Criminals Leverage SambaCry Vulnerability to Gain Backdoor Access to NAS Devices – The Merkle

Computers are no longer the only devices susceptible to attacks. We have seen various types of malware target Internet of Things devices in recent months. It now appears there is a new SambaCry vulnerability, which can exploit NAS devices. These devices can easily be backdoored by this exploit.

NAS Devices are at Risk of Getting Hacked

Many people have a NAS device somewhere at home. These Network Attached Storage devices are often used to store either videos or photos, although some people also use them to keep specific documents safe. Any type of hardware running older versions of the Samba file-sharing service is now susceptible to the infamous SambaCry vulnerability. Leveraging this exploit allows criminals to install a backdoor Trojan on these Linux devices.

Most people who own a NAS are well aware of how these devices often come equipped with the Samba server software. This is done to provide a convenient solution for file-sharing interoperability. In fact, most people who use a NAS to access photos and videos from their Network Attached Storage device will do so using the Samba protocol. This protocol is especially useful when using devices running different operating systems to access information stored on the NAS itself.

This new exploit is called SHELLBIND. It leverages the SambaCry vulnerability, which has been public knowledge since late May 2017. It appears to affect all versions of the Samba software released since 2010. Anyone who runs Samba version 3.5.0 or higher can be affected by this exploit. The Samba team is well aware of this problem and a security patch has been issued to address the vulnerability.

Some people may be wondering what criminals hope to gain from leveraging this exploit. It can be used to install cryptocurrency mining software, such as the EternalMiner tool we have discussed earlier. Additionally, with a backdoor to the NAS device opened on port 61422, there is no limit to the damage criminals can do. After all, criminals are able to open a remote shell on the infected device, which gives them full administrator rights.

The backdoor Trojan is designed to modify existing local firewall settings and open a TCP connection on port 61422. Once SHELLBIND successfully infiltrates a device of its choice, it will send a notification to a centralized server, which can prove to be a fatal point of weakness in the future. This allows criminals to remotely connect to the NAS and have their way with the system. Installing cryptocurrency mining software is just one of the possible threats.

Security researchers are mainly concerned with how SHELLBIND can be used to steal sensitive information. Even though it mainly targets NAS devices, the malware can be deployed against other IoT devices as well. Although we may never know the full scope of these attacks and what criminals may be after, data theft is still a very likely outcome. Any information obtained from NAS or IoT devices can easily be sold on the darknet, as there are always interested parties looking to buy personal information.

Source link

Must Read