Cryptolocker stores the key they used to encrypted the drive on the workstation in a clear text file.
That’s helpful. So this is much ado about nothing? I note in the comments section of the article that people have paid the ransom in order to get their data back, but no word yet if they were successful.
This is different from Cryptolocker. Synology uses BusyBox (Linux) as a foundation while all of the NAS configuration is done through a web interface.
These are becoming very popular for people to save their libraries of pictures, documents, home movies, etc. I personally have 2 of them, but I use them solely for iSCSI LUNs mapping to my VMware server. I turned off the Internet-facing components a long while back, as they’re not very useful to me.
Encrypting the contents of these devices would be devastating for someone who uses them for personal memory storage.
I can see why this is a big deal, however, note that the proven affected revision of the DSM software is < DSM 5.0. If you’re keeping your NAS software up to date, you’re relatively safe. Take it off of your home network, out of the DMZ, setup firewalls to ensure it’s insulated from the Internet, and you should be okay. The terrifying part about this is it’s a PUSH operation whereas Cryptolocker was phished.