{"id":4225,"date":"2021-06-28T09:31:25","date_gmt":"2021-06-28T07:31:25","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4225"},"modified":"2021-06-28T11:10:00","modified_gmt":"2021-06-28T09:10:00","slug":"wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/","title":{"rendered":"WD My Book Live NAS under active attack &#8211; how to not end with the wiped up device"},"content":{"rendered":"\n<p>Welcome to the <a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Xopero Security Center<\/a>! Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned factory restore. No more than half a week ago WD My Book NAS users fell victim to such a massive &#8222;update&#8221; or rather some form of a cyberattack. As always, more information can be found below. In this review: Dell is having a serious problem. The pre-installed firmware updater available on their computers may expose almost 30 million users or if you like &#8211; 128 models of this manufacturer&#8217;s devices, to attack. Also: Microsoft tracks a new BazaCall malware campaign using a fake call center to trick you, and Linux Marketplace bugs allow wormable attacks. Let\u2019s begin.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"wd-my-book-nas-devices-remotely-wiped-clean-worldwide\"><strong>WD My Book NAS devices remotely wiped clean worldwide<\/strong><\/h2>\n\n\n<p>Imagine that &#8211; you wake up, arrive at the office, and find out that your WD My Book NAS device has been mysteriously factory reset and all of your files deleted. Seems impossible? Well, it\u2019s the story that happened to WD users from all around the world last week.&nbsp;<\/p>\n\n\n\n<p>WD My Book is a network-attached storage device that looks like a small vertical book that you can stand on your desk. The WD My Book Live app allows owners to access their files and manage their devices remotely, even if the NAS is behind a firewall or router.<\/p>\n\n\n\n<p>On Thursday last week users could no longer log into the device via a browser or an app. When they attempted to log in via the Web dashboard, the device stated that they had an &#8222;Invalid password.&#8221; MyBook logs showed that the devices received a remote command to perform a factory reset starting at around 3 PM on Wednesday and through the night.<\/p>\n\n\n\n<p>Unlike other NAS devices, which are commonly connected to the Internet and exposed to attacks (f.ex. <a href=\"https:\/\/xopero.com\/blog\/en\/2021\/04\/26\/new-qnap-nas-flaws-exploited-in-recent-qlocker-ransomware-attacks\/#paragraph-1\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">QLocker Ransomware<\/a>), the Western Digital My Book devices are stored behind a firewall and communicate through the My Book Live cloud servers to provide remote access. So some users have concerns that WD\u2019s servers were hacked and allowed a threat actor to push out a remote factory reset command to all devices connected to the service. If so, it\u2019s strange that no one has reported ransom notes or other threats.&nbsp;<\/p>\n\n\n\n<p>For the moment of writing, there is no clear statement from WD. The company said that they are actively investigating the attacks but do not believe it was a compromise of their servers. They suggest that attacks were conducted after some of the My Book owners had their accounts compromised.<\/p>\n\n\n\n<p>If you own a Western Digital My Book NAS device, it is strongly advised that you disconnect it from the network until we will learn more about what is going on.&nbsp;<\/p>\n\n\n\n<p><strong>Update:<\/strong> Western Digital in its latest statement has determined that My Book Live and My Book Live Duo devices connected directly to the Internet are being targeted using a remote code execution vulnerability. Additionally, the log files show that on some devices, the attackers installed a trojan with a file named \u201c.nttpd,1-ppc-be-t1-z\u201d, which is a Linux ELF binary compiled for the PowerPC architecture used by the My Book Live and Live Duo. A sample of this trojan has been captured for further analysis and it has been uploaded to VirusTotal.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"biosconnect-the-preinstalled-firmware-updater-puts-128-dell-models-at-risk\"><strong>BIOSConnect &#8211; the preinstalled firmware updater puts 128 Dell models at risk<\/strong><\/h2>\n\n\n<p>Recently discovered four flaws in Dell\u2019s firmware security tool affect 128 recent models of computers, including desktops, laptops, and tablets. Researchers estimate that the vulnerabilities expose over 30 million devices in total.<\/p>\n\n\n\n<p>The vulnerabilities show up in a Dell feature called BIOSConnect, which allows users to easily, and even automatically, download firmware updates. BIOSConnect is part of a broader Dell update and remote operating system management feature called SupportAssist. Update mechanisms are valuable targets for attackers because they can be tainted to distribute malware.<\/p>\n\n\n\n<p>The four vulnerabilities the researchers discovered in BIOSConnect wouldn&#8217;t allow hackers to seed malicious Dell firmware updates to all users at once. However, they could be exploited to individually target victim devices and easily gain remote control of the firmware. Compromising a device&#8217;s firmware can give attackers full control of the machine, because firmware coordinates hardware and software, and runs as a precursor to the computer&#8217;s operating system and applications.