Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unpatched Vulnerability Leads to Remote Factory Resets in Western Digital My Book NAS Devices

Unpatched Vulnerability Leads to Remote Factory Resets in Western Digital My Book NAS Devices

Imagine going to log into one of your devices only to find that it has been completely wiped of any files located on it. Furthermore, imagine trying to log into your online account to manage the settings of said device, only to find that the password you know is correct is being identified as incorrect. This is the experience that many users of Western Digital’s My Book NAS device are currently going through, and it’s suspected that it is all because of an unpatched vulnerability.

The device in question, the Western Digital My Book, is a network-attached storage device that gives users the ability to remotely access files and manage devices. This is notable, as they can do so even if the NAS device is secured with a firewall or router. Bleeping Computer reports that some users are unable to log into their NAS devices, the reason being an “Invalid Password.” Since the devices appeared to be factory reset, some users tried the default login credentials but had no luck accessing their devices or recovering their files.

After some investigation, users discovered that the devices received a remote command to perform factory resets. Bleeping Computer reports that this attack is an odd one in terms of remote command attacks, mostly because the device in question is secured behind a firewall and communicates exclusively through the My Book Live cloud servers to issue remote access. Therefore, it makes sense for some users to assume that Western Digital’s servers were hacked, although they do mention that it is strange that the attack deleted files rather than issuing ransoms, such as with other threats like ransomware which are designed to steal data or encrypt files.

Although Western Digital is investigating the attack, Bleeping Computer does detail a statement issued by the company, stating the following:

  • “If you own a WD My Book Live NAS device, Western Digital strongly recommends that you disconnect the device from the Internet. ‘At this time, we recommend you disconnect your My Book Live and My Book Live Duo from the Internet to protect your data on the device,’ Western Digital said in an advisory.”

These WD My Book Live devices have not received updates since 2015, so it’s unsurprising that a vulnerability surfaced. Still, this situation should be a reminder that it is beneficial to consider upgrading from unsupported devices to those that are actively receiving patches and security updates. That said, failing to administer patches and security updates as they are released is just as bad as using unsupported devices, so the responsibility falls on your shoulders to make sure that you are using technology that isn’t putting your organization at risk.

Need a Hand with Upgrading?

Total Tech Care can help your organization take care of any updates to its technology infrastructure. Especially in today’s age of massive security breaches and considerable cyberthreats, it has never been more important to make sure that your network is protected in every conceivable way. To learn more about what we can do for your business, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Communication Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Managed IT Services Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Passwords Windows 10 Social Media Chrome Virtualization Saving Money Holiday Tech Term Gadgets Automation Microsoft Office Managed Service Managed IT Services Artificial Intelligence Facebook Operating System Cybercrime Computers IT Support Wi-Fi Hacking Health BYOD Internet of Things Mobile Device Management Networking Managed Service Provider Information Technology Covid-19 Information Spam Office 365 Remote Telephone Systems Alert Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth App History Password Data Breach Big Data Money Encryption Human Resources Applications Mobile Computing Remote Monitoring Law Enforcement Application Office Tips Managed IT Training Apps VPN Blockchain Paperless Office Remote Computing How To Government Mobile Office Private Cloud Data Storage Patch Management Windows 7 Word Wireless Bring Your Own Device Data Management Work/Life Balance Gmail Servers Settings Flexibility Two-factor Authentication Data Security Google Drive Marketing WiFi Mouse HaaS IT solutions Entertainment Website Avoiding Downtime Budget Infrastructure Voice over Internet Protocol Vulnerability Scam Data Protection The Internet of Things Lithium-ion battery Cleaning Vendor Managed Services Vendor Management Display End of Support Firewall Education Physical Security Employee/Employer Relationship Safety RMM Virtual Reality HIPAA Sports Apple Redundancy Telephone System Staff Software as a Service Machine Learning Social Keyboard Remote Work Connectivity User Error USB Meetings Conferencing Save Time Risk Management Hacker Data storage Remote Worker Automobile Audit Worker DDoS Cryptocurrency IT Management Managed Services Provider Botnet Computing Infrastructure SharePoint Database IT Plan Going Green Comparison Remote Workers Customer Service CES Unsupported Software Battery Processor Environment Charger Shadow IT Business Technology Fax Server Virus Content Management Legal Compliance Hard Drive Access Control Unified Threat Management OneNote Computer Care Internet Exlporer SaaS Virtual Assistant Computer Accessories Current Events Authentication Telephony PDF Samsung Computing Network Congestion Value Proactive IT eWaste Printer Update Spam Blocking Electronic Medical Records Bluetooth Best Practice Digital Signage YouTube Black Market Google Docs Identity Theft Hiring/Firing Wearable Technology Retail Hard Drives Instant Messaging Document Management Procurement IT Consultant Net Neutrality Robot Excel Workplace Strategy Solid State Drive Wireless Technology Downtime Augmented Reality How to Biometrics Fraud Help Desk Humor Virtual Desktop Business Intelligence Printing Trending Video Conferencing ROI Smart Tech Addiction Amazon Sales Colocation Bitcoin Uninterrupted Power Supply Shortcuts Cryptomining Consultant Recycling Science Point of Sale Public Computer Personal Supply Chain Management Monitor Transportation Wiring Analytics Practices Regulations Cache Amazon Web Services Computer Fan Monitoring Rootkit Batteries Distributed Denial of Service Best Available Safe Mode Customer Relationship Management Criminal Windows 8.1 Digitize Workers Reputation Benefits Windows Server 2008 R2 WIndows 7 Streaming Media GDPR Hosted Computing Analyitcs Wireless Internet Programming Content Online Shopping FENG Customer relationships Tech Support Laptop Manufacturing File Sharing Email Best Practices Techology IBM IT Assessment Specifications Customers Smart Technology Camera Inventory Flash Wire Audiobook Evernote Computer Tips Managed IT Service Antivirus Security Cameras Touchpad Biometric Security Software Tips Windows 8 Virtual CIO Travel Supercomputer OneDrive Millennials Emails Peripheral User Printers IT service PowerPoint Sync Windows Media Player Smart Office Politics Wireless Charging Digital Security Cameras Advertising Using Data 5G Tablet Copiers Workforce Netflix Quick Tip Two Factor Authentication Managing Stress Notifications Virtual Private Network Domains Cables Root Cause Analysis Ergonomics Smartwatch Development Music IaaS OLED Maintenance Cameras HBO Knowledge Telecommuting PCI DSS Relocation Virtual Machine Project Management Nanotechnology Skype Bloatware Employee Cortana Data loss 2FA Fiber Optics Messaging Troubleshooting Cabling Digital Signature Outlook Tablets Video Games Leadership Worker Commute Policy Hypervisor Warranty Start Menu Entrepreneur HVAC Experience Google Apps Screen Mirroring Dark mode Loyalty Trend Micro SMS Books Default App Shortcut Printer Server Analysis Frequently Asked Questions Scalability Cost Management Business Owner Windows 10s Procedure Saving Time Administrator Devices Mobile Google Search Enterprise Content Management Social Networking Cast dark theme Shopping NarrowBand AI Emergency IT Infrastructure MSP Accountants Tip of the week Search webinar Credit Cards Public Cloud FinTech iPhone Employer Employee Relationship Microchip Bing Thought Leadership Professional Services Running Cable Password Management Password Manager Assessment Social Network Investment Windows Server 2008 Memory Multi-Factor Security Twitter Tools Employees Files Employee/Employer Relationships Search Engine ISP NIST Business Mangement Windows 365 Television Chromecast

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code