Hackers exploited two flaws in event that remotely wiped Western Digital devices

After Western Digital My Book Live owners around the world reported that their devices were wiped remotely overnight, the company issued a statement blaming a specific vulnerability (CVE-2021-35941) for the event. An external investigation conducted by Ars Technica and Derek Abdine (CTO at security firm Censys) has revealed, however, that the bad actors exploited another undocumented vulnerability in a file aptly named system_factory_restore. 

Usually, users would have to type in their passwords to be able to perform factory resets on their devices. Indeed, the script in the file contains lines to password protect the reset command. However, someone in Western Digital “commented out” or, in non-technical parlance, canceled out the command by adding the double / character at the beginning of each line. HD Moore, a security expert, explained to Ars that this doesn’t make things look good for the company. “It’s like they intentionally enabled the bypass,” Moore said, since the attackers would have to know the format of the script that triggers the reset to exploit the vulnerability.

Devices that were hacked using the CVE-2021-35941 vulnerability were infected with malware, and in at least one case, it was malware that makes a device part of a botnet. Since turning My Book Live storage devices into botnets and then wiping them clean makes no sense, Abdine’s theory is that one hacker exploited the CVE-2021-35941 vulnerability. After that, a second (possibly rival) hacker exploited the previously unknown reset vulnerability to gain control of the devices, which were then made part of a botnet, or to undo the first one’s work. 

Either way, this event just goes to show that the My Book Live storage devices aren’t as secure as anybody would like at this point. Those who still own it should heed Western Digital’s advice and disconnect it from the internet as soon as possible. 

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.