<\/p>\n\n\n\n<p>It\u2019s worth to mention attackers couldn&#8217;t directly exploit the four BIOSConnect bugs from the open internet. They need to have a foothold into the internal network of victim devices. But, once an attacker has compromised firmware, they can likely remain undetected long-term inside a target&#8217;s networks. So it\u2019s totally worth all that trouble.<\/p>\n\n\n\n<p><a href=\"http:\/\/wired.com\/story\/dell-firmware-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-tracks-new-bazacall-malware-campaign-using-a-fake-call-center-to-trick-you\"><strong>Microsoft tracks new BazaCall malware campaign using a fake call center to trick you<\/strong><\/h2>\n\n\n<p>Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file. That\u2019s in short a new modus operandi of BazarCall, a criminal group that&#8217;s using malware called BazarLoader (also BazaLoader) to distribute ransomware and hunted by Microsoft Security Intelligence.&nbsp;<\/p>\n\n\n\n<p>The BazaCall campaigns use emails that instruct recipients to call a number to cancel their supposed subscription to a service. When victims call the number, they reach a fraudulent call center operated by attackers. They tell them to visit a website and download an Excel file in order to cancel the service. This file of course contains a malicious macro that downloads the payload. What is interesting, the phone numbers in the attackers&#8217; emails change at least daily.&nbsp;<\/p>\n\n\n\n<p>The BazarLoader malware is designed to provide backdoor access to an infected Windows device. With this level of access, attackers can send other forms of malware, scan the target environment, and go after other vulnerable machines on the same network.<\/p>\n\n\n\n<p>Microsoft&#8217;s security team has also observed the group using the Cobalt Strike penetration testing kit to steal credentials, including the Active Directory (AD) database. Cobalt Strike is frequently used for lateral movement on a network after an initial compromise. The AD theft is a big deal for the enterprise since it contains an organization&#8217;s identity and credential information.<\/p>\n\n\n\n<p>Sources <a href=\"https:\/\/beta.darkreading.com\/attacks-breaches\/microsoft-tracks-new-bazacall-malware-campaign\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">1<\/a> |&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-warns-now-attackers-are-using-a-call-centre-to-trick-you-into-downloading-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"unpatched-linux-marketplace-bugs-allow-wormable-attacks-no-patches-in-sight\"><strong>Unpatched Linux Marketplace bugs allow wormable attacks &#8211; no patches in sight<\/strong><\/h2>\n\n\n<p>PlingStore application is affected by an unpatched remote code-execution (RCE) vulnerability, which can be triggered from any website while the app is running \u2013 allowing for drive-by attacks.<\/p>\n\n\n\n<p><strong>What is a PlingStore exactly?<\/strong><\/p>\n\n\n\n<p>It is an installer and content-management application that acts as a consolidated digital storefront for the various aforementioned sites that offer Linux software and plugins. It allows users to download, install and apply desktop themes, icon themes, wallpapers, mouse cursors and so on directly using the \u201cInstall\u201d button.<\/p>\n\n\n\n<p>For possible attackers, Linux marketplace could be the biggest player but affected are all Pling-based markets \u2013 including AppImage Hub, Gnome-Look, KDE Discover App Store, Pling.com, and XFCE-Look.<\/p>\n\n\n\n<p><strong>The bug(s)<\/strong><\/p>\n\n\n\n<p>The stored XSS bug was first discovered affecting KDE Discover. Stored XSS, also known as persistent XSS, occurs when a malicious script is injected directly into a vulnerable web application. Unlike reflected XSS, a stored attack only requires that a victim visit a compromised web page. Attackers could exploit the bug to modify active listings or post new listings on Pling-based stores in the context of other users, resulting in a wormable XSS.<\/p>\n\n\n\n<p>Besides the typical XSS implications, this would allow for a supply-chain attack XSS worm using a JavaScript payload. The damage can also be escalated to RCE. That\u2019s because the application by design can install other applications, with a built-in mechanism to execute code on the OS level.<\/p>\n\n\n\n<p><strong>No patches in sight<\/strong><\/p>\n\n\n\n<p>Specialists from Positive Security, who discovered vulnerabilities attempted to contact Pling in February, with no luck. In the end, they decided to publicly disclose the issues.<\/p>\n\n\n\n<p>One of the marketplaces, KDE Discover, was immediately responsive and published a patch and advisory in March. For now, users of Pling-based marketplaces should avoid using the PlingStore applications, and to log out of their accounts for the affected websites until the issues have been fixed.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/unpatched-linux-marketplace-bugs-rce\/167155\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-are-ten-more-cybersecurity-stories-below\"><strong>Do you have thirst for knowledge? There are ten more cybersecurity stories below<\/strong><\/h2>\n\n\n<p>1. Virtual machines hide ransomware until the encryption process is done (<a href=\"https:\/\/www.helpnetsecurity.com\/2021\/06\/23\/virtual-machines-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Help Net Security<\/a>)<br>2. REvil Ransomware Code Ripped Off by Rivals (<a href=\"https:\/\/threatpost.com\/revil-ransomware-code-rivals\/167167\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<strong><br><\/strong>3. VMware fixes privilege escalation issue in VMware Tools for Windows (<a href=\"https:\/\/securityaffairs.co\/wordpress\/119294\/security\/vmware-fixes-privilege-escalation-issue-in-vmware-tools-for-windows.