Hackers Used Zero-Day And Wiped My Book Live Devices

Share post:

After it was revealed last week that My Book Live NAS owners mysteriously made their stored files disappear, a recent finding showed that a zero-day vulnerability allowed a threat actor to reset mass devices that ultimately caused the data loss.

While Western Digital had initially told BleepingComputer that the attacks were carried out via a vulnerability called CVE-2018-18472, which has not been fixed since the device went out of service in 2015, it was discovered that another zero-day vulnerability caused the factory reset.

After carefully analyzing the device’s log, some users found that a script called factoryRestore.sh was running on their devices on June 24, deleting the device’s files.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways