NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
IanWilson
Jan 10, 2015Aspirant
Can a 314 ReadyNAS get hacked?
I am really worried : A few days ago I had to have tech support to me brand new 314 readyNAS. I was asked for my password by the online tech and left it in tech support mode for 12 hours until the ...
mdgm-ntgr
Jan 12, 2015NETGEAR Employee Retired
The Toggle SSH add-on for legacy NAS units has a password specific to the system (unless Enable Root SSH has been installed previously). The hacker would need some knowledge of the system they are targeting to hack into it, so it is unlikely. The Toggle SSH add-on is not what was used here.
These days tech support accesses systems without requiring port forwarding. A secure connection is made back to a NETGEAR server which only NETGEAR support and ReadyNAS Product engineering can access.
Root SSH with a strong password would provide some protection but wouldn't guarantee a system wouldn't be hacked. Do remember that when an OS Re-install is done the password is reset to the default one which would leave you exposed if port forwarding is active till you change the password again.
Usually if a NAS gets hacked it is because SSH is forwarded and the default password is set. This is true for every NAS vendor which has SSH as a feature.
The NAS runs Debian with some customisations. There are different kinds of malware out there including some that can lead to data loss.
It is important that you backup your important data regularly and that you don't forward ports to your NAS that you don't need to.
To check the integrity of your system you'd look in e.g. processes.log for processes that shouldn't be there, systemd-journal.log for suspicious entries, the bash_history.log for suspicious entries and in other logs.
These days tech support accesses systems without requiring port forwarding. A secure connection is made back to a NETGEAR server which only NETGEAR support and ReadyNAS Product engineering can access.
Root SSH with a strong password would provide some protection but wouldn't guarantee a system wouldn't be hacked. Do remember that when an OS Re-install is done the password is reset to the default one which would leave you exposed if port forwarding is active till you change the password again.
Usually if a NAS gets hacked it is because SSH is forwarded and the default password is set. This is true for every NAS vendor which has SSH as a feature.
The NAS runs Debian with some customisations. There are different kinds of malware out there including some that can lead to data loss.
It is important that you backup your important data regularly and that you don't forward ports to your NAS that you don't need to.
To check the integrity of your system you'd look in e.g. processes.log for processes that shouldn't be there, systemd-journal.log for suspicious entries, the bash_history.log for suspicious entries and in other logs.
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!