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>4. Zephyr OS Bluetooth vulnerabilities left smart devices open to attack (<a href=\"https:\/\/www.theregister.com\/2021\/06\/22\/zephyr_os_bluetooth_vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Register<\/a>)<br>5. How to tell if a website is safe (<a href=\"https:\/\/www.welivesecurity.com\/2021\/06\/23\/how-tell-if-website-is-safe\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">WeLiveSecurity<\/a>)<br>6. 79% of Third-Party Libraries in Apps Are Never Updated (<a href=\"https:\/\/beta.darkreading.com\/application-security\/79-of-third-party-libraries-in-apps-are-never-updated\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dark Reading<\/a>)<br>7. Spam Downpour Drips New IcedID Banking Trojan Variant (<a href=\"https:\/\/threatpost.com\/spam-icedid-banking-trojan-variant\/167250\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<strong><br><\/strong>8. Zyxel Warns Customers of Attacks on Security Appliances (<a href=\"https:\/\/www.securityweek.com\/zyxel-warns-customers-attacks-security-appliances\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Week<\/a>)<br>9. Google warns: Watch out, this security update could break links to your Drive files (<a href=\"https:\/\/www.zdnet.com\/article\/google-watch-out-this-security-update-will-break-links-to-drive-files\/#ftag=RSSbaffb68\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ZDNet<\/a>)<br>10. Cisco ASA vulnerability actively exploited after exploit released (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-asa-vulnerability-actively-exploited-after-exploit-released\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the Xopero Security Center! Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned factory restore. No more than half a week ago WD My Book NAS users fell victim to such a massive &#8222;update&#8221; or rather some form of a cyberattack. As always, more information can be found below. In this review: Dell is having a serious problem. The pre-installed firmware updater available on their computers may expose almost 30 million users or if you like &#8211; 128 models of this manufacturer&#8217;s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WD My Book Live NAS under active attack - how to not end with the wiped up device - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WD My Book Live NAS under active attack - how to not end with the wiped up device - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-28T07:31:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-28T09:10:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"WD My Book Live NAS under active attack &#8211; how to not end with the wiped up device\",\"datePublished\":\"2021-06-28T07:31:25+00:00\",\"dateModified\":\"2021-06-28T09:10:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/\"},\"wordCount\":1490,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/\",\"name\":\"WD My Book Live NAS under active attack - how to not end with the wiped up device - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-06-28T07:31:25+00:00\",\"dateModified\":\"2021-06-28T09:10:00+00:00\",\"description\":\"Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WD My Book Live NAS under active attack &#8211; how to not end with the wiped up device\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WD My Book Live NAS under active attack - how to not end with the wiped up device - Xopero Blog","description":"Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/","og_locale":"pl_PL","og_type":"article","og_title":"WD My Book Live NAS under active attack - how to not end with the wiped up device - Xopero Blog","og_description":"Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned...","og_url":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-06-28T07:31:25+00:00","article_modified_time":"2021-06-28T09:10:00+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"WD My Book Live NAS under active attack &#8211; how to not end with the wiped up device","datePublished":"2021-06-28T07:31:25+00:00","dateModified":"2021-06-28T09:10:00+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/"},"wordCount":1490,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/","url":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/","name":"WD My Book Live NAS under active attack - how to not end with the wiped up device - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-06-28T07:31:25+00:00","dateModified":"2021-06-28T09:10:00+00:00","description":"Another ransomware news? No, not this time. However, data can be lost in more ways than one. For example, as a result of an unplanned...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/wd-my-book-live-nas-under-active-attack-how-to-not-end-with-the-wiped-up-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"WD My Book Live NAS under active attack &#8211; how to not end with the wiped up device"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4225"}],"version-history":[{"count":6,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4225\/revisions"}],"predecessor-version":[{"id":4245,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4225\/revisions\/4245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}