NAS keeps getting hit

Author
Discussion

thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
Afternoon all.

So today my Synology NAS keeps getting hit with access attempts which have all been successfully blocked by the NAS itself. 18 attempts since 10am. The NAS is setup with 2FA so it requires a code generated by my phone to access it, even if you guess the long password.

Is there anything I can do to stop the attempts being made and blocking it at router level. I am running a UniFi USG3 system? The attacks are worldwide so whoever it is must be using VPN I presume.

Thanks

TBT.

gavsdavs

1,203 posts

132 months

Tuesday 26th July 2022
quotequote all
It's not personal, bot sweeps go on continuously. Share devices on the internet, expect to be probed continuously.

bmwmike

7,300 posts

114 months

Tuesday 26th July 2022
quotequote all
You have your NAS connected directly to the internet ? Id move it behind a VPN.

As for blocking access attempts you are asking to change the behaviour of something you don't control. You may get some luck changing from default ports.

Personally though I'd go for a proper remote access solution and possibly geo restriction of allowed IPs or static IP origin of practical (unlikely) and definitely you are doing the right thing with MFA.


thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
bmwmike said:
You have your NAS connected directly to the internet ? Id move it behind a VPN.

As for blocking access attempts you are asking to change the behaviour of something you don't control. You may get some luck changing from default ports.

Personally though I'd go for a proper remote access solution and possibly geo restriction of allowed IPs or static IP origin of practical (unlikely) and definitely you are doing the right thing with MFA.
Yes the geo restriction is what I was thinking of but no idea how to implement it.

Thanks chaps.

Captain_Morgan

1,243 posts

65 months

Tuesday 26th July 2022
quotequote all
gavsdavs said:
It's not personal, bot sweeps go on continuously. Share devices on the internet, expect to be probed continuously.
This.


If you’ve not I’d have a read about the qnap security & ransomware issues. It would prevent me from exposing my nas.

If you want to look at more pro fw/routers then have a look at pfsense, opensense & untangle.

thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
gavsdavs said:
It's not personal, bot sweeps go on continuously. Share devices on the internet, expect to be probed continuously.
Yes I understand that however I've only ever had a few since it was setup in 2019. Today 28 and counting.

LordHaveMurci

12,072 posts

175 months

Tuesday 26th July 2022
quotequote all
I had a message from Synology a while ago advising a change from the default ADMIN account to something else.

Not had an attempt to hack it since, was getting loads.

thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
LordHaveMurci said:
I had a message from Synology a while ago advising a change from the default ADMIN account to something else.

Not had an attempt to hack it since, was getting loads.
Yes I did that ages ago when I got a similar email.

And yes the logs state that they are trying to login using "admin"

Edited by thebraketester on Tuesday 26th July 14:24

pete

1,598 posts

290 months

Tuesday 26th July 2022
quotequote all
Strange - I also had a huge volume of attempts to log in to DSM interface of my Synology NAS today, all blocked by the NAS's own firewall. I took it as a sign to restrict all access to LAN users or VPN, and changed the name of the admin account.

outnumbered

4,326 posts

240 months

Tuesday 26th July 2022
quotequote all
If your NAS is directly accessible on the internet, not only are you exposed to bots trying username/passwords, but also to any potential 0-day exploit in any service you are running.

Hence why mine is not accessible!

Zumbruk

7,848 posts

266 months

Tuesday 26th July 2022
quotequote all
Anything connected to the Internet will be subject to continuous attack from all over the world. These attacks are not personal (they do not know or care who you are), directed (they do not know or care you have a NAS, at least not initially) and are originated by bots (likely themselves running on already compromised hosts).

As a result, connecting anything directly to the Internet is foolish. Get your NAS behind a well-supported, patched up-to-date VPN and use MFA to connect to it.

tafkattn

166 posts

27 months

Tuesday 26th July 2022
quotequote all
Are these attempts logged on the Synology? If so, could you point me where those logs are, please?

I recently got a Unifi Dream Router and when I turned IDS/IPS I started seeing A LOT of hits trying to get to the NAS.

thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
tafkattn said:
Are these attempts logged on the Synology? If so, could you point me where those logs are, please?

I recently got a Unifi Dream Router and when I turned IDS/IPS I started seeing A LOT of hits trying to get to the NAS.
"Log Center" from the DSM main menu

tafkattn

166 posts

27 months

Tuesday 26th July 2022
quotequote all
That's the one! Completely blanked on where to see that.

Looks like I'm ok, none of it is reaching the NAS itself. My router / firewall must be blocking it all.

bmwmike

7,300 posts

114 months

Tuesday 26th July 2022
quotequote all
Have to be mad to have a nas directly internet accessible. I've spent considerable time digging through qnap code and trust me when I say it's generally pretty poor quality and no real evidence of security by design or secure coding.


thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
Can someone point me in the direction of how to “put it behind a vpn” please…. Dummy guide… no long words please.

outnumbered

4,326 posts

240 months

Tuesday 26th July 2022
quotequote all
thebraketester said:
Can someone point me in the direction of how to “put it behind a vpn” please…. Dummy guide… no long words please.
The easiest thing would be to turn off whatever method you're currently using for making it internet accessible, this will at least stop the access attempts.

Then if you need to get access to it from the internet yourself, you'll need to set up a VPN. There isn't really a "for dummies" version of this.

GlenMH

5,259 posts

249 months

Tuesday 26th July 2022
quotequote all
Have you got uPnP enabled on the router? If so, turn it off. That was one of the mitigations needed to help prevent the QNAP penetrations.

I can only access my NAS once I have VPN'd back to my home network. My router has a VPN server built in to it. Does yours?

thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
GlenMH said:
Have you got uPnP enabled on the router? If so, turn it off. That was one of the mitigations needed to help prevent the QNAP penetrations.
Will check thanks.

thebraketester

Original Poster:

14,628 posts

144 months

Tuesday 26th July 2022
quotequote all
outnumbered said:
The easiest thing would be to turn off whatever method you're currently using for making it internet accessible, this will at least stop the access attempts.

Then if you need to get access to it from the internet yourself, you'll need to set up a VPN. There isn't really a "for dummies" version of this.
I thought as much :-)