The world has gone very digital and we now store a massive amount of data on our phones, our laptops and other devices that are prone to being lost, dropped or drowned.
To combat this fear of data loss, a growing number of people are buying home NAS (network attached storage) solutions. These little boxes sit in the corner and usually have software that you can install on your computer to perform automatic backups, thus mitigating the need to think about doing file backups.
Convenience over security
Some of these manufacturers have included really nice features such as FTP services so that you can access your files from outside your home network thus giving you the feeling of your own private cloud. The problem is that people turn on this feature but forget to set a password. Or worse, ignore setting the password altogether. Often it is in the belief that these files will never be found by the general public, much in the same way that people will not to think to look under the mat for the front door key.
Finding what is out there
There are many different ways to search for FTP sites. The most basic one is your search engine of choice which more often than not is Uncle Google, the “benevolent” overseer of the web.
However if you use one of the more specialized search engines such as ftpsearch.co or searchftps.org, you can start looking for specific files and types. Take it one step further and mix in the likes of Shodan.io and it becomes much more obvious that there is a high state of ignorance towards securing these services and people don’t recognize the danger of what they are doing for the sake of convenience.
Lets look at some basic searches such as password xls on searchftps.org (ftpsearch.co blocks certain keywords). This query will return results where the two terms are used in the same URL. A lot of people share passwords using Excel especially in small corporate environments.
As we all know or should know, saving passwords in Excel, text files or any other unsecured file format is the same as writing it on a post it note and leaving it on your computer screen.
A look at one of these files, shows you have much information leakage we are looking at. The owner of this file has been notified already that they should password protect their FTP solution or better still move it to SFTP or SCP and change all the passwords. In addition using something like KeepPass, LastPass or any other password manager will be a much better solution for them.
Moving on a bit, it time to see what other information that can be found. The directory MobileSync is used by the Apple iTunes program as the save location for your local iPhone backups. A quick search for MobileSync plist will show iPhone backups.
Using a tool such as iPhone Backup Extractor from Reincubate will allow you to extract the contents of the phone to your local hard disk. A lot of people store much more than numbers on their phone. This tool will extract text messages, pictures and videos and of course anything else that is saved in the file system. If you have managed to find someone’s Apple ID account name and password, you can download it straight from iCloud using Elcomsoft EPPB.
Pictures of credit cards, passports, loved ones, very private pictures and messages can all get leaked in this way. There has been a huge amount of publicity lately around this in relation to release of a large amount of private images stolen from celebrities phones.
As a parent, this is quite terrifying. Phone images more often than not contain GPS data, which is more information to a potential predator. If it’s a corporate phone, there is bound to be some saved attachments from mails which can lead to issues such as loss of competitive advantage.
People also save complete copies of their hard disks in the form of VHD files. These virtual hard disks can be mounted in Windows for example. A quick change of the permissions on the folders and the hard disk is ready to be explored. More so, they can extract the local password database from it and brute force the password. Given that Windows 8 now for the most part uses Microsoft accounts which are linked to online accounts, you could be opening yourself to a world of hurt and potential identity theft.
How bad is it?
This problem is extremely widespread as seen by the number of files being indexed on a daily basis. Based on the front page of searchftps.org it proclaims to have 658,200,216 files (8181.99 TB) in 21,505 FTP servers. That’s a lot of files exposed. Even if only 1% of it is personal backups you are looking at 82TB of data. That’s a lot of passwords!
So what is the fix for this?.
The easiest and quickest option, is to disable anonymous access to your FTP if you have not done so already. Below is a list of common FTP/NAS providers and links to documentation on their FTP services
- Synology NAS – How enable Anon acces (just follow steps and verify it is turned off)
- LACIE Cloudbox
- NETGEAR ReadyNas
- TeraStation
- Western Digital
- Seagate
The next thing would be to look at if you need FTP, to switch to SCP or SFTP as FTP in itself is inherently insecure.
The issue can be so easily prevented as with all personal security. Do not bare your NAS to the world unless you are happy with the world seeing your private data.
No comments:
Post a Comment