
(a) turn off the scheduling of the backup job for now, and disable rsync on the share if you aren't using that.
(b) change the admin password for the NAS (and the root password if you use SSH).
(c) check the logs and see if the backups are actually working
(d) contact vault support directly
(e) contact onlinestoragesolution.com support. If you didn't authorize the backups, then someone is illegally using them to steal your data. If you have the login user name and destination path, it should be easy for them to track down who it is, and they should be able to see the data transfer from their own logs.
If the NAS is compromised/hacked then you should probably rebuild it (starting from a factory reset, and restoring data from backups). Re-configure the NAS manually, as you don't want to accidentally grab something in the OS partition that could reopen the vulnerability. - SuperFlyBoy1AspirantNo idea what the rsync was, seriously.
Thanks for the points - done:
a) Done.
b) Done. (not sure what is the root password)
c) logs are not showing any rsync entries.
d) Have to do this soon.
e) There were no usernames or passwords - could rsync still be used, if the IP was allocated to someone?
Thanks again! - chirpaLuminaryDid you see the rsync traffic via the SonicWall? Sounds like you didn't see it directly via a process on the ReadyNAS itself.
If you had root SSH, you could run 'ps -ef --forest' which should show the rsync process, and its parent process that spawned it.
eg.root 2028 1 0 May29 ? 00:00:02 /usr/sbin/netatalk
root 2033 2028 0 May29 ? 00:00:01 \_ /usr/sbin/afpd -d -F /etc/netatalk/afp.conf
root 2034 2028 0 May29 ? 00:00:00 \_ /usr/sbin/cnid_metad -d -F /etc/netatalk/afp.conf
Not sure what Vault uses for its back end. I know Replicate uses rsync, but you have an NV+ v1(?) which wouldn't have Replicate on it. And no backup jobs to other NAS via FrontView Backup Manager at all? - StephenBGuru - Experienced UserIf you never enabled ssh, then the root password is the same as the admin password - and you changed them both.
If someone could see the dataflow on the path to the destination, then they could theoretically use rsync (spoofing the IP address). Though I think it is more likely that rsync terminated on the IIC Internet server.
Are you certain it was on the NAS, and not someone else in the company using rsync for something else? - SuperFlyBoy1Aspirant
StephenB wrote: If you never enabled ssh, then the root password is the same as the admin password - and you changed them both.
If someone could see the dataflow on the path to the destination, then they could theoretically use rsync (spoofing the IP address). Though I think it is more likely that rsync terminated on the IIC Internet server.
I was able to change the admin password early in the morning remotely, and now checking for the NV+ logging into the network via VPN (only 1 of 2 certified users to the network) - not able to access the unit.
No pingbacks received from the IP either.
Also, if I ping/tracert this IP, it comes back to: server.iicinternet.com [64.64.131.102], with a last hop in Dallas: GLOBAL-INTE.edge9.Dallas1.Level3.net [4.30.68.182]
No idea if the hacker just shut down the unit now that I attempted to thwart his stealing our info.
Will post once I get into the office.
(I also tried calling the contact number for iicinternet, was kept on hold for a *long* time, using both their normal and 800 numbers - no response. Shell company of some sort??)StephenB wrote: Are you certain it was on the NAS, and not someone else in the company using rsync for something else?
100% sure. - SuperFlyBoy1Aspirant
SuperFlyBoy wrote: I was able to change the admin password early in the morning remotely, and now checking for the NV+ logging into the network via VPN (only 1 of 2 certified users to the network) - not able to access the unit.
No pingbacks received from the IP either.
No idea if the hacker just shut down the unit now that I attempted to thwart his stealing our info.
We lost power overnight and the UPS unit apparently needs the battery replaced, so it shut down unexpectedly.
Doing a reboot with check-scan/quotas. - fish1AspirantJust want to confirm that the ReadyNAS Vault (RNV) does not utilize rsync. I think it is safe to say that RNV is unrelated to the issue.
That said, if you have any other questions or concerns about RNV (related to this issue or otherwise), please direct message or shoot us a note at support@vault.readynas.com.
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!