NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
WildfireTech
Apr 29, 2018Guide
READYCLOUD Appears to have been hacked
I got my weekly security bulletin from my NetGear R6400 this morning and it is full of pages and pages of entries like this:
[LAN access from remote] from XXX.XXX.XXX.XXX:YYYYY to XXX.XXX.XXX.X...
- Apr 29, 2018
Hi WildfireTech
Can you please send in the logs and report from your router also if you have screenshots that would be also helpful. Sending logs
Regards
StephenB
Apr 30, 2018Guru - Experienced User
You should certainly change the admin password. Did you have a strong password on your NAS admin account before?
Also look at the http configuration on the NAS (system->settings->services) and see if "http admin" is checked.
And check with your router manufacturer (or ISP if you have an ISP-supplied router) and make sure that if your router firmware is up to date. Check your router to make sure that remote administration is disabled, and change the router admin password. There's no need to change the wifi network name or passphrase, though it does no harm.
If your router gives you traffic reports of internet usage, keep an eye on those reports (looking for unusual amount of internet traffic). If you do see such traffic (or experience very slow internet access from another device), then disconnect the ReadyNAS ethernet cable, and see if the issues disappear. Of course check the router logs too.
Netgear should be able to see traces in the logs (particularly packages installed on the NAS) if you were hacked.
WildfireTech wrote:
2) Have UPnP configured on my router or the NAS
Do you mean "do not have"?
WildfireTech wrote:
Therefore, the only reason I can come up ...
What I take from this is that you have no idea if there was a successful hack or what the attack vector actually was. There is evidence of a successful connection via port 80, but no evidence either way that a hacker was able to log into the NAS web ui (or what mechanism caused port 80 traffic to be forwarded by your router to the NAS).
You're just guessing/speculating that the attack vector was ReadyCloud. I'm not suggesting that's impossible (though as I said, ReadyCloud doesn't use port 80). The problem with locking on to an unconfirmed theory is that you stop looking for more possibilities (malware somehow getting on a PC, an attack through an app on a mobile device that is connected both to a cellular network and your network, your router being hacked instead of the NAS ...). FWIW, I agree with schumaku that your theory isn't likely to be correct.
If the NAS has been seriously hacked, then changing its private IP address will make absolutely no difference. There will be software on the NAS that connects outbound through your firewall, and that normally won't show up at all in your router logs. Even if you are right about the attack vector being ReadyCloud, leaving ReadyCloud now isn't an effective response for the same reason. Once the hacker is in, s/he will install tools that give them ongoing access.
WildfireTech
Apr 30, 2018Guide
Thanks to everyone who has helped or chimed in. I'm dropping this issue for now as the activity seems to have ceased now that the NAS is no longer connected to ReadyCloud and I have changed the IP address. I'm also reaching out to my ISP to see if there is any maintenance needed on the router; please wish me luck in dealing with them.
I'll keep monitoring it for a while to see if anything weird starts happening.
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!